memory dump : (


  1. Posts : 3
    Windows 7 Enterprise 64 Bit
       #1

    memory dump : (


    I am running Windows 7 Enterprise 64-bit (licensed through my university) on a Gigabyte GA-73PVM-S2H motherboard and Intel E7300 Core 2 Duo processor.

    The computer starts up as normal, but whenever I try to move files or install anything I am met with a memory dump. I can leave the computer idling for any amount of time without any issues. The technical information from the memory dump is below. I have updated the bios to the latest version.
    *** STOP: 0X0000001A (0X0000000000041790, 0XFFFFFA80009B05B0, 0X000000000000FFFF, 0X0000000000000000).

    My next option is to reinstall windows, which I would like to avoid.

    Any help is GREATLY appreciated.
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    MFINCH2 said:
    I am running Windows 7 Enterprise 64-bit (licensed through my university) on a Gigabyte GA-73PVM-S2H motherboard and Intel E7300 Core 2 Duo processor.

    The computer starts up as normal, but whenever I try to move files or install anything I am met with a memory dump. I can leave the computer idling for any amount of time without any issues. The technical information from the memory dump is below. I have updated the bios to the latest version.
    *** STOP: 0X0000001A (0X0000000000041790, 0XFFFFFA80009B05B0, 0X000000000000FFFF, 0X0000000000000000).

    My next option is to reinstall windows, which I would like to avoid.

    Any help is GREATLY appreciated.




    To enable us to assist you with your computer's BSOD symptoms, upload the contents of your "\Windows\Minidump" folder.

    The procedure:

    * Copy the contents of \Windows\Minidump to another (temporary) location somewhere on your machine.
    * Zip up the copy.
    * Attach the ZIP archive to your post using the "paperclip" (file attachments) button.



    To ensure minidumps are enabled:

    Go to Start, in the Search Box type: sysdm.cpl, press Enter.
    Under the Advanced tab, click on the Startup and Recovery Settings... button.
    Ensure that Automatically restart is unchecked.
    Under the Write Debugging Information header select Small memory dump (256 kB) in the dropdown box (the 256kb varies).
    Ensure that the Small Dump Directory is listed as %systemroot%\Minidump.
    OK your way out.
    Reboot if changes have been made.
      My Computer


  3. Posts : 927
    windows 7 ultimate
       #3

    Hi MFinch2 and Welcome. We really need the actual dump files etc..
    Please see this thread:
    Damn zigzag and his fast fingers!!
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    STOP: 0X0000001A is a memory issue, possible causers:

    - wrong memory settings, such as frequency, timings, and voltage;
    - overclocking;
    - old drivers and certain AV's can cause this error.
      My Computer


  5. Posts : 3
    Windows 7 Enterprise 64 Bit
    Thread Starter
       #5

    Thanks ZigZag - see attached.
      My Computer


  6. Posts : 3
    Windows 7 Enterprise 64 Bit
    Thread Starter
       #6

    Re cybercore


    Thanks cybercore,

    My computer had been running fine for about a year before this problem started. I have default bios settings, so I don't think there are any over clocking or voltage issues. My av is ms security essentials, but the bsod occurs even when it is off. I will see about dropping down to a single stick of RAM to see if that helps; I'll report back if it solves the issue.
      My Computer


  7. Posts : 670
    Windows 7 x64
       #7

    I will see about dropping down to a single stick of RAM to see if that helps; I'll report back if it solves the issue.
    Mismatched sticks could be the problem.

    Try to update:

    nForce
    nvm62x64.sys Fri Oct 17 17:01:06 2008

    ATI
    atikmdag.sys Wed Sep 23 18:55:17 2009



    CRASH DUMPS

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-28782-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02c65000 PsLoadedModuleList = 0xfffff800`02ea2e50
    Debug session time: Mon May 16 15:12:42.077 2011 (UTC - 4:00)
    System Uptime: 0 days 0:05:01.324
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41790, fffffa800098be30, ffff, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041790, The subtype of the bugcheck.
    Arg2: fffffa800098be30
    Arg3: 000000000000ffff
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41790
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  WMIADAP.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002d4926e to fffff80002cd6f00
    
