BSOD + random crash

Page 1 of 2 12 LastLast

  1. eim
    Posts : 7
    Windows 7 Ultimate x64
       #1

    BSOD + random crash


    I'm having problem with random program crashes and sometimes even BSOD.
    Somedays my PC feels like an old 286....

    Is there anybody out there who can help me find out whats causing it?

    Tnx for any tips.
      My Computer


  2. eim
    Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #2

    Forgot to say... i have been running Memtest86, intelburn, Prime for hours... no problems found :/
      My Computer


  3. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #3

    I looked at your four most recent dumps. Each has a different bugcheck code. That usually indicates a hardware or hardware related problem. The dumps blame various Windows system files, which are very unlikely to be the real causes.

    1. I recommend that you uninstall Daemon Tools. It is notorious for causing BSOD's on Win 7 systems.

    2. After you uninstall Daemon Tools, please enable Driver Verifier carefully following the instructions in this tutotial: Driver Verifier - Enable and Disable. If Driver Verifier encounters a faulty driver, it will trigger a BSOD. Upload any and all Driver Verifier enabled dumps.


    Code:
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a5f000 PsLoadedModuleList = 0xfffff800`02c9ce50
    Debug session time: Wed Jan 26 19:34:10.351 2011 (GMT-5)
    System Uptime: 0 days 0:00:16.444
    Loading Kernel Symbols
    ...............................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    .
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000096, fffff880053e2e00, fffff8800335adf8, fffff8800335a660}
    
    Probably caused by : rasl2tp.sys ( rasl2tp!GetRegistrySettings+2d0 )
    
    Followup: MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000096, The exception code that was not handled
    Arg2: fffff880053e2e00, The address that the exception occurred at
    Arg3: fffff8800335adf8, Exception Record Address
    Arg4: fffff8800335a660, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION}  Privileged instruction.
    
    FAULTING_IP: 
    rasl2tp!GetRegistrySettings+2d0
    fffff880`053e2e00 4c8d4c2448      lea     r9,[rsp+48h]
    
    EXCEPTION_RECORD:  fffff8800335adf8 -- (.exr 0xfffff8800335adf8)
    ExceptionAddress: fffff880053e2e00 (rasl2tp!GetRegistrySettings+0x00000000000002d0)
       ExceptionCode: c0000096
      ExceptionFlags: 00000000
    NumberParameters: 0
    
    CONTEXT:  fffff8800335a660 -- (.cxr 0xfffff8800335a660)
    rax=fffff880053e3550 rbx=000000000000001c rcx=f8800147b0d30000
    rdx=fffff88003174000 rsi=fffff8800335b17c rdi=0000000000000022
    rip=fffff880053e2e00 rsp=fffff8800335b030 rbp=0000000000000000
     r8=fffffa800688a070  r9=0000000000000030 r10=fffff80002a5f000
    r11=000000000000072d r12=0000000000000010 r13=000000000000001a
    r14=000000000000001e r15=0000000000000018
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
    rasl2tp!GetRegistrySettings+0x2d0:
    fffff880`053e2e00 4c8d4c2448      lea     r9,[rsp+48h]
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION}  Privileged instruction.
    
    BUGCHECK_STR:  0x7E
    
    DEFAULT_BUCKET_ID:  STATUS_PRIVILEGED_INSTRUCTION
    
    LOCK_ADDRESS:  fffff80002cd3400 -- (!locks fffff80002cd3400)
    
    Resource @ nt!PiEngineLock (0xfffff80002cd3400)    Available
    
    WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
    
    
    WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
    
    1 total locks
    
    PNP_TRIAGE: 
        Lock address  : 0xfffff80002cd3400
        Thread Count  : 0
        Thread address: 0x0000000000000000
        Thread wait   : 0x0
    
