Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD-Almost a year-Need help


22 Feb 2011   #11

windows7 64bit
 
 

I hope you can read them I changed permission so i could zip them

My System SpecsSystem Spec
.

22 Feb 2011   #12

windows7 64bit
 
 
more dump files

Strange but I didn't see as many as I thought I would. Here are three recent.
There is a memory dmp file from today that I zipped but can't get to upload.

I do want to say thank you for all your help, this problem has been ignored too long and keeps morphing into new things!

Edit-I see why I couldn't get the memory dmp file-its 110MB. added two more minis
My System SpecsSystem Spec
22 Feb 2011   #13

Windows 7 Ultimate 32 bit
 
 

You are welcome for the help. I looked at all three of your dumps and only one has a short uptime. The other two have uptimes of over an hour. Your latest dump is a Driver Verifier enabled dump and it blames one of the Windows system core files, highly unlikely to be the real cause. You can turn off Driver Verifier for now, Driver Verifier - Enable and Disable. When Driver Verifier blames a Windows system file, it usually means a hardware or driver problem.

Your other two dumps are both bugcheck 24, NTFS File system.

1. Test your RAM with Memtest86. This runs outside of Windows so any Windows related problems will not affect it. Follow the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off of at least an hour. Let it run for a minimum of seven passes. This will take six to eight hours. Any errors will show on your screen in red. If you see errors you can stop the test. Post back with your results.

2. Test your hard drive with one of these bootable diagnostics. HD Diagnostic. It will run outside of Windows also. Post back with your results.

Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`03450e50
Debug session time: Mon Feb 21 12:20:09.242 2011 (GMT-5)
System Uptime: 0 days 1:59:35.506
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88005211ec8, fffff88005211730, fffff880012e4173}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFcbTableCompare+3 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88005211ec8
Arg3: fffff88005211730
Arg4: fffff880012e4173

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88005211ec8 -- (.exr 0xfffff88005211ec8)
ExceptionAddress: fffff880012e4173 (Ntfs!NtfsFcbTableCompare+0x0000000000000003)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000000000001f
Attempt to read from address 000000000000001f

CONTEXT:  fffff88005211730 -- (.cxr 0xfffff88005211730)
rax=002b000000035975 rbx=ffffffffffffffff rcx=fffffa8006b67640
rdx=fffff88005212168 rsi=fffffa8006b67640 rdi=0000000000000000
rip=fffff880012e4173 rsp=fffff88005212108 rbp=fffff88005212168
 r8=000000000000001f  r9=0000ffffffffffff r10=fffff800033fea00
r11=fffffa80062a7360 r12=0000000000000000 r13=0000000000000000
r14=fffff8a002cb9a98 r15=fffffa80070bafb8
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
Ntfs!NtfsFcbTableCompare+0x3:
fffff880`012e4173 498b08          mov     rcx,qword ptr [r8] ds:002b:00000000`0000001f=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  STService.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000000000000001f

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034bb0e0
 000000000000001f 

FOLLOWUP_IP: 
Ntfs!NtfsFcbTableCompare+3
fffff880`012e4173 498b08          mov     rcx,qword ptr [r8]

FAULTING_IP: 
Ntfs!NtfsFcbTableCompare+3
fffff880`012e4173 498b08          mov     rcx,qword ptr [r8]

BUGCHECK_STR:  0x24

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880012e4173

STACK_TEXT:  
fffff880`05212108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFcbTableCompare+0x3


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFcbTableCompare+3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff88005211730 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFcbTableCompare+3

BUCKET_ID:  X64_0x24_Ntfs!NtfsFcbTableCompare+3

Followup: MachineOwner
---------

Debug session time: Mon Feb 21 14:39:26.008 2011 (GMT-5)
System Uptime: 0 days 0:00:34.647
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88002263238, fffff88002262aa0, fffff800032eaf39}

Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mfehidk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+836 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88002263238
Arg3: fffff88002262aa0
Arg4: fffff800032eaf39