    STACK_TEXT:  
    fffff880`04472968 fffff800`02d4926e : 00000000`0000001a 00000000`00041790 fffffa80`0098be30 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`04472970 fffff800`02d18c4a : 00000000`00000000 00000000`01a62fff fffffa80`00000000 fffffa80`049b3060 : nt! ?? ::FNODOBFM::`string'+0x339d6
    fffff880`04472b30 fffff800`02cd6153 : ffffffff`ffffffff 00000000`0024ef80 00000000`0024ef48 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
    fffff880`04472c20 00000000`7741009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0024eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7741009a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+339d6
    fffff800`02d4926e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+339d6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051511-92758-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e96e50
    Debug session time: Sun May 15 18:04:13.900 2011 (UTC - 4:00)
    System Uptime: 0 days 0:03:05.023
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {783, fffff88002fb67c0, fffff9802e580000, fffff8a00f2a7e40}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2c2be )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000783, The subtype of the bugcheck.
    Arg2: fffff88002fb67c0
    Arg3: fffff9802e580000
    Arg4: fffff8a00f2a7e40
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_783
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002c6d4bf to fffff80002ccaf00
    
    STACK_TEXT:  
    fffff880`02fb6728 fffff800`02c6d4bf : 00000000`0000001a 00000000`00000783 fffff880`02fb67c0 fffff980`2e580000 : nt!KeBugCheckEx
    fffff880`02fb6730 fffff800`02fdee35 : fffff980`2e580000 fffff8a0`0f2a7e40 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c2be
    fffff880`02fb6a10 fffff800`02ce3d47 : 00000000`00000000 fffffa80`03f0ebf0 00000000`00000000 00000000`00040000 : nt!CcUnmapVacb+0x5d
    fffff880`02fb6a50 fffff800`02cbaad4 : 00000000`00000001 fffffa80`03f64720 fffffa80`03f63000 00000000`00000000 : nt!CcUnmapVacbArray+0x1b7
    fffff880`02fb6ae0 fffff800`02cbe55c : fffffa80`03f63010 00000000`00000011 fffffa80`03f63010 fffff800`00000000 : nt!CcDeleteSharedCacheMap+0x140
    fffff880`02fb6b50 fffff800`02cbed60 : fffff800`02ed0100 fffff880`02fb6c58 00000000`00000000 00000000`00000000 : nt!CcWriteBehind+0x5bc
    fffff880`02fb6c00 fffff800`02cd8161 : fffffa80`039df930 fffff880`0123e270 fffff800`02ed0140 fffffa80`039e4b00 : nt!CcWorkerThread+0x1c8
    fffff880`02fb6cb0 fffff800`02f6e166 : 00000000`00000000 fffffa80`039e4b60 00000000`00000080 fffffa80`0396d9e0 : nt!ExpWorkerThread+0x111
    fffff880`02fb6d40 fffff800`02ca9486 : fffff880`009e7180 fffffa80`039e4b60 fffff880`009f1f40 00000000`000000e8 : nt!PspSystemThreadStartup+0x5a
    fffff880`02fb6d80 00000000`00000000 : fffff880`02fb7000 fffff880`02fb1000 fffff880`02fb63b0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+2c2be
    fffff800`02c6d4bf cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2c2be
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x1a_783_nt!_??_::FNODOBFM::_string_+2c2be
    
    BUCKET_ID:  X64_0x1a_783_nt!_??_::FNODOBFM::_string_+2c2be
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-17456-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
    Debug session time: Mon May 16 14:55:18.713 2011 (UTC - 4:00)
    System Uptime: 0 days 0:02:37.835
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffffa8803f8b1b0, 0, fffff80002caba79, 5}
    
    
    Could not read faulting driver name
    Probably caused by : memory_corruption ( nt!MmCopyToCachedPage+219 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffffa8803f8b1b0, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002caba79, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb30e0
     fffffa8803f8b1b0 
    
    FAULTING_IP: 
    nt!MmCopyToCachedPage+219
    fffff800`02caba79 488b07          mov     rax,qword ptr [rdi]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  WerFault.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880072bd280 -- (.trap 0xfffff880072bd280)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000fffffffff
    rdx=fffff80002c0b000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002caba79 rsp=fffff880072bd410 rbp=fffff880072bd480
     r8=0000098000000000  r9=00000000018ef040 r10=0000058000000000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MmCopyToCachedPage+0x219:
    fffff800`02caba79 488b07          mov     rax,qword ptr [rdi] ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cfab91 to fffff80002c7cf00
    
