BSOD-Almost a year-Need help

Page 2 of 2 FirstFirst 12

  1. Posts : 12
    windows7 64bit
    Thread Starter
       #11

    I hope you can read them I changed permission so i could zip them
    Last edited by maryneedshelp; 22 Feb 2011 at 13:52.
      My Computer


  2. Posts : 12
    windows7 64bit
    Thread Starter
       #12

    more dump files


    Strange but I didn't see as many as I thought I would. Here are three recent.
    There is a memory dmp file from today that I zipped but can't get to upload.

    I do want to say thank you for all your help, this problem has been ignored too long and keeps morphing into new things!

    Edit-I see why I couldn't get the memory dmp file-its 110MB. added two more minis
      My Computer


  3. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #13

    You are welcome for the help. I looked at all three of your dumps and only one has a short uptime. The other two have uptimes of over an hour. Your latest dump is a Driver Verifier enabled dump and it blames one of the Windows system core files, highly unlikely to be the real cause. You can turn off Driver Verifier for now, Driver Verifier - Enable and Disable. When Driver Verifier blames a Windows system file, it usually means a hardware or driver problem.

    Your other two dumps are both bugcheck 24, NTFS File system.

    1. Test your RAM with Memtest86. This runs outside of Windows so any Windows related problems will not affect it. Follow the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off of at least an hour. Let it run for a minimum of seven passes. This will take six to eight hours. Any errors will show on your screen in red. If you see errors you can stop the test. Post back with your results.

    2. Test your hard drive with one of these bootable diagnostics. HD Diagnostic. It will run outside of Windows also. Post back with your results.

    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03213000 PsLoadedModuleList = 0xfffff800`03450e50
    Debug session time: Mon Feb 21 12:20:09.242 2011 (GMT-5)
    System Uptime: 0 days 1:59:35.506
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff88005211ec8, fffff88005211730, fffff880012e4173}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsFcbTableCompare+3 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff88005211ec8
    Arg3: fffff88005211730
    Arg4: fffff880012e4173
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff88005211ec8 -- (.exr 0xfffff88005211ec8)
    ExceptionAddress: fffff880012e4173 (Ntfs!NtfsFcbTableCompare+0x0000000000000003)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 000000000000001f
    Attempt to read from address 000000000000001f
    
    CONTEXT:  fffff88005211730 -- (.cxr 0xfffff88005211730)
    rax=002b000000035975 rbx=ffffffffffffffff rcx=fffffa8006b67640
    rdx=fffff88005212168 rsi=fffffa8006b67640 rdi=0000000000000000
    rip=fffff880012e4173 rsp=fffff88005212108 rbp=fffff88005212168
     r8=000000000000001f  r9=0000ffffffffffff r10=fffff800033fea00
    r11=fffffa80062a7360 r12=0000000000000000 r13=0000000000000000
    r14=fffff8a002cb9a98 r15=fffffa80070bafb8
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    Ntfs!NtfsFcbTableCompare+0x3:
    fffff880`012e4173 498b08          mov     rcx,qword ptr [r8] ds:002b:00000000`0000001f=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  STService.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  000000000000001f
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034bb0e0
     000000000000001f 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsFcbTableCompare+3
    fffff880`012e4173 498b08          mov     rcx,qword ptr [r8]
    
    FAULTING_IP: 
    Ntfs!NtfsFcbTableCompare+3
    fffff880`012e4173 498b08          mov     rcx,qword ptr [r8]
    
    BUGCHECK_STR:  0x24
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880012e4173
    
    STACK_TEXT:  
    fffff880`05212108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFcbTableCompare+0x3
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsFcbTableCompare+3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff88005211730 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFcbTableCompare+3
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsFcbTableCompare+3
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Mon Feb 21 14:39:26.008 2011 (GMT-5)
    System Uptime: 0 days 0:00:34.647
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff88002263238, fffff88002262aa0, fffff800032eaf39}
    
    Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for mfehidk.sys
    *** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
    Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+836 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff88002263238
    Arg3: fffff88002262aa0
    Arg4: fffff800032eaf39
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff88002263238 -- (.exr 0xfffff88002263238)
    ExceptionAddress: fffff800032eaf39 (nt!ExIsResourceAcquiredSharedLite+0x0000000000000079)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 00000000001a6f0c
    Attempt to read from address 00000000001a6f0c
    