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88002263238 -- (.exr 0xfffff88002263238)
ExceptionAddress: fffff800032eaf39 (nt!ExIsResourceAcquiredSharedLite+0x0000000000000079)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000001a6f0c
Attempt to read from address 00000000001a6f0c

CONTEXT:  fffff88002262aa0 -- (.cxr 0xfffff88002262aa0)
rax=00000000001a6f04 rbx=fffffa80061afe48 rcx=fffffa80061afe48
rdx=fffffa8006b43180 rsi=fffffa80085e3b60 rdi=0000000000000000
rip=fffff800032eaf39 rsp=fffff88002263470 rbp=0000000000000003
 r8=0000000000000000  r9=0000000000076000 r10=fffffa80091c03f8
r11=fffff88002263678 r12=0000000000060001 r13=0000000000000001
r14=fffff880022636e8 r15=fffff88002263670
iopl=0         nv up di pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010002
nt!ExIsResourceAcquiredSharedLite+0x79:
fffff800`032eaf39 8b5008          mov     edx,dword ptr [rax+8] ds:002b:00000000`001a6f0c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000001a6f0c

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350d0e0
 00000000001a6f0c 

FOLLOWUP_IP: 
Ntfs!NtfsCommonRead+836
fffff880`0122c5b6 85c0            test    eax,eax

FAULTING_IP: 
nt!ExIsResourceAcquiredSharedLite+79
fffff800`032eaf39 8b5008          mov     edx,dword ptr [rax+8]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff8800122c5b6 to fffff800032eaf39

STACK_TEXT:  
fffff880`02263470 fffff880`0122c5b6 : fffff8a0`02196140 fffff880`022637c0 fffff8a0`021a10a0 fffff8a0`02196010 : nt!ExIsResourceAcquiredSharedLite+0x79
fffff880`022634a0 fffff880`0122ef78 : fffff880`02263670 fffffa80`091c0010 fffff880`02263701 fffffa80`07127201 : Ntfs!NtfsCommonRead+0x836
fffff880`02263640 fffff880`0100a23f : fffffa80`091c03f8 fffffa80`091c0010 fffffa80`07127220 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`02263840 fffff880`010086df : fffffa80`079ae040 fffffa80`091c0010 fffffa80`079ae000 fffffa80`091c0010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`022638d0 fffff880`010af204 : fffffa80`091c0010 fffffa80`0741e300 fffffa80`091c0010 00000000`00000043 : fltmgr!FltpDispatch+0xcf
fffff880`02263930 fffffa80`091c0010 : fffffa80`0741e300 fffffa80`091c0010 00000000`00000043 fa80091b`66680420 : mfehidk+0x48204
fffff880`02263938 fffffa80`0741e300 : fffffa80`091c0010 00000000`00000043 fa80091b`66680420 00000000`000007ff : 0xfffffa80`091c0010
fffff880`02263940 fffffa80`091c0010 : 00000000`00000043 fa80091b`66680420 00000000`000007ff fffffa80`079c0640 : 0xfffffa80`0741e300
fffff880`02263948 00000000`00000043 : fa80091b`66680420 00000000`000007ff fffffa80`079c0640 fffffa80`079ae040 : 0xfffffa80`091c0010
fffff880`02263950 fa80091b`66680420 : 00000000`000007ff fffffa80`079c0640 fffffa80`079ae040 fffffa80`091c0010 : 0x43
fffff880`02263958 00000000`000007ff : fffffa80`079c0640 fffffa80`079ae040 fffffa80`091c0010 fffffa80`091c03f8 : 0xfa80091b`66680420
fffff880`02263960 fffffa80`079c0640 : fffffa80`079ae040 fffffa80`091c0010 fffffa80`091c03f8 ff0c0101`55555555 : 0x7ff
fffff880`02263968 fffffa80`079ae040 : fffffa80`091c0010 fffffa80`091c03f8 ff0c0101`55555555 fffffa80`0741e3e0 : 0xfffffa80`079c0640
fffff880`02263970 fffffa80`091c0010 : fffffa80`091c03f8 ff0c0101`55555555 fffffa80`0741e3e0 fffffa80`0741e3e0 : 0xfffffa80`079ae040
fffff880`02263978 fffffa80`091c03f8 : ff0c0101`55555555 fffffa80`0741e3e0 fffffa80`0741e3e0 fffff800`032c71f2 : 0xfffffa80`091c0010
fffff880`02263980 ff0c0101`55555555 : fffffa80`0741e3e0 fffffa80`0741e3e0 fffff800`032c71f2 fffffa80`091c0030 : 0xfffffa80`091c03f8
fffff880`02263988 fffffa80`0741e3e0 : fffffa80`0741e3e0 fffff800`032c71f2 fffffa80`091c0030 fffffa80`091c0b20 : 0xff0c0101`55555555
fffff880`02263990 fffffa80`0741e3e0 : fffff800`032c71f2 fffffa80`091c0030 fffffa80`091c0b20 00000000`00000043 : 0xfffffa80`0741e3e0
fffff880`02263998 fffff800`032c71f2 : fffffa80`091c0030 fffffa80`091c0b20 00000000`00000043 fffff800`032a6e1a : 0xfffffa80`0741e3e0
fffff880`022639a0 fffff800`032c74f5 : 00000000`00000001 00000000`00000001 fffff880`02263a60 00000000`00000021 : nt!IoPageRead+0x252
fffff880`02263a30 fffff800`032f08bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`02263ac0 fffff800`032d382e : 00000000`00000000 00000000`0001759c 00000000`00ddc201 00000000`00ddc220 : nt!MmAccessFault+0x14bb
fffff880`02263c20 00000000`773851df : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`00ddb640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773851df