    STACK_TEXT:  
    fffff880`072bd118 fffff800`02cfab91 : 00000000`00000050 fffffa88`03f8b1b0 00000000`00000000 fffff880`072bd280 : nt!KeBugCheckEx
    fffff880`072bd120 fffff800`02c7afee : 00000000`00000000 00000000`00000000 00000000`00000000 00001f80`00480000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
    fffff880`072bd280 fffff800`02caba79 : 00000000`00000002 ffffffff`ffffffff 00000000`00000002 ffffffff`ffffffff : nt!KiPageFault+0x16e
    fffff880`072bd410 fffff800`02ca8e8e : fffff980`0293f000 00000000`018ef040 fffff880`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x219
    fffff880`072bd600 fffff800`02ca8bf4 : fffffa80`051beb10 00000000`018ef040 fffff880`072bd740 fffff8a0`00000000 : nt!CcMapAndCopyInToCache+0x20e
    fffff880`072bd6f0 fffff880`012b6fb8 : 00000000`02180000 fffffa80`051d3a00 fffff880`072bd7e0 fffffa80`00010000 : nt!CcCopyWrite+0x194
    fffff880`072bd780 fffff880`01085132 : fffffa80`051d3a20 fffff880`01088732 00000000`00010000 00000000`00010001 : Ntfs!NtfsCopyWriteA+0x208
    fffff880`072bd970 fffff880`01088c2a : fffff880`072bda40 fffffa80`03b6c0d8 00000000`018e0000 00000000`00010000 : fltmgr!FltpPerformFastIoCall+0xf2
    fffff880`072bd9d0 fffff880`010a67fe : 00000000`00010000 00000000`00000000 fffffa80`051d3a20 fffff880`072bdb40 : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`072bda10 fffff800`02f9148e : fffffa80`051d3a94 fffffa80`00000002 fffffa80`03a1c080 fffffa80`051d3a94 : fltmgr!FltpFastIoWrite+0x1ce
    fffff880`072bdab0 fffff800`02c7c153 : 00000000`00000701 00000000`000001a0 00000000`00000000 00000000`001da9d8 : nt!NtWriteFile+0x5ad
    fffff880`072bdbb0 00000000`76f3ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0010bda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f3ff3a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MmCopyToCachedPage+219
    fffff800`02caba79 488b07          mov     rax,qword ptr [rdi]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MmCopyToCachedPage+219
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x50_nt!MmCopyToCachedPage+219
    
    BUCKET_ID:  X64_0x50_nt!MmCopyToCachedPage+219
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-27284-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e46e50
    Debug session time: Mon May 16 15:26:24.139 2011 (UTC - 4:00)
    System Uptime: 0 days 0:03:18.386
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41790, fffffa8000a05c30, ffff, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041790, The subtype of the bugcheck.
    Arg2: fffffa8000a05c30
    Arg3: 000000000000ffff
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41790
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  drvinst.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002ced26e to fffff80002c7af00
    
    STACK_TEXT:  
    fffff880`038ff828 fffff800`02ced26e : 00000000`0000001a 00000000`00041790 fffffa80`00a05c30 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`038ff830 fffff800`02cae5d9 : 00000000`00000000 00000000`017bafff fffff880`00000000 fffffa80`043b1060 : nt! ?? ::FNODOBFM::`string'+0x339d6
    fffff880`038ff9f0 fffff800`02f90e50 : fffffa80`068d1260 0007ffff`00000001 fffffa80`05cb1be0 fffffa80`066a18b0 : nt!MiRemoveMappedView+0xd9
    fffff880`038ffb10 fffff800`02f9125b : 00000000`00000000 00000000`01120000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b0
    fffff880`038ffbd0 fffff800`02c7a153 : 00000000`00000001 00000000`00000002 fffffa80`05029060 fffffa80`05718c60 : nt!NtUnmapViewOfSection+0x5f
    fffff880`038ffc20 00000000`773e015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`004edc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773e015a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+339d6
    fffff800`02ced26e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+339d6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-27830-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02c13000 PsLoadedModuleList = 0xfffff800`02e50e50
    Debug session time: Mon May 16 15:36:57.325 2011 (UTC - 4:00)
    System Uptime: 0 days 0:02:58.572
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41790, fffffa80009b05b0, ffff, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041790, The subtype of the bugcheck.
    Arg2: fffffa80009b05b0
    Arg3: 000000000000ffff
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41790
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  WerFault.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002cf726e to fffff80002c84f00
    
