New
#11
I hope you can read them I changed permission so i could zip them
Last edited by maryneedshelp; 22 Feb 2011 at 13:52.
I hope you can read them I changed permission so i could zip them
Last edited by maryneedshelp; 22 Feb 2011 at 13:52.
Strange but I didn't see as many as I thought I would. Here are three recent.
There is a memory dmp file from today that I zipped but can't get to upload.
I do want to say thank you for all your help, this problem has been ignored too long and keeps morphing into new things!
Edit-I see why I couldn't get the memory dmp file-its 110MB. added two more minis
You are welcome for the help. I looked at all three of your dumps and only one has a short uptime. The other two have uptimes of over an hour. Your latest dump is a Driver Verifier enabled dump and it blames one of the Windows system core files, highly unlikely to be the real cause. You can turn off Driver Verifier for now, Driver Verifier - Enable and Disable. When Driver Verifier blames a Windows system file, it usually means a hardware or driver problem.
Your other two dumps are both bugcheck 24, NTFS File system.
1. Test your RAM with Memtest86. This runs outside of Windows so any Windows related problems will not affect it. Follow the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off of at least an hour. Let it run for a minimum of seven passes. This will take six to eight hours. Any errors will show on your screen in red. If you see errors you can stop the test. Post back with your results.
2. Test your hard drive with one of these bootable diagnostics. HD Diagnostic. It will run outside of Windows also. Post back with your results.
Code:Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`03450e50 Debug session time: Mon Feb 21 12:20:09.242 2011 (GMT-5) System Uptime: 0 days 1:59:35.506 Loading Kernel Symbols ............................................................... ................................................................ ........................ Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff88005211ec8, fffff88005211730, fffff880012e4173} Probably caused by : Ntfs.sys ( Ntfs!NtfsFcbTableCompare+3 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff88005211ec8 Arg3: fffff88005211730 Arg4: fffff880012e4173 Debugging Details: ------------------ EXCEPTION_RECORD: fffff88005211ec8 -- (.exr 0xfffff88005211ec8) ExceptionAddress: fffff880012e4173 (Ntfs!NtfsFcbTableCompare+0x0000000000000003) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 000000000000001f Attempt to read from address 000000000000001f CONTEXT: fffff88005211730 -- (.cxr 0xfffff88005211730) rax=002b000000035975 rbx=ffffffffffffffff rcx=fffffa8006b67640 rdx=fffff88005212168 rsi=fffffa8006b67640 rdi=0000000000000000 rip=fffff880012e4173 rsp=fffff88005212108 rbp=fffff88005212168 r8=000000000000001f r9=0000ffffffffffff r10=fffff800033fea00 r11=fffffa80062a7360 r12=0000000000000000 r13=0000000000000000 r14=fffff8a002cb9a98 r15=fffffa80070bafb8 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286 Ntfs!NtfsFcbTableCompare+0x3: fffff880`012e4173 498b08 mov rcx,qword ptr [r8] ds:002b:00000000`0000001f=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: STService.exe CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 000000000000001f READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034bb0e0 000000000000001f FOLLOWUP_IP: Ntfs!NtfsFcbTableCompare+3 fffff880`012e4173 498b08 mov rcx,qword ptr [r8] FAULTING_IP: Ntfs!NtfsFcbTableCompare+3 fffff880`012e4173 498b08 mov rcx,qword ptr [r8] BUGCHECK_STR: 0x24 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff880012e4173 STACK_TEXT: fffff880`05212108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFcbTableCompare+0x3 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Ntfs!NtfsFcbTableCompare+3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f STACK_COMMAND: .cxr 0xfffff88005211730 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFcbTableCompare+3 BUCKET_ID: X64_0x24_Ntfs!NtfsFcbTableCompare+3 Followup: MachineOwner --------- Debug session time: Mon Feb 21 14:39:26.008 2011 (GMT-5) System Uptime: 0 days 0:00:34.647 Loading Kernel Symbols ............................................................... ................................................................ ..................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff88002263238, fffff88002262aa0, fffff800032eaf39} Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for mfehidk.sys *** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+836 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff88002263238 Arg3: fffff88002262aa0 Arg4: fffff800032eaf39 Debugging Details: ------------------ EXCEPTION_RECORD: fffff88002263238 -- (.exr 0xfffff88002263238) ExceptionAddress: fffff800032eaf39 (nt!ExIsResourceAcquiredSharedLite+0x0000000000000079) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 00000000001a6f0c Attempt to read from address 00000000001a6f0c CONTEXT: fffff88002262aa0 -- (.cxr 0xfffff88002262aa0) rax=00000000001a6f04 rbx=fffffa80061afe48 rcx=fffffa80061afe48 rdx=fffffa8006b43180 rsi=fffffa80085e3b60 rdi=0000000000000000 rip=fffff800032eaf39 rsp=fffff88002263470 rbp=0000000000000003 r8=0000000000000000 r9=0000000000076000 r10=fffffa80091c03f8 r11=fffff88002263678 r12=0000000000060001 r13=0000000000000001 r14=fffff880022636e8 r15=fffff88002263670 iopl=0 nv up di pl nz na pe nc cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010002 nt!ExIsResourceAcquiredSharedLite+0x79: fffff800`032eaf39 8b5008 mov edx,dword ptr [rax+8] ds:002b:00000000`001a6f0c=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: audiodg.exe CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 00000000001a6f0c READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350d0e0 00000000001a6f0c FOLLOWUP_IP: Ntfs!NtfsCommonRead+836 fffff880`0122c5b6 85c0 test eax,eax FAULTING_IP: nt!ExIsResourceAcquiredSharedLite+79 fffff800`032eaf39 8b5008 mov edx,dword ptr [rax+8] BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from fffff8800122c5b6 to fffff800032eaf39 STACK_TEXT: fffff880`02263470 fffff880`0122c5b6 : fffff8a0`02196140 fffff880`022637c0 fffff8a0`021a10a0 fffff8a0`02196010 : nt!ExIsResourceAcquiredSharedLite+0x79 fffff880`022634a0 fffff880`0122ef78 : fffff880`02263670 fffffa80`091c0010 fffff880`02263701 fffffa80`07127201 : Ntfs!NtfsCommonRead+0x836 fffff880`02263640 fffff880`0100a23f : fffffa80`091c03f8 fffffa80`091c0010 fffffa80`07127220 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8 fffff880`02263840 fffff880`010086df : fffffa80`079ae040 fffffa80`091c0010 fffffa80`079ae000 fffffa80`091c0010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`022638d0 fffff880`010af204 : fffffa80`091c0010 fffffa80`0741e300 fffffa80`091c0010 00000000`00000043 : fltmgr!FltpDispatch+0xcf fffff880`02263930 fffffa80`091c0010 : fffffa80`0741e300 fffffa80`091c0010 00000000`00000043 fa80091b`66680420 : mfehidk+0x48204 fffff880`02263938 fffffa80`0741e300 : fffffa80`091c0010 00000000`00000043 fa80091b`66680420 00000000`000007ff : 0xfffffa80`091c0010 fffff880`02263940 fffffa80`091c0010 : 00000000`00000043 fa80091b`66680420 00000000`000007ff fffffa80`079c0640 : 0xfffffa80`0741e300 fffff880`02263948 00000000`00000043 : fa80091b`66680420 00000000`000007ff fffffa80`079c0640 fffffa80`079ae040 : 0xfffffa80`091c0010 fffff880`02263950 fa80091b`66680420 : 00000000`000007ff fffffa80`079c0640 fffffa80`079ae040 fffffa80`091c0010 : 0x43 fffff880`02263958 00000000`000007ff : fffffa80`079c0640 fffffa80`079ae040 fffffa80`091c0010 fffffa80`091c03f8 : 0xfa80091b`66680420 fffff880`02263960 fffffa80`079c0640 : fffffa80`079ae040 fffffa80`091c0010 fffffa80`091c03f8 ff0c0101`55555555 : 0x7ff fffff880`02263968 fffffa80`079ae040 : fffffa80`091c0010 fffffa80`091c03f8 ff0c0101`55555555 