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsCommonRead+836

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff88002262aa0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonRead+836

BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonRead+836

Followup: MachineOwner
---------

Debug session time: Tue Feb 22 12:45:43.036 2011 (GMT-5)
System Uptime: 0 days 1:03:54.675
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C4, {91, 0, fffffa80074ba380, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4904 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught.  This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
    the operating system. The only supported way to extend a kernel
    mode stack is by using KeExpandKernelStackAndCallout.
Arg2: 0000000000000000
Arg3: fffffa80074ba380
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0xc4_91

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  STService.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88006169f68 -- (.exr 0xfffff88006169f68)
ExceptionAddress: fffff88001260c4d (Ntfs!NtfsLookupNameLengthViaLcb+0x000000000000003d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000020
Attempt to read from address 0000000000000020

TRAP_FRAME:  fffff8800616a010 -- (.trap 0xfffff8800616a010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00d2d5010
rdx=fffff8800616a230 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001260c4d rsp=fffff8800616a1a8 rbp=fffffa80058fc4b0
 r8=0000000000000036  r9=0000000000000020 r10=fffff800033fea00
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
Ntfs!NtfsLookupNameLengthViaLcb+0x3d:
fffff880`01260c4d 4d3909          cmp     qword ptr [r9],r9 ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032d824a to fffff80003283740