    STACK_TEXT:  
    fffff880`02736828 fffff800`02cf726e : 00000000`0000001a 00000000`00041790 fffffa80`009b05b0 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`02736830 fffff800`02cb85d9 : 00000000`00000000 000007fe`f5d87fff fffffa80`00000000 fffffa80`059ff610 : nt! ?? ::FNODOBFM::`string'+0x339d6
    fffff880`027369f0 fffff800`02f9ae50 : fffffa80`04b46ef0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
    fffff880`02736b10 fffff800`02f9b25b : 00000000`00000000 000007fe`f5cb0000 fffffa80`00000001 fffffa80`057b3010 : nt!MiUnmapViewOfSection+0x1b0
    fffff880`02736bd0 fffff800`02c84153 : fffffa80`04b3f660 fffff880`02736ca0 fffffa80`04b3db30 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
    fffff880`02736c20 00000000`76ea015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0018ab58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ea015a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+339d6
    fffff800`02cf726e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+339d6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    Followup: MachineOwner
    ---------




    DRIVERS

    Code:
    start             end                 module name
    fffff880`04fd4000 fffff880`04fff000   000      000.fcl      Fri Sep 26 09:11:22 2008 (48DCDF7A)
    fffff880`01995000 fffff880`019d3000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00eb6000 fffff880`00f0d000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c08000 fffff880`02c92000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`048c7000 fffff880`048dd000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00c00000 fffff880`00c0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`053f4000 fffff880`053ff000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00dc3000 fffff880`00dcc000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dcc000 fffff880`00df6000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`03e99000 fffff880`044d4000   atikmdag atikmdag.sys Wed Sep 23 18:55:17 2009 (4ABAA755)
    fffff880`018e9000 fffff880`018f0000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03ba0000 fffff880`03bb1000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03925000 fffff880`03943000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`007d0000 fffff960`007f7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0188a000 fffff880`018b4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00ce9000 fffff880`00da9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01824000 fffff880`01854000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c8b000 fffff880`00ce9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01135000 fffff880`011a8000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`048b7000 fffff880`048c7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04dc4000 fffff880`04dd2000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03aff000 fffff880`03b82000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03b82000 fffff880`03ba0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02dc9000 fffff880`02dd8000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01235000 fffff880`0124b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04d17000 fffff880`04d39000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`04dde000 fffff880`04de7000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`04dd2000 fffff880`04dde000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`04de7000 fffff880`04dfa000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04c00000 fffff880`04c0c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`044d4000 fffff880`045c8000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03e00000 fffff880`03e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`03bed000 fffff880`03bfa000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`010c3000 fffff880`010d7000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`04812000 fffff880`0481d000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`01077000 fffff880`010c3000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0103a000 fffff880`01074000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`031f0000 fffff800`03239000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03ac8000 fffff880`03aec000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04c7e000 fffff880`04cda000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`04d87000 fffff880`04da0000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`04da0000 fffff880`04da8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`04d79000 fffff880`04d87000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0385d000 fffff880`03925000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03a29000 fffff880`03a47000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03bd7000 fffff880`03bed000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0499d000 fffff880`049ac000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04da9000 fffff880`04db7000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`049ae000 fffff880`049f1000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`04d39000 fffff880`04d3e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0482b000 fffff880`04840000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03e46000 fffff880`03e69000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c33000 fffff880`00c77000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`0481d000 fffff880`0482b000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03a47000 fffff880`03a56000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04db7000 fffff880`04dc4000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00da9000 fffff880`00dc3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`018b4000 fffff880`018e0000   MpFilter MpFilter.sys Wed Jun 10 22:33:21 2009 (4A306CF1)
    fffff880`05373000 fffff880`05383000   MpNWMon  MpNWMon.sys  Wed Jun 10 22:33:23 2009 (4A306CF3)
    fffff880`03943000 fffff880`0395b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0395b000 fffff880`03987000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
    fffff880`03987000 fffff880`039d4000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
    fffff880`039d4000 fffff880`039f7000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