fffffa80`0741e3e0 : 0xfffffa80`079c0640 fffff880`02263970 fffffa80`091c0010 : fffffa80`091c03f8 ff0c0101`55555555 fffffa80`0741e3e0 fffffa80`0741e3e0 : 0xfffffa80`079ae040 fffff880`02263978 fffffa80`091c03f8 : ff0c0101`55555555 fffffa80`0741e3e0 fffffa80`0741e3e0 fffff800`032c71f2 : 0xfffffa80`091c0010 fffff880`02263980 ff0c0101`55555555 : fffffa80`0741e3e0 fffffa80`0741e3e0 fffff800`032c71f2 fffffa80`091c0030 : 0xfffffa80`091c03f8 fffff880`02263988 fffffa80`0741e3e0 : fffffa80`0741e3e0 fffff800`032c71f2 fffffa80`091c0030 fffffa80`091c0b20 : 0xff0c0101`55555555 fffff880`02263990 fffffa80`0741e3e0 : fffff800`032c71f2 fffffa80`091c0030 fffffa80`091c0b20 00000000`00000043 : 0xfffffa80`0741e3e0 fffff880`02263998 fffff800`032c71f2 : fffffa80`091c0030 fffffa80`091c0b20 00000000`00000043 fffff800`032a6e1a : 0xfffffa80`0741e3e0 fffff880`022639a0 fffff800`032c74f5 : 00000000`00000001 00000000`00000001 fffff880`02263a60 00000000`00000021 : nt!IoPageRead+0x252 fffff880`02263a30 fffff800`032f08bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255 fffff880`02263ac0 fffff800`032d382e : 00000000`00000000 00000000`0001759c 00000000`00ddc201 00000000`00ddc220 : nt!MmAccessFault+0x14bb fffff880`02263c20 00000000`773851df : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e 00000000`00ddb640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773851df SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: Ntfs!NtfsCommonRead+836 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f STACK_COMMAND: .cxr 0xfffff88002262aa0 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonRead+836 BUCKET_ID: X64_0x24_Ntfs!NtfsCommonRead+836 Followup: MachineOwner --------- Debug session time: Tue Feb 22 12:45:43.036 2011 (GMT-5) System Uptime: 0 days 1:03:54.675 Loading Kernel Symbols ............................................................... ................................................................ .................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C4, {91, 0, fffffa80074ba380, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4904 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_DETECTED_VIOLATION (c4) A device driver attempting to corrupt the system has been caught. This is because the driver was specified in the registry as being suspect (by the administrator) and the kernel has enabled substantial checking of this driver. If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will be among the most commonly seen crashes. Arguments: Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by the operating system. The only supported way to extend a kernel mode stack is by using KeExpandKernelStackAndCallout. Arg2: 0000000000000000 Arg3: fffffa80074ba380 Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc4_91 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: STService.exe CURRENT_IRQL: 0 EXCEPTION_RECORD: fffff88006169f68 -- (.exr 0xfffff88006169f68) ExceptionAddress: fffff88001260c4d (Ntfs!NtfsLookupNameLengthViaLcb+0x000000000000003d) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000020 Attempt to read from address 0000000000000020 TRAP_FRAME: fffff8800616a010 -- (.trap 0xfffff8800616a010) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00d2d5010 rdx=fffff8800616a230 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001260c4d rsp=fffff8800616a1a8 rbp=fffffa80058fc4b0 r8=0000000000000036 r9=0000000000000020 r10=fffff800033fea00 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po nc Ntfs!NtfsLookupNameLengthViaLcb+0x3d: fffff880`01260c4d 4d3909 cmp qword ptr [r9],r9 ds:00000000`00000020=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800032d824a to fffff80003283740 STACK_TEXT: fffff880`06169078 fffff800`032d824a : 00000000`000000c4 00000000`00000091 00000000`00000000 fffffa80`074ba380 : nt!KeBugCheckEx fffff880`06169080 fffff800`032b06b3 : fffffa80`00000002 00000000`00004000 fffff880`00000003 