    CONTEXT:  fffff88002262aa0 -- (.cxr 0xfffff88002262aa0)
    rax=00000000001a6f04 rbx=fffffa80061afe48 rcx=fffffa80061afe48
    rdx=fffffa8006b43180 rsi=fffffa80085e3b60 rdi=0000000000000000
    rip=fffff800032eaf39 rsp=fffff88002263470 rbp=0000000000000003
     r8=0000000000000000  r9=0000000000076000 r10=fffffa80091c03f8
    r11=fffff88002263678 r12=0000000000060001 r13=0000000000000001
    r14=fffff880022636e8 r15=fffff88002263670
    iopl=0         nv up di pl nz na pe nc
    cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010002
    nt!ExIsResourceAcquiredSharedLite+0x79:
    fffff800`032eaf39 8b5008          mov     edx,dword ptr [rax+8] ds:002b:00000000`001a6f0c=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  audiodg.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  00000000001a6f0c
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350d0e0
     00000000001a6f0c 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsCommonRead+836
    fffff880`0122c5b6 85c0            test    eax,eax
    
    FAULTING_IP: 
    nt!ExIsResourceAcquiredSharedLite+79
    fffff800`032eaf39 8b5008          mov     edx,dword ptr [rax+8]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff8800122c5b6 to fffff800032eaf39
    
    STACK_TEXT:  
    fffff880`02263470 fffff880`0122c5b6 : fffff8a0`02196140 fffff880`022637c0 fffff8a0`021a10a0 fffff8a0`02196010 : nt!ExIsResourceAcquiredSharedLite+0x79
    fffff880`022634a0 fffff880`0122ef78 : fffff880`02263670 fffffa80`091c0010 fffff880`02263701 fffffa80`07127201 : Ntfs!NtfsCommonRead+0x836
    fffff880`02263640 fffff880`0100a23f : fffffa80`091c03f8 fffffa80`091c0010 fffffa80`07127220 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
    fffff880`02263840 fffff880`010086df : fffffa80`079ae040 fffffa80`091c0010 fffffa80`079ae000 fffffa80`091c0010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`022638d0 fffff880`010af204 : fffffa80`091c0010 fffffa80`0741e300 fffffa80`091c0010 00000000`00000043 : fltmgr!FltpDispatch+0xcf
    fffff880`02263930 fffffa80`091c0010 : fffffa80`0741e300 fffffa80`091c0010 00000000`00000043 fa80091b`66680420 : mfehidk+0x48204
    fffff880`02263938 fffffa80`0741e300 : fffffa80`091c0010 00000000`00000043 fa80091b`66680420 00000000`000007ff : 0xfffffa80`091c0010
    fffff880`02263940 fffffa80`091c0010 : 00000000`00000043 fa80091b`66680420 00000000`000007ff fffffa80`079c0640 : 0xfffffa80`0741e300
    fffff880`02263948 00000000`00000043 : fa80091b`66680420 00000000`000007ff fffffa80`079c0640 fffffa80`079ae040 : 0xfffffa80`091c0010
    fffff880`02263950 fa80091b`66680420 : 00000000`000007ff fffffa80`079c0640 fffffa80`079ae040 fffffa80`091c0010 : 0x43
    fffff880`02263958 00000000`000007ff : fffffa80`079c0640 fffffa80`079ae040 fffffa80`091c0010 fffffa80`091c03f8 : 0xfa80091b`66680420
    fffff880`02263960 fffffa80`079c0640 : fffffa80`079ae040 fffffa80`091c0010 fffffa80`091c03f8 ff0c0101`55555555 : 0x7ff
    fffff880`02263968 fffffa80`079ae040 : fffffa80`091c0010 fffffa80`091c03f8 ff0c0101`55555555 fffffa80`0741e3e0 : 0xfffffa80`079c0640
    fffff880`02263970 fffffa80`091c0010 : fffffa80`091c03f8 ff0c0101`55555555 fffffa80`0741e3e0 fffffa80`0741e3e0 : 0xfffffa80`079ae040
    fffff880`02263978 fffffa80`091c03f8 : ff0c0101`55555555 fffffa80`0741e3e0 fffffa80`0741e3e0 fffff800`032c71f2 : 0xfffffa80`091c0010
    fffff880`02263980 ff0c0101`55555555 : fffffa80`0741e3e0 fffffa80`0741e3e0 fffff800`032c71f2 fffffa80`091c0030 : 0xfffffa80`091c03f8
    fffff880`02263988 fffffa80`0741e3e0 : fffffa80`0741e3e0 fffff800`032c71f2 fffffa80`091c0030 fffffa80`091c0b20 : 0xff0c0101`55555555
    fffff880`02263990 fffffa80`0741e3e0 : fffff800`032c71f2 fffffa80`091c0030 fffffa80`091c0b20 00000000`00000043 : 0xfffffa80`0741e3e0
    fffff880`02263998 fffff800`032c71f2 : fffffa80`091c0030 fffffa80`091c0b20 00000000`00000043 fffff800`032a6e1a : 0xfffffa80`0741e3e0
    fffff880`022639a0 fffff800`032c74f5 : 00000000`00000001 00000000`00000001 fffff880`02263a60 00000000`00000021 : nt!IoPageRead+0x252
    fffff880`02263a30 fffff800`032f08bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
    fffff880`02263ac0 fffff800`032d382e : 00000000`00000000 00000000`0001759c 00000000`00ddc201 00000000`00ddc220 : nt!MmAccessFault+0x14bb
    fffff880`02263c20 00000000`773851df : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`00ddb640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773851df
    