    LAST_CONTROL_TRANSFER:  from fffff880053e26ee to fffff880053e2e00
    
    STACK_TEXT:  
    fffff880`0335b030 fffff880`053e26ee : fffffa80`06bb8a5c fffffa80`06bb8a58 fffffa80`06bb8a40 fffff800`02dd82c0 : rasl2tp!GetRegistrySettings+0x2d0
    fffff880`0335b0c0 fffff880`014c0f61 : ffffffff`00000000 00000000`00000005 fffffa80`0672ef70 00000000`000007ff : rasl2tp!LmpInitialize+0x1ee
    fffff880`0335b270 fffff880`014bb793 : fffffa80`05ea19d0 fffffa80`066c4020 00000000`00000000 01cbbdb9`ea0d04c4 : ndis! ?? ::LNCPHCLB::`string'+0x2f0d
    fffff880`0335b630 fffff880`014bd86c : fffffa80`05ea19d0 fffffa80`066c2050 00000000`00000000 fffffa80`04f56700 : ndis!ndisInitializeAdapter+0x113
    fffff880`0335b690 fffff880`014bb466 : fffffa80`066c21a0 fffffa80`05ea19d0 00000000`00000000 fffffa80`05ea19d0 : ndis!ndisPnPStartDevice+0xac
    fffff880`0335b6f0 fffff800`02e8e06e : 00000000`00000000 fffffa80`05ea19d0 fffffa80`066c2050 fffff880`0335b820 : ndis!ndisPnPDispatch+0x246
    fffff880`0335b790 fffff800`02bc914d : fffffa80`04f56700 fffffa80`06bafbf0 fffff800`02bced30 00000000`00000000 : nt!PnpAsynchronousCall+0xce
    fffff880`0335b7d0 fffff800`02e98db6 : fffff800`02cd31c0 fffffa80`04f56430 fffffa80`06bafbf0 fffffa80`04f565d8 : nt!PnpStartDevice+0x11d
    fffff880`0335b890 fffff800`02e99054 : fffffa80`04f56430 fffffa80`04f30019 fffffa80`04f36350 00000000`00000001 : nt!PnpStartDeviceNode+0x156
    fffff880`0335b920 fffff800`02ebc346 : fffffa80`04f56430 fffffa80`04f36350 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
    fffff880`0335b950 fffff800`02ebc7fc : fffffa80`063bd050 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296
    fffff880`0335bbc0 fffff800`02bd1382 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
    fffff880`0335bc10 fffff800`02adc961 : fffff800`02bd1080 fffff800`02f26e01 fffffa80`04f06b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
    fffff880`0335bcb0 fffff800`02d73c06 : 00000000`00000000 fffffa80`04f06b60 00000000`00000080 fffffa80`04e899e0 : nt!ExpWorkerThread+0x111
    fffff880`0335bd40 fffff800`02aadc26 : fffff880`03167180 fffffa80`04f06b60 fffff880`031720c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`0335bd80 00000000`00000000 : fffff880`0335c000 fffff880`03356000 fffff880`033596d0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    FOLLOWUP_IP: 
    rasl2tp!GetRegistrySettings+2d0
    fffff880`053e2e00 4c8d4c2448      lea     r9,[rsp+48h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  rasl2tp!GetRegistrySettings+2d0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: rasl2tp
    
    IMAGE_NAME:  rasl2tp.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcce3
    
    STACK_COMMAND:  .cxr 0xfffff8800335a660 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x7E_rasl2tp!GetRegistrySettings+2d0
    
    BUCKET_ID:  X64_0x7E_rasl2tp!GetRegistrySettings+2d0
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Fri Jan 28 02:26:44.532 2011 (GMT-5)
    System Uptime: 0 days 1:27:13.625
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff880096c1668, fffff880096c0ed0, fffff80002a954b4}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireFcbWithPaging+13b )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff880096c1668
    Arg3: fffff880096c0ed0
    Arg4: fffff80002a954b4
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff880096c1668 -- (.exr 0xfffff880096c1668)
    ExceptionAddress: fffff80002a954b4 (nt!ExAcquireResourceExclusiveLite+0x0000000000000054)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000001
       Parameter[1]: 00000000000000a0
    Attempt to write to address 00000000000000a0
    