STACK_TEXT:  
fffff880`06169078 fffff800`032d824a : 00000000`000000c4 00000000`00000091 00000000`00000000 fffffa80`074ba380 : nt!KeBugCheckEx
fffff880`06169080 fffff800`032b06b3 : fffffa80`00000002 00000000`00004000 fffff880`00000003 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4904
fffff880`061690c0 fffff800`032bd9ef : fffff880`06169f68 fffff880`06169cd0 fffff880`0616a010 00000000`00000000 : nt!RtlDispatchException+0x33
fffff880`061697a0 fffff800`03282d82 : fffff880`06169f68 00000000`00000000 fffff880`0616a010 fffffa80`05a91370 : nt!KiDispatchException+0x16f
fffff880`06169e30 fffff800`032818fa : 00000000`00000000 00000000`00000000 fffff880`0616a000 fffff880`01292d80 : nt!KiExceptionDispatch+0xc2
fffff880`0616a010 fffff880`01260c4d : fffff880`01260e93 00000000`00000000 fffffa80`058fc4b0 fffffa80`05a91370 : nt!KiPageFault+0x23a
fffff880`0616a1a8 fffff880`01260e93 : 00000000`00000000 fffffa80`058fc4b0 fffffa80`05a91370 fffff800`03589942 : Ntfs!NtfsLookupNameLengthViaLcb+0x3d
fffff880`0616a1b0 fffff880`01261b41 : fffffa80`05ae9700 00000000`00000000 fffffa80`05a91300 00000000`000007ff : Ntfs!NtfsConstructFilePath+0x123
fffff880`0616a230 fffff880`012f28cd : fffff980`021c3800 fffffa80`05ae9780 00000000`00000000 00000000`0000000e : Ntfs!NtfsAttachRepairInfoPriv+0x1a1
fffff880`0616a290 fffff880`012e84dc : fffffa80`05ae9780 fffffa80`06484180 fffff8a0`0d2d5018 fffffa80`05d52701 : Ntfs!NtfsReadMftRecord+0x45c
fffff880`0616a340 fffff880`012e9498 : fffff880`0616a4e8 fffff8a0`0d2d5140 fffff880`0616a8e0 00000001`00000000 : Ntfs!NtfsLookupInFileRecord+0x6c
fffff880`0616a3d0 fffff880`012afa24 : fffffa80`05ae9780 fffff8a0`0d2d5100 00000000`00000000 00000000`00000001 : Ntfs!NtfsWriteFileSizes+0xa8
fffff880`0616a530 fffff880`01251b7c : fffffa80`05ae9780 fffffa80`06484180 fffffa80`058fc401 fffffa80`058fc400 : Ntfs!NtfsFlushVolume+0x304
fffff880`0616a660 fffff880`01245bed : fffffa80`05ae9780 fffff880`01070d01 fffffa80`079d09c0 fffff880`0616a700 : Ntfs!NtfsVolumeDasdIo+0x1dc
fffff880`0616a710 fffff880`01246f78 : fffffa80`05ae9780 fffffa80`05628c10 fffff880`0616a801 fffffa80`0654ad00 : Ntfs!NtfsCommonRead+0x1e61
fffff880`0616a8b0 fffff880`0106423f : fffffa80`05628fb0 fffffa80`05628c10 fffffa80`0654ad30 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`0616a960 fffff880`010626df : fffffa80`063df7b0 00000000`00000001 fffffa80`063df700 fffffa80`05628c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0616a9f0 fffff800`03599ca9 : 00000000`00000000 fffffa80`058fc4b0 00000000`00000001 fffffa80`05628c10 : fltmgr!FltpDispatch+0xcf
fffff880`0616aa50 fffff800`035a14a3 : fffffa80`058fc4b0 fffffa80`058fc4b0 fffffa80`058fc4b0 fffff800`033fde80 : nt!IopSynchronousServiceTail+0xf9
fffff880`0616aac0 fffff800`03282993 : fffffa80`075f0340 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`0616abb0 00000000`00222dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0608ebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x222dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4904
fffff800`032d824a cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4904

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904

BUCKET_ID:  X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904

Followup: MachineOwner
---------
My System SpecsSystem Spec
.


23 Feb 2011   #14

windows7 64bit
 
 
No memtest errors

Started up today with no crashes. Just two errors regarding HP and Microsoft Anitalware in event viewer.

Ran all afternoon and night with no errors using Memtest 86.

Typed in verifier into start box and nothing came up. Is this something that I recently added or that I should have had originally?

Am going to attemp the hard drive diagnostics now.
My System SpecsSystem Spec
23 Feb 2011   #15

windows7 64bit
 
 
Passed SeaTools Test and latest dmp files

I passed the seatools long and short tests.
I had a shut down before the test and after the test when i rebooted-.dmp files attached.

I haven't done running in safe mode yet, will do next.
My System SpecsSystem Spec
23 Feb 2011   #16

windows7 64bit
 
 
2 hours in safe mode no crashes

Since I'm not sure what triggers the crashes I'm not sure what things to be doing or how long to stay in safe mode? So far 2 hours no crashes.
My System SpecsSystem Spec
23 Feb 2011   #17

Windows 7 Ultimate 32 bit
 
 

Driver Verifier is a built in tool that the machine owner enables and disables. Here is a tutorial on Verifier: Driver Verifier - Enable and Disable. Right now, you should have it disabled.