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4904 fffff880`061690c0 fffff800`032bd9ef : fffff880`06169f68 fffff880`06169cd0 fffff880`0616a010 00000000`00000000 : nt!RtlDispatchException+0x33 fffff880`061697a0 fffff800`03282d82 : fffff880`06169f68 00000000`00000000 fffff880`0616a010 fffffa80`05a91370 : nt!KiDispatchException+0x16f fffff880`06169e30 fffff800`032818fa : 00000000`00000000 00000000`00000000 fffff880`0616a000 fffff880`01292d80 : nt!KiExceptionDispatch+0xc2 fffff880`0616a010 fffff880`01260c4d : fffff880`01260e93 00000000`00000000 fffffa80`058fc4b0 fffffa80`05a91370 : nt!KiPageFault+0x23a fffff880`0616a1a8 fffff880`01260e93 : 00000000`00000000 fffffa80`058fc4b0 fffffa80`05a91370 fffff800`03589942 : Ntfs!NtfsLookupNameLengthViaLcb+0x3d fffff880`0616a1b0 fffff880`01261b41 : fffffa80`05ae9700 00000000`00000000 fffffa80`05a91300 00000000`000007ff : Ntfs!NtfsConstructFilePath+0x123 fffff880`0616a230 fffff880`012f28cd : fffff980`021c3800 fffffa80`05ae9780 00000000`00000000 00000000`0000000e : Ntfs!NtfsAttachRepairInfoPriv+0x1a1 fffff880`0616a290 fffff880`012e84dc : fffffa80`05ae9780 fffffa80`06484180 fffff8a0`0d2d5018 fffffa80`05d52701 : Ntfs!NtfsReadMftRecord+0x45c fffff880`0616a340 fffff880`012e9498 : fffff880`0616a4e8 fffff8a0`0d2d5140 fffff880`0616a8e0 00000001`00000000 : Ntfs!NtfsLookupInFileRecord+0x6c fffff880`0616a3d0 fffff880`012afa24 : fffffa80`05ae9780 fffff8a0`0d2d5100 00000000`00000000 00000000`00000001 : Ntfs!NtfsWriteFileSizes+0xa8 fffff880`0616a530 fffff880`01251b7c : fffffa80`05ae9780 fffffa80`06484180 fffffa80`058fc401 fffffa80`058fc400 : Ntfs!NtfsFlushVolume+0x304 fffff880`0616a660 fffff880`01245bed : fffffa80`05ae9780 fffff880`01070d01 fffffa80`079d09c0 fffff880`0616a700 : Ntfs!NtfsVolumeDasdIo+0x1dc fffff880`0616a710 fffff880`01246f78 : fffffa80`05ae9780 fffffa80`05628c10 fffff880`0616a801 fffffa80`0654ad00 : Ntfs!NtfsCommonRead+0x1e61 fffff880`0616a8b0 fffff880`0106423f : fffffa80`05628fb0 fffffa80`05628c10 fffffa80`0654ad30 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8 fffff880`0616a960 fffff880`010626df : fffffa80`063df7b0 00000000`00000001 fffffa80`063df700 fffffa80`05628c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`0616a9f0 fffff800`03599ca9 : 00000000`00000000 fffffa80`058fc4b0 00000000`00000001 fffffa80`05628c10 : fltmgr!FltpDispatch+0xcf fffff880`0616aa50 fffff800`035a14a3 : fffffa80`058fc4b0 fffffa80`058fc4b0 fffffa80`058fc4b0 fffff800`033fde80 : nt!IopSynchronousServiceTail+0xf9 fffff880`0616aac0 fffff800`03282993 : fffffa80`075f0340 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631 fffff880`0616abb0 00000000`00222dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0608ebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x222dd9 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4904 fffff800`032d824a cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4904 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904 BUCKET_ID: X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904 Followup: MachineOwner ---------
Started up today with no crashes. Just two errors regarding HP and Microsoft Anitalware in event viewer.
Ran all afternoon and night with no errors using Memtest 86.
Typed in verifier into start box and nothing came up. Is this something that I recently added or that I should have had originally?
Am going to attemp the hard drive diagnostics now.
I passed the seatools long and short tests.
I had a shut down before the test and after the test when i rebooted-.dmp files attached.
I haven't done running in safe mode yet, will do next.
Since I'm not sure what triggers the crashes I'm not sure what things to be doing or how long to stay in safe mode? So far 2 hours no crashes.
Driver Verifier is a built in tool that the machine owner enables and disables. Here is a tutorial on Verifier: Driver Verifier - Enable and Disable. Right now, you should have it disabled.