    CONTEXT:  fffff880096c0ed0 -- (.cxr 0xfffff880096c0ed0)
    rax=fffffa8005b60401 rbx=0000000000000040 rcx=0000000000000040
    rdx=0000000000000001 rsi=0000000000000000 rdi=fffff880009b1180
    rip=fffff80002a954b4 rsp=fffff880096c18a0 rbp=0000000000000001
     r8=0000000000000702  r9=0000000000000008 r10=0000000000020000
    r11=fffff880096c1968 r12=0000000000000000 r13=00000000c00000d8
    r14=fffffa8005b60440 r15=0000000000010001
    iopl=0         nv up di pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010046
    nt!ExAcquireResourceExclusiveLite+0x54:
    fffff800`02a954b4 f0480fba696000  lock bts qword ptr [rcx+60h],0 ds:002b:00000000`000000a0=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  Dropbox.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000001
    
    EXCEPTION_PARAMETER2:  00000000000000a0
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
     00000000000000a0 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsAcquireFcbWithPaging+13b
    fffff880`0123810b 84c0            test    al,al
    
    FAULTING_IP: 
    nt!ExAcquireResourceExclusiveLite+54
    fffff800`02a954b4 f0480fba696000  lock bts qword ptr [rcx+60h],0
    
    BUGCHECK_STR:  0x24
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from fffff8800123810b to fffff80002a954b4
    
    STACK_TEXT:  
    fffff880`096c18a0 fffff880`0123810b : 00000000`c00000d8 00000000`00000009 00000000`00000000 00000000`00000090 : nt!ExAcquireResourceExclusiveLite+0x54
    fffff880`096c1910 fffff880`012ac61d : 00000000`00000000 fffffa80`05b7e820 fffffa80`05b8cd80 00010000`00031401 : Ntfs!NtfsAcquireFcbWithPaging+0x13b
    fffff880`096c1970 fffff880`012cfb04 : fffff880`09fc54b0 fffffa80`05b7e820 fffffa80`05b8cd80 00000000`00000000 : Ntfs!NtfsOpenFile+0xaf1
    fffff880`096c1b50 fffff880`01238c0d : fffffa80`05b8cd80 fffffa80`05b7e820 fffff880`09fc54b0 fffffa80`05b60400 : Ntfs!NtfsCommonCreate+0xc54
    fffff880`096c1d30 fffff800`02a855c7 : fffff880`09fc5420 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`096c1d60 fffff800`02a85581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`09fc52f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  Ntfs!NtfsAcquireFcbWithPaging+13b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff880096c0ed0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireFcbWithPaging+13b
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireFcbWithPaging+13b
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Wed Feb  2 04:31:03.930 2011 (GMT-5)
    System Uptime: 0 days 0:12:28.022
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff8800406212a}
    
    Probably caused by : csc.sys ( csc!CscCleanupFobx+2a )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff8800406212a
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002a89ca9 to fffff80002a8a740
    
    STACK_TEXT:  
    fffff880`009b7de8 fffff800`02a89ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`009b7df0 fffff800`02a88172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009b7f30 fffff880`0406212a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`096a7fa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : csc!CscCleanupFobx+0x2a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    csc!CscCleanupFobx+2a
    fffff880`0406212a 4889442450      mov     qword ptr [rsp+50h],rax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  csc!CscCleanupFobx+2a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: csc
    
    IMAGE_NAME:  csc.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc22a
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_csc!CscCleanupFobx+2a
    
    BUCKET_ID:  X64_0x7f_8_csc!CscCleanupFobx+2a
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Wed Feb  2 17:20:19.385 2011 (GMT-5)
    System Uptime: 0 days 0:02:23.478
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002d5674d, fffff88008f36770, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002d5674d, Address of the exception record for the exception that caused the bugcheck
    Arg3: fffff88008f36770, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpKcbCacheLookup+1dd
    fffff800`02d5674d 418b45f4        mov     eax,dword ptr [r13-0Ch]
    
    CONTEXT:  fffff88008f36770 -- (.cxr 0xfffff88008f36770)
    rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000b04
    rdx=0000000009e2c4b4 rsi=fffff8a000919a18 rdi=fffff88008f372c0
    rip=fffff80002d5674d rsp=fffff88008f37140 rbp=fffff8a000919420
     r8=0000000000000009  r9=0000000000000000 r10=0000000000000004
    r11=fffff88008f372c0 r12=fffff8a0012ca4a8 r13=0000000000000020
    r14=0000000000000000 r15=0000000000000001
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!CmpKcbCacheLookup+0x1dd:
    fffff800`02d5674d 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:002b:00000000`00000014=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002d5674d
    