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  Ntfs!NtfsCommonRead+836
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff88002262aa0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonRead+836
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonRead+836
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Tue Feb 22 12:45:43.036 2011 (GMT-5)
    System Uptime: 0 days 1:03:54.675
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C4, {91, 0, fffffa80074ba380, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4904 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
    A device driver attempting to corrupt the system has been caught.  This is
    because the driver was specified in the registry as being suspect (by the
    administrator) and the kernel has enabled substantial checking of this driver.
    If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
    be among the most commonly seen crashes.
    Arguments:
    Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
        the operating system. The only supported way to extend a kernel
        mode stack is by using KeExpandKernelStackAndCallout.
    Arg2: 0000000000000000
    Arg3: fffffa80074ba380
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xc4_91
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  STService.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88006169f68 -- (.exr 0xfffff88006169f68)
    ExceptionAddress: fffff88001260c4d (Ntfs!NtfsLookupNameLengthViaLcb+0x000000000000003d)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 0000000000000020
    Attempt to read from address 0000000000000020
    
    TRAP_FRAME:  fffff8800616a010 -- (.trap 0xfffff8800616a010)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00d2d5010
    rdx=fffff8800616a230 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001260c4d rsp=fffff8800616a1a8 rbp=fffffa80058fc4b0
     r8=0000000000000036  r9=0000000000000020 r10=fffff800033fea00
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po nc
    Ntfs!NtfsLookupNameLengthViaLcb+0x3d:
    fffff880`01260c4d 4d3909          cmp     qword ptr [r9],r9 ds:00000000`00000020=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032d824a to fffff80003283740
    