    fffff880`0194e000 fffff880`01959000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f16000 fffff880`00f20000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010d7000 fffff880`01135000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02dbe000 fffff880`02dc9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015e3000 fffff880`015f5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01491000 fffff880`01583000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04901000 fffff880`0490d000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0490d000 fffff880`0493c000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04c69000 fffff880`04c7e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d06000 fffff880`02d15000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02c92000 fffff880`02cd7000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01583000 fffff880`015e3000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01959000 fffff880`0196a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02db2000 fffff880`02dbe000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c13000 fffff800`031f0000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`01250000 fffff880`013f3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`018e0000 fffff880`018e9000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`04d3f000 fffff880`04d57000   nvhda64v nvhda64v.sys Fri Aug 21 16:23:50 2009 (4A8F0256)
    fffff880`0484a000 fffff880`048add80   nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
    fffff880`02ce0000 fffff880`02d06000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`03a0c000 fffff880`03a29000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f60000 fffff880`00f75000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f20000 fffff880`00f53000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fe6000 fffff880`00fed000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fed000 fffff880`00ffd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`04ee4000 fffff880`04f8a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04cda000 fffff880`04d17000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c77000 fffff880`00c8b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`048dd000 fffff880`04901000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0493c000 fffff880`04957000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04957000 fffff880`04978000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04978000 fffff880`04992000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d61000 fffff880`02db2000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`04992000 fffff880`0499d000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01933000 fffff880`0193c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`052f3000 fffff880`05321000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
    fffff880`0193c000 fffff880`01945000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01945000 fffff880`0194e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0533b000 fffff880`05373000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
    fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`045c8000 fffff880`045e0000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04f8a000 fffff880`04f95000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03a00000 fffff880`03a0c000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d15000 fffff880`02d32000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05383000 fffff880`053f4000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`0525b000 fffff880`052f3000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
    fffff880`04e00000 fffff880`04e69000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`04f95000 fffff880`04fc2000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
    fffff880`049ac000 fffff880`049ad480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`04fc2000 fffff880`04fd4000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01988000 fffff880`01995000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`05321000 fffff880`0532c000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
    fffff880`0196a000 fffff880`01988000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d4d000 fffff880`02d61000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00550000 fffff960`0055a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0532c000 fffff880`0533b000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
    fffff880`03bb1000 fffff880`03bd7000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04800000 fffff880`04812000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`04d57000 fffff880`04d74000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`04d74000 fffff880`04d75f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03ab7000 fffff880`03ac8000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04d76000 fffff880`04d79000   UsbFltr  UsbFltr.sys  Mon Apr 09 06:09:44 2007 (461A10E8)
    fffff880`04c0f000 fffff880`04c69000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03a56000 fffff880`03a61000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03a61000 fffff880`03ab7000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00f53000 fffff880`00f60000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`018f0000 fffff880`018fe000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`018fe000 fffff880`01923000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f75000 fffff880`00f8a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f8a000 fffff880`00fe6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`011a8000 fffff880`011f4000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d32000 fffff880`02d4d000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01923000 fffff880`01933000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e03000 fffff880`00ea7000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ea7000 fffff880`00eb6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02cd7000 fffff880`02ce0000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff880`048ae000 fffff880`048b7000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f0d000 fffff880`00f16000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`03e69000 fffff880`03e8a000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`01854000 fffff880`01862000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01862000 fffff880`0186e000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0186e000 fffff880`01877000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01877000 fffff880`0188a000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  8. Posts : 12,177
    Windows 7 Ult x64 - SP1/ Windows 8 Pro x64
       #8

    RAM can do funny things, run for years and then throw errors for no apparent reason.

    Won't hurt to take a quick look at the settings.

    Can you download CPUZ and post a snip of the CPU, Mainboard, Memory, and SPD tabs.

    For posting the information , enter 'Snipping tool' in the Start button > Search box, hit enter. Select the area you want to post and save to a convenient place.
    How to Post a Screenshot in Seven Forums
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:25.
Find Us