    STACK_TEXT:  
    fffff880`08f37140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpKcbCacheLookup+0x1dd
    
    
    FOLLOWUP_IP: 
    nt!CmpKcbCacheLookup+1dd
    fffff800`02d5674d 418b45f4        mov     eax,dword ptr [r13-0Ch]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!CmpKcbCacheLookup+1dd
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    STACK_COMMAND:  .cxr 0xfffff88008f36770 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd
    
    BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start             end                 module name
    fffff880`06c6e000 fffff880`06cac000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f9d000 fffff880`00ff4000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c74000 fffff880`02cfe000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`06cc5000 fffff880`06cdb000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00ddf000 fffff880`00dea000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00db5000 fffff880`00ddf000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
    fffff880`0191c000 fffff880`01923000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03d81000 fffff880`03d92000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`074c8000 fffff880`074e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006b0000 fffff960`006d7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`018b8000 fffff880`018e2000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01852000 fffff880`01882000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d57000 fffff880`00db5000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0117f000 fffff880`011f2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`06cb5000 fffff880`06cc5000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`070d1000 fffff880`070da000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`089a9000 fffff880`089b7000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03ce0000 fffff880`03d63000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03d63000 fffff880`03d81000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`019c8000 fffff880`019d7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0120a000 fffff880`01220000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`08975000 fffff880`08997000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`02d81000 fffff880`02dc4000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
    fffff880`0938f000 fffff880`09398000   DUMETR64 DUMETR64.SYS Thu Aug 19 15:13:29 2010 (4C6D8259)
    fffff880`089c3000 fffff880`089cc000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`089b7000 fffff880`089c3000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`089cc000 fffff880`089df000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0899d000 fffff880`089a9000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`10acd000 fffff880`10bc1000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03c02000 fffff880`03c48000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0110d000 fffff880`01121000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010c1000 fffff880`0110d000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02fe6000 fffff800`0302f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`0fe00000 fffff880`0fe24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`0860e000 fffff880`08627000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`08627000 fffff880`0862f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`08600000 fffff880`0860e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`07400000 fffff880`074c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03db8000 fffff880`03dce000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`06d9b000 fffff880`06daa000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08630000 fffff880`0863e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`01800000 fffff880`01843000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013cc000 fffff880`013e6000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`08997000 fffff880`0899c200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`06dec000 fffff880`06defd80   LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
    fffff880`09238000 fffff880`0923a480   LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
    fffff880`0756a000 fffff880`0757f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`08659000 fffff880`0867c000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cff000 fffff880`00d43000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`0863e000 fffff880`0864c000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`06daa000 fffff880`06db9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0864c000 fffff880`08659000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`018e2000 fffff880`01913000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`070da000 fffff880`070ea000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`07597000 fffff880`075af000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`075af000 fffff880`075dc000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`07060000 fffff880`070ae000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`070ae000 fffff880`070d1000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01981000 fffff880`0198c000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01121000 fffff880`0117f000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0148d000 fffff880`0149f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014a3000 fffff880`01595000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`06cff000 fffff880`06d0b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06d0b000 fffff880`06d3a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`07555000 fffff880`0756a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d72000 fffff880`02d81000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02cfe000 fffff880`02d43000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01595000 fffff880`015f5000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`09398000 fffff880`093ad000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`0198c000 fffff880`0199d000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a0a000 fffff800`02fe6000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01229000 fffff880`013cc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01913000 fffff880`0191c000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`06dcb000 fffff880`06de4000   nusb3hub nusb3hub.sys Thu Nov 18 20:34:24 2010 (4CE5D420)
    fffff880`03dce000 fffff880`03dff000   nusb3xhc nusb3xhc.sys Thu Nov 18 20:34:25 2010 (4CE5D421)
    fffff880`10acb000 fffff880`10acc180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`0fe39000 fffff880`10acae00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`02d4c000 fffff880`02d72000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00ed7000 fffff880`00ee7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013e6000 fffff880`013f7000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`070ea000 fffff880`07190000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`08938000 fffff880`08975000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d43000 fffff880`00d57000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`06cdb000 fffff880`06cff000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`06d3a000 fffff880`06d55000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`06d55000 fffff880`06d76000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`06d76000 fffff880`06d90000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`06d90000 fffff880`06d9b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01966000 fffff880`0196f000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`093ad000 fffff880`093db000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
    fffff880`0196f000 fffff880`01978000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01978000 fffff880`01981000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`09200000 fffff880`09238000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
    fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`0757f000 fffff880`07597000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06c08000 fffff880`06c6e000   Rt64win7 Rt64win7.sys Fri Dec 24 02:30:25 2010 (4D144C11)
    fffff880`086dc000 fffff880`08937d80   RTKVHD64 RTKVHD64.sys Fri Sep 03 04:02:27 2010 (4C80AB93)
    fffff880`07190000 fffff880`0719b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`092f9000 fffff880`0938f000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`09292000 fffff880`092f9000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`0719b000 fffff880`071c8000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`06dea000 fffff880`06deb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`071c8000 fffff880`071da000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`019bb000 fffff880`019c8000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`093db000 fffff880`093e6000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
    fffff880`0199d000 fffff880`019bb000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02ddf000 fffff880`02df3000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`093e6000 fffff880`093f5000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
    fffff880`03d92000 fffff880`03db8000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`06db9000 fffff880`06dcb000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`089df000 fffff880`089fc000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`03c00000 fffff880`03c01f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`10bce000 fffff880`10bdf000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`074fb000 fffff880`07555000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03c48000 fffff880`03c9e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`10bc1000 fffff880`10bce000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01923000 fffff880`01931000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01931000 fffff880`01956000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02dc4000 fffff880`02ddf000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01956000 fffff880`01966000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d43000 fffff880`02d4c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000a0000 fffff960`003b0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`06cac000 fffff880`06cb5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00ff4000 fffff880`00ffd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0867c000 fffff880`0869d000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`0869d000 fffff880`086ce000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`01882000 fffff880`01890000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01890000 fffff880`0189c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0189c000 fffff880`018a5000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018a5000 fffff880`018b8000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`06db9000 fffff880`06dea000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`06db9000 fffff880`06dea000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  4. eim
    Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #4