    STACK_TEXT:  
    fffff880`06169078 fffff800`032d824a : 00000000`000000c4 00000000`00000091 00000000`00000000 fffffa80`074ba380 : nt!KeBugCheckEx
    fffff880`06169080 fffff800`032b06b3 : fffffa80`00000002 00000000`00004000 fffff880`00000003 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4904
    fffff880`061690c0 fffff800`032bd9ef : fffff880`06169f68 fffff880`06169cd0 fffff880`0616a010 00000000`00000000 : nt!RtlDispatchException+0x33
    fffff880`061697a0 fffff800`03282d82 : fffff880`06169f68 00000000`00000000 fffff880`0616a010 fffffa80`05a91370 : nt!KiDispatchException+0x16f
    fffff880`06169e30 fffff800`032818fa : 00000000`00000000 00000000`00000000 fffff880`0616a000 fffff880`01292d80 : nt!KiExceptionDispatch+0xc2
    fffff880`0616a010 fffff880`01260c4d : fffff880`01260e93 00000000`00000000 fffffa80`058fc4b0 fffffa80`05a91370 : nt!KiPageFault+0x23a
    fffff880`0616a1a8 fffff880`01260e93 : 00000000`00000000 fffffa80`058fc4b0 fffffa80`05a91370 fffff800`03589942 : Ntfs!NtfsLookupNameLengthViaLcb+0x3d
    fffff880`0616a1b0 fffff880`01261b41 : fffffa80`05ae9700 00000000`00000000 fffffa80`05a91300 00000000`000007ff : Ntfs!NtfsConstructFilePath+0x123
    fffff880`0616a230 fffff880`012f28cd : fffff980`021c3800 fffffa80`05ae9780 00000000`00000000 00000000`0000000e : Ntfs!NtfsAttachRepairInfoPriv+0x1a1
    fffff880`0616a290 fffff880`012e84dc : fffffa80`05ae9780 fffffa80`06484180 fffff8a0`0d2d5018 fffffa80`05d52701 : Ntfs!NtfsReadMftRecord+0x45c
    fffff880`0616a340 fffff880`012e9498 : fffff880`0616a4e8 fffff8a0`0d2d5140 fffff880`0616a8e0 00000001`00000000 : Ntfs!NtfsLookupInFileRecord+0x6c
    fffff880`0616a3d0 fffff880`012afa24 : fffffa80`05ae9780 fffff8a0`0d2d5100 00000000`00000000 00000000`00000001 : Ntfs!NtfsWriteFileSizes+0xa8
    fffff880`0616a530 fffff880`01251b7c : fffffa80`05ae9780 fffffa80`06484180 fffffa80`058fc401 fffffa80`058fc400 : Ntfs!NtfsFlushVolume+0x304
    fffff880`0616a660 fffff880`01245bed : fffffa80`05ae9780 fffff880`01070d01 fffffa80`079d09c0 fffff880`0616a700 : Ntfs!NtfsVolumeDasdIo+0x1dc
    fffff880`0616a710 fffff880`01246f78 : fffffa80`05ae9780 fffffa80`05628c10 fffff880`0616a801 fffffa80`0654ad00 : Ntfs!NtfsCommonRead+0x1e61
    fffff880`0616a8b0 fffff880`0106423f : fffffa80`05628fb0 fffffa80`05628c10 fffffa80`0654ad30 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
    fffff880`0616a960 fffff880`010626df : fffffa80`063df7b0 00000000`00000001 fffffa80`063df700 fffffa80`05628c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`0616a9f0 fffff800`03599ca9 : 00000000`00000000 fffffa80`058fc4b0 00000000`00000001 fffffa80`05628c10 : fltmgr!FltpDispatch+0xcf
    fffff880`0616aa50 fffff800`035a14a3 : fffffa80`058fc4b0 fffffa80`058fc4b0 fffffa80`058fc4b0 fffff800`033fde80 : nt!IopSynchronousServiceTail+0xf9
    fffff880`0616aac0 fffff800`03282993 : fffffa80`075f0340 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
    fffff880`0616abb0 00000000`00222dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0608ebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x222dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4904
    fffff800`032d824a cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4904
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904
    
    BUCKET_ID:  X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904
    
    Followup: MachineOwner
    ---------
      My Computer


  4. Posts : 12
    windows7 64bit
    Thread Starter
       #14

    No memtest errors


    Started up today with no crashes. Just two errors regarding HP and Microsoft Anitalware in event viewer.

    Ran all afternoon and night with no errors using Memtest 86.

    Typed in verifier into start box and nothing came up. Is this something that I recently added or that I should have had originally?

    Am going to attemp the hard drive diagnostics now.
      My Computer


  5. Posts : 12
    windows7 64bit
    Thread Starter
       #15

    Passed SeaTools Test and latest dmp files


    I passed the seatools long and short tests.
    I had a shut down before the test and after the test when i rebooted-.dmp files attached.