Both dumps are bucheck 1A, Memory Management and both blame ntkrnlmp.exe, one of the Windows system core files and highly unlikely to be the cause. Both crashes occurred with short uptimes, 2 min 19.9 sec and 0 min 40.3 sec, respectively. This indicates a hardware or driver problem.
To summarize, your drivers appear up to date. You ran Memtest86 with no errors. You ran Check Disk and it found no problems. You have run SeaTools, long and short, and it detected no problems. Driver Verifier enabled dumps blamed Windows system files. Your application crash log shows the McAfee crashed when you running McAfee and it now shows MSE has crashed.
Am I correct in assuming most of your BSOD's occur at shutdown and boot up?
I recommend that you test your CPU and your RAM with Prime95. Carefully follow the instructions in this tutorial: https://www.sevenforums.com/tutorials...t-prime95.html. Run 3 separate tests, one on each of the settings (Blend, Small FFTs, Large FFTs). Post back with your results.
Do you have access to another power supply that you could try? Is your computer under warranty?
Code:Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50 Debug session time: Wed Feb 23 11:35:44.084 2011 (GMT-5) System Uptime: 0 days 0:00:40.348 Loading Kernel Symbols ............................................................... ................................................................ .................. Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41287, 14e00b, 0, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041287, The subtype of the bugcheck. Arg2: 000000000014e00b Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41287 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: vdsldr.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff880066e1240 -- (.trap 0xfffff880066e1240) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000020 rbx=0000000000000000 rcx=fffff8a0038f303e rdx=fffff8a00000c2f0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000356f901 rsp=fffff880066e13d0 rbp=fffff880066e1780 r8=0000000000002000 r9=fffff880066e15d0 r10=0000000000000000 r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac pe nc nt!ObpQueryNameString+0x4ed: fffff800`0356f901 668939 mov word ptr [rcx],di ds:56b0:fffff8a0`038f303e=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003235b7a to fffff80003289740 STACK_TEXT: fffff880`066e0bd8 fffff800`03235b7a : 00000000`0000001a 00000000`00041287 00000000`0014e00b 00000000`00000000 : nt!KeBugCheckEx fffff880`066e0be0 fffff800`0328782e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`03418888 : nt! ?? ::FNODOBFM::`string'+0x42ba5 fffff880`066e0d40 fffff800`0328c905 : 00000000`00000000 fffff800`032a7322 80000001`00000000 fffff880`00000001 : nt!KiPageFault+0x16e fffff880`066e0ed0 fffff800`032a7322 : 80000001`00000000 fffff880`00000001 00000000`00000000 00000000`00000003 : nt!ExpInterlockedPopEntrySListFault16 fffff880`066e0ee0 fffff800`032a5ca2 : 00000000`00000001 fffff8a0`038f303e fffff880`066e1240 fffff6fc`5001c798 : nt!MiResolveDemandZeroFault+0x5d2 fffff880`066e0fd0 fffff800`032a3cf1 : 00000000`00000000 fffff8a0`038f3000 00000000`00000002 00000000`00000000 : nt!MiDispatchFault+0x8c2 fffff880`066e10e0 fffff800`0328782e : 00000000`00000001 fffffa80`06260ab0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1 fffff880`066e1240 fffff800`0356f901 : fffff880`066e1780 fffff8a0`0000c310 00000000`00000001 fffffa80`0884a000 : nt!KiPageFault+0x16e fffff880`066e13d0 fffff800`0357056a : fffffa80`06260b00 fffff8a0`038f3000 fffffa80`00002000 fffff880`066e15d0 : nt!ObpQueryNameString+0x4ed fffff880`066e14d0 fffff800`0356fecf : fffff880`00401802 fffffa80`07996870 fffff8a0`20206f49 00000000`06ed951f : nt!ObQueryNameString+0xe fffff880`066e1510 fffff800`03570612 : fffffa80`07996870 fffff960`00401802 00000000`00000000 fffffa80`0884a000 : nt!IopQueryNameInternal+0x9f fffff880`066e15b0 fffff800`0356f4c4 : 00000000`00000000 fffff800`00401802 00000000`00000000 fffffa80`0884a000 : nt!IopQueryName+0x26 fffff880`066e1600 fffff800`034e4da3 : fffffa80`07996870 fffffa80`0884a000 fffff8a0`00002000 fffff880`066e1798 : nt!ObpQueryNameString+0xb0 fffff880`066e1700 fffff800`0354643e : fffffa80`086dab30 00000000`00000000 fffffa80`0875c5c0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210a4 fffff880`066e18a0 fffff800`0356ecd4 : 000007ff`fffd9000 fffff880`066e1c20 00000000`00000000 fffffa80`07955090 : nt!PspExitProcess+0x4e fffff880`066e1900 fffff800`03547635 : 00000000`00000000 fffffa80`086dae01 000007ff`fffd9000 00000000`00000000 : nt!PspExitThread+0x834 fffff880`066e19c0 fffff800`032661db : 00000000`00000001 00000000`00000000 fffff880`00961000 00000000`00000000 : nt!PsExitSpecialApc+0x1d fffff880`066e19f0 fffff800`03266620 : 00000000`00000000 fffff880`066e1a70 fffff800`0354774c 00000000`00000001 : nt!KiDeliverApc+0x2eb fffff880`066e1a70 fffff800`03288a37 : fffffa80`0875c5c0 00000000`0213fb48 fffff880`066e1bc8 fffff8a0`02377060 : nt!KiInitiateUserApc+0x70 fffff880`066e1bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+42ba5 fffff800`03235b7a cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42ba5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5 BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5 Followup: MachineOwner --------- 3: kd> lmtsmn start end module name fffff880`00f20000 fffff880`00f77000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`03c76000 fffff880`03d00000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`03f25000 fffff880`03f3b000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`00ff4000 fffff880`00fff000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`00e63000 