    Uninstalled DeamonTools and Enabled Driver Verifier, havent noticed anything yet.

    Tnx for having a look, i think i will delete all logs and test it for a while. Perhaps i'll return with a new minidump :)
      My Computer


  5. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #5

    After you run Verifier for about 36 hours, you can turn it off. I hope you'll return WITHOUT a mini dump to say your system is running smoothly! :)
      My Computer


  6. eim
    Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #6

    i'm back...


    Oh no!
    Booted up the computer, it gave me a BSOD for a few sec...
    I made a new minidump, is there any useful information?

    All help is much appriciated

    (System Specs - See below)
    Last edited by eim; 05 Feb 2011 at 06:22.
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #7

    This is a Driver Verifier enabled dump and it blames ntfs.sys which is the Windows file system driver and unlikely to be the real cause. You can turn off Driver Verifier for now. Because ntfs.sys was blamed. I suggest you check your file system with CheckDisk -
    Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
    When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.

    Elevated Command Prompt:
    Go to Start and type in "cmd.exe" (without the quotes)
    At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"

    CHKDSK LogFile:
    Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
    Expand the Windows logs heading, then select the Application log file entry.
    Double click on the Source column header.
    Scroll down the list until you find the Chkdsk entry (wininit for Windows 7) (winlogon for XP).

    Copy/paste the results into your next post.