    I haven't done running in safe mode yet, will do next.
      My Computer


  6. Posts : 12
    windows7 64bit
    Thread Starter
       #16

    2 hours in safe mode no crashes


    Since I'm not sure what triggers the crashes I'm not sure what things to be doing or how long to stay in safe mode? So far 2 hours no crashes.
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #17

    Driver Verifier is a built in tool that the machine owner enables and disables. Here is a tutorial on Verifier: Driver Verifier - Enable and Disable. Right now, you should have it disabled.

    Both dumps are bucheck 1A, Memory Management and both blame ntkrnlmp.exe, one of the Windows system core files and highly unlikely to be the cause. Both crashes occurred with short uptimes, 2 min 19.9 sec and 0 min 40.3 sec, respectively. This indicates a hardware or driver problem.

    To summarize, your drivers appear up to date. You ran Memtest86 with no errors. You ran Check Disk and it found no problems. You have run SeaTools, long and short, and it detected no problems. Driver Verifier enabled dumps blamed Windows system files. Your application crash log shows the McAfee crashed when you running McAfee and it now shows MSE has crashed.

    Am I correct in assuming most of your BSOD's occur at shutdown and boot up?

    I recommend that you test your CPU and your RAM with Prime95. Carefully follow the instructions in this tutorial: https://www.sevenforums.com/tutorials...t-prime95.html. Run 3 separate tests, one on each of the settings (Blend, Small FFTs, Large FFTs). Post back with your results.

    Do you have access to another power supply that you could try? Is your computer under warranty?


    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50
    Debug session time: Wed Feb 23 11:35:44.084 2011 (GMT-5)
    System Uptime: 0 days 0:00:40.348
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41287, 14e00b, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041287, The subtype of the bugcheck.
    Arg2: 000000000014e00b
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41287
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  vdsldr.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880066e1240 -- (.trap 0xfffff880066e1240)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000020 rbx=0000000000000000 rcx=fffff8a0038f303e
    rdx=fffff8a00000c2f0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000356f901 rsp=fffff880066e13d0 rbp=fffff880066e1780
     r8=0000000000002000  r9=fffff880066e15d0 r10=0000000000000000
    r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac pe nc
    nt!ObpQueryNameString+0x4ed:
    fffff800`0356f901 668939          mov     word ptr [rcx],di ds:56b0:fffff8a0`038f303e=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003235b7a to fffff80003289740
    
    STACK_TEXT:  
    fffff880`066e0bd8 fffff800`03235b7a : 00000000`0000001a 00000000`00041287 00000000`0014e00b 00000000`00000000 : nt!KeBugCheckEx
    fffff880`066e0be0 fffff800`0328782e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`03418888 : nt! ?? ::FNODOBFM::`string'+0x42ba5
    fffff880`066e0d40 fffff800`0328c905 : 00000000`00000000 fffff800`032a7322 80000001`00000000 fffff880`00000001 : nt!KiPageFault+0x16e
    fffff880`066e0ed0 fffff800`032a7322 : 80000001`00000000 fffff880`00000001 00000000`00000000 00000000`00000003 : nt!ExpInterlockedPopEntrySListFault16
    fffff880`066e0ee0 fffff800`032a5ca2 : 00000000`00000001 fffff8a0`038f303e fffff880`066e1240 fffff6fc`5001c798 : nt!MiResolveDemandZeroFault+0x5d2
    fffff880`066e0fd0 fffff800`032a3cf1 : 00000000`00000000 fffff8a0`038f3000 00000000`00000002 00000000`00000000 : nt!MiDispatchFault+0x8c2
    fffff880`066e10e0 fffff800`0328782e : 00000000`00000001 fffffa80`06260ab0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1
    fffff880`066e1240 fffff800`0356f901 : fffff880`066e1780 fffff8a0`0000c310 00000000`00000001 fffffa80`0884a000 : nt!KiPageFault+0x16e
    fffff880`066e13d0 fffff800`0357056a : fffffa80`06260b00 fffff8a0`038f3000 fffffa80`00002000 fffff880`066e15d0 : nt!ObpQueryNameString+0x4ed
    fffff880`066e14d0 fffff800`0356fecf : fffff880`00401802 fffffa80`07996870 fffff8a0`20206f49 00000000`06ed951f : nt!ObQueryNameString+0xe
    fffff880`066e1510 fffff800`03570612 : fffffa80`07996870 fffff960`00401802 00000000`00000000 fffffa80`0884a000 : nt!IopQueryNameInternal+0x9f
    fffff880`066e15b0 fffff800`0356f4c4 : 00000000`00000000 fffff800`00401802 00000000`00000000 fffffa80`0884a000 : nt!IopQueryName+0x26
    fffff880`066e1600 fffff800`034e4da3 : fffffa80`07996870 fffffa80`0884a000 fffff8a0`00002000 fffff880`066e1798 : nt!ObpQueryNameString+0xb0
    fffff880`066e1700 fffff800`0354643e : fffffa80`086dab30 00000000`00000000 fffffa80`0875c5c0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210a4
    fffff880`066e18a0 fffff800`0356ecd4 : 000007ff`fffd9000 fffff880`066e1c20 00000000`00000000 fffffa80`07955090 : nt!PspExitProcess+0x4e
    fffff880`066e1900 fffff800`03547635 : 00000000`00000000 fffffa80`086dae01 000007ff`fffd9000 00000000`00000000 : nt!PspExitThread+0x834
    fffff880`066e19c0 fffff800`032661db : 00000000`00000001 00000000`00000000 fffff880`00961000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`066e19f0 fffff800`03266620 : 00000000`00000000 fffff880`066e1a70 fffff800`0354774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`066e1a70 fffff800`03288a37 : fffffa80`0875c5c0 00000000`0213fb48 fffff880`066e1bc8 fffff8a0`02377060 : nt!KiInitiateUserApc+0x70
    fffff880`066e1bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+42ba5
    fffff800`03235b7a cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
    
    BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmtsmn
    start             end                 module name
    fffff880`00f20000 fffff880`00f77000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03c76000 fffff880`03d00000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03f25000 fffff880`03f3b000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00ff4000 fffff880`00fff000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00e63000 fffff880`00e6c000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00db8000 fffff880`00de2000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0294a000 fffff880`02951000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03c1e000 fffff880`03c2f000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`020c8000 fffff880`020e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00770000 fffff960`00797000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`0548a000 fffff880`054a7000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`028e6000 fffff880`02910000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cce000 fffff880`00d8e000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`011cb000 fffff880`011fb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c70000 fffff880`00cce000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03f15000 fffff880`03f25000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02140000 fffff880`0214e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03c00000 fffff880`03c1e000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03dd5000 fffff880`03de4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`013e7000 fffff880`013fd000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`055cd000 fffff880`055f5000   Dot4     Dot4.sys     Mon Jul 13 20:00:16 2009 (4A5BCA90)
    fffff880`0541b000 fffff880`05425000   Dot4Prt  Dot4Prt.sys  Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`055bd000 fffff880`055cd000   dot4usb  dot4usb.sys  Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`0552c000 fffff880`0554e000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0215a000 fffff880`02163000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0214e000 fffff880`0215a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`02163000 fffff880`02176000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05470000 fffff880`0547c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04e82000 fffff880`04f76000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04f76000 fffff880`04fbc000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`01113000 fffff880`01127000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010c7000 fffff880`01113000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01191000 fffff880`011cb000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`02800000 fffff880`0284a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`037f5000 fffff800`0383e000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`028ba000 fffff880`028de000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04fbc000 fffff880`04fcd000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`05433000 fffff880`0544c000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`0544c000 fffff880`05454080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05425000 fffff880`05433000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02000000 fffff880`020c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015e6000 fffff880`015ef000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04463000 fffff880`04e81b60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
    fffff880`05554000 fffff880`05592000   IntcDAud IntcDAud.sys Sat Sep 26 10:42:55 2009 (4ABE286F)
    fffff880`03c55000 fffff880`03c6b000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`03ec4000 fffff880`03f15000   k57nd60a k57nd60a.sys Fri Oct 16 06:29:38 2009 (4AD84B12)
    fffff880`03ff0000 fffff880`03fff000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05455000 fffff880`05463000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc3000 fffff800`00bcd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`03e11000 fffff880`03e54000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0554e000 fffff880`05553200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02176000 fffff880`0218b000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`054ac000 fffff880`054cf000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`054a7000 fffff880`054ab380   lvbflt64 lvbflt64.sys Tue Nov 09 21:36:25 2010 (4CDA0529)
    fffff880`020ee000 fffff880`0213fd00   lvrs64   lvrs64.sys   Tue Nov 09 21:36:46 2010 (4CDA053E)
    fffff880`05601000 fffff880`059f7a80   lvuvc64  lvuvc64.sys  Tue Nov 09 21:37:14 2010 (4CDA055A)
    fffff880`00c18000 fffff880`00c5c000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`0547c000 fffff880`0548a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03e00000 fffff880`03e0f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05463000 fffff880`05470000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d9e000 fffff880`00db8000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02910000 fffff880`02941000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`0398b000 fffff880`0399b000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`021a3000 fffff880`021bb000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`021bb000 fffff880`021e8000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0382a000 fffff880`03878000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`03878000 fffff880`0389b000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`029af000 fffff880`029ba000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f80000 fffff880`00f8a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01133000 fffff880`01191000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03dca000 