fffff880`00e6c000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00db8000 fffff880`00de2000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`0294a000 fffff880`02951000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03c1e000 fffff880`03c2f000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`020c8000 fffff880`020e6000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00770000 fffff960`00797000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A) fffff880`0548a000 fffff880`054a7000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112) fffff880`028e6000 fffff880`02910000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00cce000 fffff880`00d8e000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`011cb000 fffff880`011fb000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c70000 fffff880`00cce000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`03f15000 fffff880`03f25000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`02140000 fffff880`0214e000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03c00000 fffff880`03c1e000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`03dd5000 fffff880`03de4000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`013e7000 fffff880`013fd000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`055cd000 fffff880`055f5000 Dot4 Dot4.sys Mon Jul 13 20:00:16 2009 (4A5BCA90) fffff880`0541b000 fffff880`05425000 Dot4Prt Dot4Prt.sys Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`055bd000 fffff880`055cd000 dot4usb dot4usb.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`0552c000 fffff880`0554e000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`0215a000 fffff880`02163000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`0214e000 fffff880`0215a000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`02163000 fffff880`02176000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`05470000 fffff880`0547c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`04e82000 fffff880`04f76000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`04f76000 fffff880`04fbc000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`01113000 fffff880`01127000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`010c7000 fffff880`01113000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01191000 fffff880`011cb000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`02800000 fffff880`0284a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`037f5000 fffff800`0383e000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`028ba000 fffff880`028de000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`04fbc000 fffff880`04fcd000 HECIx64 HECIx64.sys Thu Sep 17 15:54:16 2009 (4AB293E8) fffff880`05433000 fffff880`0544c000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`0544c000 fffff880`05454080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`05425000 fffff880`05433000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`02000000 fffff880`020c8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`015e6000 fffff880`015ef000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`04463000 fffff880`04e81b60 igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E) fffff880`05554000 fffff880`05592000 IntcDAud IntcDAud.sys Sat Sep 26 10:42:55 2009 (4ABE286F) fffff880`03c55000 fffff880`03c6b000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`03ec4000 fffff880`03f15000 k57nd60a k57nd60a.sys Fri Oct 16 06:29:38 2009 (4AD84B12) fffff880`03ff0000 fffff880`03fff000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`05455000 fffff880`05463000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bc3000 fffff800`00bcd000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`03e11000 fffff880`03e54000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`0554e000 fffff880`05553200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`02176000 fffff880`0218b000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`054ac000 fffff880`054cf000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`054a7000 fffff880`054ab380 lvbflt64 lvbflt64.sys Tue Nov 09 21:36:25 2010 (4CDA0529) fffff880`020ee000 fffff880`0213fd00 lvrs64 lvrs64.sys Tue Nov 09 21:36:46 2010 (4CDA053E) fffff880`05601000 fffff880`059f7a80 lvuvc64 lvuvc64.sys Tue Nov 09 21:37:14 2010 (4CDA055A) fffff880`00c18000 fffff880`00c5c000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`0547c000 fffff880`0548a000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`03e00000 fffff880`03e0f000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`05463000 fffff880`05470000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00d9e000 fffff880`00db8000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02910000 fffff880`02941000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110) fffff880`0398b000 fffff880`0399b000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112) fffff880`021a3000 fffff880`021bb000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`021bb000 fffff880`021e8000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`0382a000 fffff880`03878000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`03878000 fffff880`0389b000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`029af000 fffff880`029ba000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f80000 fffff880`00f8a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`01133000 fffff880`01191000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03dca000 fffff880`03dd5000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`015d4000 fffff880`015e6000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`014da000 fffff880`015cc000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`03f5f000 fffff880`03f6b000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`03f6b000 