    Code:
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a67000 PsLoadedModuleList = 0xfffff800`02ca4e50
    Debug session time: Sat Feb  5 03:52:37.696 2011 (GMT-5)
    System Uptime: 0 days 0:00:15.788
    Loading Kernel Symbols
    ...............................................................
    ......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff880033609a8, fffff88003360210, fffff80002af72b3}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsNonCachedIo+23f )
    
    Followup: MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff880033609a8
    Arg3: fffff88003360210
    Arg4: fffff80002af72b3
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff880033609a8 -- (.exr 0xfffff880033609a8)
    ExceptionAddress: fffff80002af72b3 (nt!IopCompleteRequest+0x0000000000000ae3)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88003360210 -- (.cxr 0xfffff88003360210)
    rax=fffff88003361f80 rbx=fffff980034b0ee0 rcx=0000bcfa00520050
    rdx=0000bcfa00520050 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002af72b3 rsp=fffff88003360be0 rbp=0000000000000000
     r8=fffff88003360ce8  r9=fffff88003360ce0 r10=0000000000000002
    r11=fffff80002af67d0 r12=fffff88003361f78 r13=0000000000000000
    r14=fffffa8004f26680 r15=fffff8800316a180
    iopl=0         nv up ei pl nz na pe cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010203
    nt!IopCompleteRequest+0xae3:
    fffff800`02af72b3 488b09          mov     rcx,qword ptr [rcx] ds:002b:0000bcfa`00520050=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0f0e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsNonCachedIo+23f
    fffff880`0122405f 498b4d78        mov     rcx,qword ptr [r13+78h]
    
    FAULTING_IP: 
    nt!IopCompleteRequest+ae3
    fffff800`02af72b3 488b09          mov     rcx,qword ptr [rcx]
    
    BUGCHECK_STR:  0x24
    
    IRP_ADDRESS:  ffffffffffffff89
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab40c7 to fffff80002af72b3
    
    STACK_TEXT:  
    fffff880`03360be0 fffff800`02ab40c7 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
    fffff880`03360cb0 fffff800`02adeb9d : fffffa80`04f26680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`03360d30 fffff800`02ae0cff : fffff880`03361200 fffffa80`06ed0040 00000000`00000000 fffff880`03360f60 : nt!KiCommitThreadWait+0x3dd
    fffff880`03360dc0 fffff880`0122405f : fffffa80`06f61500 00000000`00000000 fffff8a0`04046500 fffff800`02af3d00 : nt!KeWaitForSingleObject+0x19f
    fffff880`03360e60 fffff880`01227526 : fffff880`03361200 fffff980`034d8c60 fffff8a0`040465a0 fffff8a0`04046470 : Ntfs!NtfsNonCachedIo+0x23f
    fffff880`03361030 fffff880`01229f78 : fffff880`03361200 fffff980`034d8c60 fffff880`03361301 fffffa80`06f62001 : Ntfs!NtfsCommonRead+0x7a6
    fffff880`033611d0 fffff800`02f7dc16 : fffff980`034d8c60 fffff980`034d8c60 fffffa80`06f62030 fffffa80`0734d8f0 : Ntfs!NtfsFsdRead+0x1b8
    fffff880`033613d0 fffff880`0104b23f : fffff980`034d8fb8 fffff880`03361480 fffffa80`07276870 fffffa80`0734d8f0 : nt!IovCallDriver+0x566
    fffff880`03361430 fffff880`010496df : fffffa80`06d55de0 fffffa80`06d55de0 fffffa80`06d55d00 fffff980`034d8c60 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`033614c0 fffff800`02f7dc16 : fffff980`034d8c60 00000000`00000002 fffffa80`074ab070 fffffa80`05148c98 : fltmgr!FltpDispatch+0xcf
    fffff880`03361520 fffff800`02ac91f2 : fffff980`034d8c80 00000000`00000043 fffff980`034d8c60 fffffa80`0734d9c0 : nt!IovCallDriver+0x566
    fffff880`03361580 fffff800`02d9afb0 : fffffa80`074ab000 fffffa80`074ab000 00000000`00000001 00000000`00184be3 : nt!IoPageRead+0x252
    fffff880`03361610 fffff800`02dd2c75 : fffffa80`074ab070 00000000`00000000 00000000`00000022 fffff880`033618c0 : nt!MiCreateImageFileMap+0x170
    fffff880`03361840 fffff800`02dc8013 : fffff880`03361aa0 00000000`00000000 fffff880`03361d58 fffff880`03361a98 : nt!MmCreateSection+0x7a9
    fffff880`03361a50 fffff800`02ad6993 : fffffa80`04f26680 fffff880`03361cf8 fffff880`03361ae8 00000000`00000000 : nt!NtCreateSection+0x162
    fffff880`03361ad0 fffff800`02ad2f30 : fffff800`02eb08b6 fffffa80`04f26680 fffff880`03361d80 00000000`00000004 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`03361cd8 fffff800`02eb08b6 : fffffa80`04f26680 fffff880`03361d80 00000000`00000004 00000000`00000030 : nt!KiServiceLinkage
    fffff880`03361ce0 fffff800`02eb0c7c : ffffffff`80000210 00000000`00100000 fffff880`03361e00 fffff800`02ad593d : nt!MmCheckSystemImage+0x96
    fffff880`03361e10 fffff800`02eb0e97 : ffffffff`80000210 00001f80`00000001 fffff8a0`04046cc0 00000000`00000000 : nt!MiCreateSectionForDriver+0xcc
    fffff880`03361ec0 fffff800`02ebc73a : 00000000`00000000 fffff880`03362080 fffffa80`04f26680 00000000`00000000 : nt!MiObtainSectionForDriver+0xd7
    fffff880`03361f20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x23a
    