Both dumps are bucheck 1A, Memory Management and both blame ntkrnlmp.exe, one of the Windows system core files and highly unlikely to be the cause. Both crashes occurred with short uptimes, 2 min 19.9 sec and 0 min 40.3 sec, respectively. This indicates a hardware or driver problem.

To summarize, your drivers appear up to date. You ran Memtest86 with no errors. You ran Check Disk and it found no problems. You have run SeaTools, long and short, and it detected no problems. Driver Verifier enabled dumps blamed Windows system files. Your application crash log shows the McAfee crashed when you running McAfee and it now shows MSE has crashed.

Am I correct in assuming most of your BSOD's occur at shutdown and boot up?

I recommend that you test your CPU and your RAM with Prime95. Carefully follow the instructions in this tutorial: http://www.sevenforums.com/tutorials...t-prime95.html. Run 3 separate tests, one on each of the settings (Blend, Small FFTs, Large FFTs). Post back with your results.

Do you have access to another power supply that you could try? Is your computer under warranty?


Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50
Debug session time: Wed Feb 23 11:35:44.084 2011 (GMT-5)
System Uptime: 0 days 0:00:40.348
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 14e00b, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 000000000014e00b
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  vdsldr.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880066e1240 -- (.trap 0xfffff880066e1240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=fffff8a0038f303e
rdx=fffff8a00000c2f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000356f901 rsp=fffff880066e13d0 rbp=fffff880066e1780
 r8=0000000000002000  r9=fffff880066e15d0 r10=0000000000000000
r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
nt!ObpQueryNameString+0x4ed:
fffff800`0356f901 668939          mov     word ptr [rcx],di ds:56b0:fffff8a0`038f303e=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003235b7a to fffff80003289740

STACK_TEXT:  
fffff880`066e0bd8 fffff800`03235b7a : 00000000`0000001a 00000000`00041287 00000000`0014e00b 00000000`00000000 : nt!KeBugCheckEx
fffff880`066e0be0 fffff800`0328782e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`03418888 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`066e0d40 fffff800`0328c905 : 00000000`00000000 fffff800`032a7322 80000001`00000000 fffff880`00000001 : nt!KiPageFault+0x16e
fffff880`066e0ed0 fffff800`032a7322 : 80000001`00000000 fffff880`00000001 00000000`00000000 00000000`00000003 : nt!ExpInterlockedPopEntrySListFault16
fffff880`066e0ee0 fffff800`032a5ca2 : 00000000`00000001 fffff8a0`038f303e fffff880`066e1240 fffff6fc`5001c798 : nt!MiResolveDemandZeroFault+0x5d2
fffff880`066e0fd0 fffff800`032a3cf1 : 00000000`00000000 fffff8a0`038f3000 00000000`00000002 00000000`00000000 : nt!MiDispatchFault+0x8c2
fffff880`066e10e0 fffff800`0328782e : 00000000`00000001 fffffa80`06260ab0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1
fffff880`066e1240 fffff800`0356f901 : fffff880`066e1780 fffff8a0`0000c310 00000000`00000001 fffffa80`0884a000 : nt!KiPageFault+0x16e
fffff880`066e13d0 fffff800`0357056a : fffffa80`06260b00 fffff8a0`038f3000 fffffa80`00002000 fffff880`066e15d0 : nt!ObpQueryNameString+0x4ed
fffff880`066e14d0 fffff800`0356fecf : fffff880`00401802 fffffa80`07996870 fffff8a0`20206f49 00000000`06ed951f : nt!ObQueryNameString+0xe
fffff880`066e1510 fffff800`03570612 : fffffa80`07996870 fffff960`00401802 00000000`00000000 fffffa80`0884a000 : nt!IopQueryNameInternal+0x9f
fffff880`066e15b0 fffff800`0356f4c4 : 00000000`00000000 fffff800`00401802 00000000`00000000 fffffa80`0884a000 : nt!IopQueryName+0x26
fffff880`066e1600 fffff800`034e4da3 : fffffa80`07996870 fffffa80`0884a000 fffff8a0`00002000 fffff880`066e1798 : nt!ObpQueryNameString+0xb0
fffff880`066e1700 fffff800`0354643e : fffffa80`086dab30 00000000`00000000 fffffa80`0875c5c0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210a4
fffff880`066e18a0 fffff800`0356ecd4 : 000007ff`fffd9000 fffff880`066e1c20 00000000`00000000 fffffa80`07955090 : nt!PspExitProcess+0x4e
fffff880`066e1900 fffff800`03547635 : 00000000`00000000 fffffa80`086dae01 000007ff`fffd9000 00000000`00000000 : nt!PspExitThread+0x834
fffff880`066e19c0 fffff800`032661db : 00000000`00000001 00000000`00000000 fffff880`00961000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`066e19f0 fffff800`03266620 : 00000000`00000000 fffff880`066e1a70 fffff800`0354774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`066e1a70 fffff800`03288a37 : fffffa80`0875c5c0 00000000`0213fb48 fffff880`066e1bc8 fffff8a0`02377060 : nt!KiInitiateUserApc+0x70
fffff880`066e1bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`03235b7a cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