fffff880`03dd5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015d4000 fffff880`015e6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014da000 fffff880`015cc000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03f5f000 fffff880`03f6b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03f6b000 fffff880`03f9a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04fde000 fffff880`04ff3000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03d2f000 fffff880`03d3e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02875000 fffff880`028ba000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`029ba000 fffff880`029cb000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03dbe000 fffff880`03dca000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03219000 fffff800`037f5000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01244000 fffff880`013e7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`02941000 fffff880`0294a000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03d09000 fffff880`03d2f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fca000 fffff880`00fdf000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f8a000 fffff880`00fbd000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d8e000 fffff880`00d9e000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0389b000 fffff880`03941000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`054ef000 fffff880`0552c000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c5c000 fffff880`00c70000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`01127000 fffff880`01132e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
    fffff880`03f3b000 fffff880`03f5f000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03f9a000 fffff880`03fb5000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03fb5000 fffff880`03fd6000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03fd6000 fffff880`03ff0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03d6d000 fffff880`03dbe000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02994000 fffff880`0299d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0299d000 fffff880`029a6000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`029a6000 fffff880`029af000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01073000 fffff880`010ad000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`0218b000 fffff880`021a3000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0520c000 fffff880`053ee900   RTKVHD64 RTKVHD64.sys Tue Aug 18 05:29:10 2009 (4A8A7466)
    fffff880`03941000 fffff880`0394c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`015cc000 fffff880`015d4000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05d61000 fffff880`05df7000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`05cfa000 fffff880`05d61000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`0394c000 fffff880`03979000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`03e0f000 fffff880`03e10480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`03600000 fffff880`037fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`03979000 fffff880`0398b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`02868000 fffff880`02875000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0284a000 fffff880`02868000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03d59000 fffff880`03d6d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03c2f000 fffff880`03c55000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03e54000 fffff880`03e66000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`054cf000 fffff880`054e9c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05592000 fffff880`055af000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`055af000 fffff880`055b0f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04fcd000 fffff880`04fde000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e66000 fffff880`03ec0000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`04400000 fffff880`04456000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`055b1000 fffff880`055bd000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
    fffff880`05400000 fffff880`0541b000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00fbd000 fffff880`00fca000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`02951000 fffff880`0295f000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0295f000 fffff880`02984000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fdf000 fffff880`00ff4000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0148b000 fffff880`014d7000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03d3e000 fffff880`03d59000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`02984000 fffff880`02994000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e6d000 fffff880`00f11000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f11000 fffff880`00f20000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03d00000 fffff880`03d09000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00020000 fffff960`0032f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
    fffff880`00f77000 fffff880`00f80000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`029cb000 fffff880`029ec000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`05c00000 fffff880`05c31000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`015ef000 fffff880`015fd000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01235000 fffff880`01241000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`010ad000 fffff880`010b6000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`00de2000 fffff880`00df5000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  8. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #18

    You can leave safe mode. I was looking to see if you could boot in the safe mode without crashing.
      My Computer


 
Page 2 of 2 FirstFirst 12

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:33.
Find Us