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  Ntfs!NtfsNonCachedIo+23f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff88003360210 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_VRF_Ntfs!NtfsNonCachedIo+23f
    
    BUCKET_ID:  X64_0x24_VRF_Ntfs!NtfsNonCachedIo+23f
    
    Followup: MachineOwner
    ---------
      My Computer


  8. eim
    Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #8

    Here is the CHKDSK LogFiles. In swedish... (was about to run it in google translate, but i gues that would mess it up even more)
    Is there any usful information?


    Code:
     
    Kontrollerar filsystemet på C:
    Filsystemet är av typen NTFS.
    En diskkontroll har schemalagts.
    Disken kommer nu att kontrolleras. 
    CHKDSK verifierar filer (steg 1 av 5)...
    119552 filposter har behandlats. Filverifieringen är klar.
    183 stora filposter har behandlats. 0 skadade filposter har behandlats. 2 EA-poster har behandlats. 71 referensposter har behandlats. CHKDSK verifierar index (steg 2 av 5)...
    Det går inte att hitta filnamnsattributet för indexposten MINABI~
    för indexet $I30 med den överordnade filen 0x207 i filen 0x242.
    Tar bort indexposten MINABI~ i indexet $I30 i filen 519.
    164958 indexposter har behandlats. Indexverifieringen är klar.
    CHKDSK läser oindexerade filer för återanslutning till den ursprungliga katalogen.
    1 oindexerade filer har genomsökts. Återställer den överblivna filen MINABI~1 (578) till katalogfilen 519.
    0 oindexerade filer har återställts. CHKDSK verifierar säkerhetsbeskrivare (steg 3 av 5)...
    119552 fil-SD/SID-poster har behandlats. Rensar upp 303 oanvända indexposter från indexet $SII i filen 0x9.
    Rensar upp 303 oanvända indexposter från indexet $SDH i filen 0x9.
    Rensar upp 303 oanvända säkerhetsbeskrivare.
    Verifieringen av säkerhetsbeskrivare är klar.
    22704 datafiler har behandlats. CHKDSK verifierar USN-journalen...
    37511560 USN-byte har behandlats. Verifieringen av USN-journalen är klar.
    CHKDSK verifierar fildata (steg 4 av 5)...
    119536 filer har behandlats. Verifieringen av filinformationen är klar.
    CHKDSK verifierar ledigt diskutrymme (steg 5 av 5)...
    49933708 lediga kluster har bearbetats. Verifieringen av ledigt diskutrymme är klar.
    Korrigeringar har gjorts i filsystemet.
    244089855 kB diskutrymme totalt.
    44068232 kB i 91878 filer.
    56776 kB i 22705 index.
    0 kB i skadade sektorer.
    230011 kB används av operativsystemet.
    65536 kB hårddisksutrymme används av loggfilen.
    199734836 kB ledigt utrymme.
    4096 byte i varje allokeringsenhet.
    61022463 allokeringsenheter finns totalt på disken.
    49933709 allokeringsenheter är tillgängliga på disken.
    Intern information:
    00 d3 01 00 a2 bf 01 00 1d 62 03 00 00 00 00 00 .........b......
    f7 00 00 00 47 00 00 00 00 00 00 00 00 00 00 00 ....G...........
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    Kontrollen av disken har slutförts.
    Vänta medan datorn startas om.