fffff880`03f9a000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04fde000 fffff880`04ff3000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`03d2f000 fffff880`03d3e000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02875000 fffff880`028ba000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`029ba000 fffff880`029cb000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03dbe000 fffff880`03dca000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`03219000 fffff800`037f5000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`01244000 fffff880`013e7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`02941000 fffff880`0294a000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`03d09000 fffff880`03d2f000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00fca000 fffff880`00fdf000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f8a000 fffff880`00fbd000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00e5c000 fffff880`00e63000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00d8e000 fffff880`00d9e000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`0389b000 fffff880`03941000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`054ef000 fffff880`0552c000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c5c000 fffff880`00c70000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`01127000 fffff880`01132e00 PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253) fffff880`03f3b000 fffff880`03f5f000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`03f9a000 fffff880`03fb5000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`03fb5000 fffff880`03fd6000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`03fd6000 fffff880`03ff0000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`03d6d000 fffff880`03dbe000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`02994000 fffff880`0299d000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`0299d000 fffff880`029a6000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`029a6000 fffff880`029af000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01073000 fffff880`010ad000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`0218b000 fffff880`021a3000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`0520c000 fffff880`053ee900 RTKVHD64 RTKVHD64.sys Tue Aug 18 05:29:10 2009 (4A8A7466) fffff880`03941000 fffff880`0394c000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`015cc000 fffff880`015d4000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`05d61000 fffff880`05df7000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`05cfa000 fffff880`05d61000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`0394c000 fffff880`03979000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`03e0f000 fffff880`03e10480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`03600000 fffff880`037fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`03979000 fffff880`0398b000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02868000 fffff880`02875000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`0284a000 fffff880`02868000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`03d59000 fffff880`03d6d000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00480000 fffff960`0048a000 TSDDD TSDDD.dll unavailable (00000000) fffff880`03c2f000 fffff880`03c55000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`03e54000 fffff880`03e66000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`054cf000 fffff880`054e9c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`05592000 fffff880`055af000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`055af000 fffff880`055b0f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`04fcd000 fffff880`04fde000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03e66000 fffff880`03ec0000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D) fffff880`04400000 fffff880`04456000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`055b1000 fffff880`055bd000 usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A) fffff880`05400000 fffff880`0541b000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`00fbd000 fffff880`00fca000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`02951000 fffff880`0295f000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`0295f000 fffff880`02984000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`00fdf000 fffff880`00ff4000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`0148b000 fffff880`014d7000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`03d3e000 fffff880`03d59000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02984000 fffff880`02994000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e6d000 fffff880`00f11000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f11000 fffff880`00f20000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`03d00000 fffff880`03d09000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00020000 fffff960`0032f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C) fffff880`00f77000 fffff880`00f80000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`029cb000 fffff880`029ec000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`05c00000 fffff880`05c31000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE) Unloaded modules: fffff880`015ef000 fffff880`015fd000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01235000 fffff880`01241000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`010ad000 fffff880`010b6000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`00de2000 fffff880`00df5000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
You can leave safe mode. I was looking to see if you could boot in the safe mode without crashing.