Followup: MachineOwner
---------

3: kd> lmtsmn
start             end                 module name
fffff880`00f20000 fffff880`00f77000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03c76000 fffff880`03d00000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f25000 fffff880`03f3b000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff4000 fffff880`00fff000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e63000 fffff880`00e6c000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db8000 fffff880`00de2000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0294a000 fffff880`02951000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c1e000 fffff880`03c2f000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`020c8000 fffff880`020e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00770000 fffff960`00797000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`0548a000 fffff880`054a7000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`028e6000 fffff880`02910000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cce000 fffff880`00d8e000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`011cb000 fffff880`011fb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c70000 fffff880`00cce000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03f15000 fffff880`03f25000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02140000 fffff880`0214e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c00000 fffff880`03c1e000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03dd5000 fffff880`03de4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`013e7000 fffff880`013fd000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`055cd000 fffff880`055f5000   Dot4     Dot4.sys     Mon Jul 13 20:00:16 2009 (4A5BCA90)
fffff880`0541b000 fffff880`05425000   Dot4Prt  Dot4Prt.sys  Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`055bd000 fffff880`055cd000   dot4usb  dot4usb.sys  Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`0552c000 fffff880`0554e000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0215a000 fffff880`02163000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0214e000 fffff880`0215a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02163000 fffff880`02176000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05470000 fffff880`0547c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04e82000 fffff880`04f76000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04f76000 fffff880`04fbc000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01113000 fffff880`01127000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010c7000 fffff880`01113000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01191000 fffff880`011cb000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`02800000 fffff880`0284a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`037f5000 fffff800`0383e000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`028ba000 fffff880`028de000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04fbc000 fffff880`04fcd000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`05433000 fffff880`0544c000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0544c000 fffff880`05454080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05425000 fffff880`05433000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02000000 fffff880`020c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e6000 fffff880`015ef000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04463000 fffff880`04e81b60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
fffff880`05554000 fffff880`05592000   IntcDAud IntcDAud.sys Sat Sep 26 10:42:55 2009 (4ABE286F)
fffff880`03c55000 fffff880`03c6b000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03ec4000 fffff880`03f15000   k57nd60a k57nd60a.sys Fri Oct 16 06:29:38 2009 (4AD84B12)
fffff880`03ff0000 fffff880`03fff000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05455000 fffff880`05463000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc3000 fffff800`00bcd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03e11000 fffff880`03e54000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0554e000 fffff880`05553200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02176000 fffff880`0218b000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`054ac000 fffff880`054cf000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`054a7000 fffff880`054ab380   lvbflt64 lvbflt64.sys Tue Nov 09 21:36:25 2010 (4CDA0529)
fffff880`020ee000 fffff880`0213fd00   lvrs64   lvrs64.sys   Tue Nov 09 21:36:46 2010 (4CDA053E)
fffff880`05601000 fffff880`059f7a80   lvuvc64  lvuvc64.sys  Tue Nov 09 21:37:14 2010 (4CDA055A)
fffff880`00c18000 fffff880`00c5c000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0547c000 fffff880`0548a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e00000 fffff880`03e0f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05463000 fffff880`05470000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d9e000 fffff880`00db8000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02910000 fffff880`02941000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0398b000 fffff880`0399b000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`021a3000 fffff880`021bb000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`021bb000 fffff880`021e8000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0382a000 fffff880`03878000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03878000 fffff880`0389b000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`029af000 fffff880`029ba000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f80000 fffff880`00f8a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01133000 fffff880`01191000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03dca000 fffff880`03dd5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015d4000 fffff880`015e6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014da000 fffff880`015cc000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f5f000 fffff880`03f6b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f6b000 