    Code:
     
    Chkdsk kördes i läs- och skrivläge. 
    Kontrollerar filsystemet på D:
    Filsystemet är av typen NTFS.
    Det går inte att låsa aktuell enhet.
    Det går inte att köra CHKDSK eftersom volymen används av en annan process.
    Kommandot CHKDSK kan köras om volymen demonteras först.
    ALLA ÖPPNA REFERENSER TILL VOLYMEN BLIR OGILTIGA.
    Vill du tvinga fram en demontering av den här volymen? (J/N) Volymen är demonterad. Alla öppna referenser till volymen är nu ogiltiga.
    Volymetiketten är Ny volym.
    CHKDSK verifierar filer (steg 1 av 5)...
    246272 filposter har behandlats. Filverifieringen är klar.
    2 stora filposter har behandlats. 0 skadade filposter har behandlats. 0 EA-poster har behandlats. 0 referensposter har behandlats. CHKDSK verifierar index (steg 2 av 5)...
    251406 indexposter har behandlats. Indexverifieringen är klar.
    0 oindexerade filer har genomsökts. 0 oindexerade filer har återställts. CHKDSK verifierar säkerhetsbeskrivare (steg 3 av 5)...
    246272 fil-SD/SID-poster har behandlats. Rensar upp 23 oanvända indexposter från indexet $SII i filen 0x9.
    Rensar upp 23 oanvända indexposter från indexet $SDH i filen 0x9.
    Rensar upp 23 oanvända säkerhetsbeskrivare.
    Verifieringen av säkerhetsbeskrivare är klar.
    2567 datafiler har behandlats. CHKDSK verifierar fildata (steg 4 av 5)...
    246256 filer har behandlats. Verifieringen av filinformationen är klar.
    CHKDSK verifierar ledigt diskutrymme (steg 5 av 5)...
    105503454 lediga kluster har bearbetats. Verifieringen av ledigt diskutrymme är klar.
    Filsystemet har kontrollerats. Inga problem påträffades.
    488383487 kB diskutrymme totalt.
    65970016 kB i 165016 filer.
    72492 kB i 2569 index.
    0 kB i skadade sektorer.
    327159 kB används av operativsystemet.
    65536 kB hårddisksutrymme används av loggfilen.
    422013820 kB ledigt utrymme.
    4096 byte i varje allokeringsenhet.
    122095871 allokeringsenheter finns totalt på disken.
    105503455 allokeringsenheter är tillgängliga på disken.
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #9

    I believe it shows 0 bytes in bad clusters or sectors. That is what I was looking for. It looks like it did a little cleaning up of your file system. It looks like your file system is in good shape.
      My Computer


  10. eim
    Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #10

    This aint fun... Today when i booted upp the computer, it didnt work out the way i hoped it to...
    1. Aero theme didnt start - ok i can live with that.
    2. Computer performance is really bad... slow like a 286 again - what is this now...
    3. Explorer.exe crashes, constantly... i cant open anything, APPCRACH. - oh no...
    4. System hangs, restart and... BSOD
    5. Rebooted the computer, and now it looks allright again....

    Latest Logfiles attached - Is there a chance to find the cause?

    (i bought this hardware 4 months ago and have spent so much time trying to get it working, after 2 months the reseller gave me a new motherboard... but that did not change a thing. I reinstalled many times, changed harddrives, changed PSU, dont know what to do now... its annoying, for real )

    Could it be win7 64-bit that is the problem? (is it worth a try with win7 -32bit?)
    Last edited by eim; 07 Feb 2011 at 09:19.
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 22:07.
Find Us