fffff880`03f9a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04fde000 fffff880`04ff3000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d2f000 fffff880`03d3e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02875000 fffff880`028ba000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`029ba000 fffff880`029cb000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03dbe000 fffff880`03dca000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03219000 fffff800`037f5000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01244000 fffff880`013e7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02941000 fffff880`0294a000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03d09000 fffff880`03d2f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fca000 fffff880`00fdf000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8a000 fffff880`00fbd000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d8e000 fffff880`00d9e000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0389b000 fffff880`03941000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`054ef000 fffff880`0552c000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5c000 fffff880`00c70000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01127000 fffff880`01132e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`03f3b000 fffff880`03f5f000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03f9a000 fffff880`03fb5000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fb5000 fffff880`03fd6000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fd6000 fffff880`03ff0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03d6d000 fffff880`03dbe000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02994000 fffff880`0299d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0299d000 fffff880`029a6000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`029a6000 fffff880`029af000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01073000 fffff880`010ad000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0218b000 fffff880`021a3000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0520c000 fffff880`053ee900   RTKVHD64 RTKVHD64.sys Tue Aug 18 05:29:10 2009 (4A8A7466)
fffff880`03941000 fffff880`0394c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`015cc000 fffff880`015d4000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05d61000 fffff880`05df7000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05cfa000 fffff880`05d61000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0394c000 fffff880`03979000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03e0f000 fffff880`03e10480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03600000 fffff880`037fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`03979000 fffff880`0398b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02868000 fffff880`02875000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0284a000 fffff880`02868000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03d59000 fffff880`03d6d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03c2f000 fffff880`03c55000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03e54000 fffff880`03e66000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`054cf000 fffff880`054e9c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05592000 fffff880`055af000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`055af000 fffff880`055b0f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04fcd000 fffff880`04fde000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e66000 fffff880`03ec0000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04400000 fffff880`04456000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`055b1000 fffff880`055bd000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`05400000 fffff880`0541b000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00fbd000 fffff880`00fca000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02951000 fffff880`0295f000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0295f000 fffff880`02984000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fdf000 fffff880`00ff4000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0148b000 fffff880`014d7000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d3e000 fffff880`03d59000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02984000 fffff880`02994000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e6d000 fffff880`00f11000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f11000 fffff880`00f20000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d00000 fffff880`03d09000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`0032f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`00f77000 fffff880`00f80000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`029cb000 fffff880`029ec000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`05c00000 fffff880`05c31000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`015ef000 fffff880`015fd000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01235000 fffff880`01241000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`010ad000 fffff880`010b6000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`00de2000 fffff880`00df5000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
23 Feb 2011   #18

Windows 7 Ultimate 32 bit
 
 

You can leave safe mode. I was looking to see if you could boot in the safe mode without crashing.
My System SpecsSystem Spec
Reply

 BSOD-Almost a year-Need help




Thread Tools



Similar help and support threads for2: BSOD-Almost a year-Need help
Thread Forum
BSOD after 1,5 year. BSOD Help and Support
BSOD's for around a year BSOD Help and Support
BSOD on 4 year old Gateway Laptop BSOD Help and Support
Persistant BSOD for almost a year ! BSOD Help and Support
BSoD for a year now. Need help BSOD Help and Support
BSOD on less than 1 year old system BSOD Help and Support
First BSOD this year ;) BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 02:46 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33