New
#11
not that I'm aware of it's supposed to display the results until you close it out.
Oh. I checked this morning and it was about 98% of the way, on the 12th pass with no errors. I had to switch off the monitor for the cleaning lady had to do her work around there. When I switched on the monitor later, the pc had booted into windows. So, either she accidentally hit the power button, or something went wrong. I'll run it again tonight.
yeah 12 passes is enough to clear the ram.
Also I checked the dump files finally they all point to the same driver I brought up in the first post.
Except one, which blames AVG specifically.
If AVG is for some reason not working properly with your specific setup it could be causing many smaller issues.
You may want to uninstall it for the moment and then go back and look into replacing the realtek driver.
None of them are 124 stops so can't be absolutely sure of hardware problems.
The two above steps I'm hoping will stabilize things for you though.
Code:Probably caused by : hardware Followup: MachineOwner --------- *** Possible invalid call from 82aa52b8 ( nt!MiUnlinkPageFromLockedList+0x194 ) *** Expected target 82a73710 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 ) 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00200000, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82a73740, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82b73718 Unable to read MiSystemVaType memory at 82b53160 00200000 CURRENT_IRQL: 2 FAULTING_IP: nt!KeAcquireQueuedSpinLockAtDpcLevel+20 82a73740 8908 mov dword ptr [eax],ecx CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: avgrsx.exe IRP_ADDRESS: 010af778 TRAP_FRAME: 8a0f3ab8 -- (.trap 0xffffffff8a0f3ab8) ErrCode = 00000002 eax=86981710 ebx=86577ae0 ecx=000001c4 edx=00000000 esi=86981000 edi=02504a04 eip=82a497f3 esp=8a0f3b2c ebp=8a0f3b34 iopl=0 nv up ei pl nz ac po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010212 nt!memcpy+0x33: 82a497f3 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] Resetting default scope LAST_CONTROL_TRANSFER: from 82aa52bd to 82a73740 POSSIBLE_INVALID_CONTROL_TRANSFER: from 82aa52b8 to 82a73710 TWO_BIT_ERROR: 1 STACK_TEXT: 8a0f3918 82aa52bd 84368908 000645b1 00000000 nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20 8a0f3944 82aa6d17 00000000 00000000 02504a04 nt!MiUnlinkPageFromLockedList+0x199 8a0f3994 82a9ba9f 00000001 02504a04 c0012820 nt!MiResolveTransitionFault+0x550 8a0f3a18 82a92f15 02504a04 00000000 85ac23f0 nt!MiDispatchFault+0x61f 8a0f3aa0 82a51638 00000001 02504a04 00000000 nt!MmAccessFault+0x25cc 8a0f3aa0 82a497f3 00000001 02504a04 00000000 nt!KiTrap0E+0xdc 8a0f3b34 82aad2ff 02504a04 86981000 00000710 nt!memcpy+0x33 8a0f3b84 82a73eff 010af7b8 8a0f3bcc 8a0f3bc4 nt!IopCompleteRequest+0xa0 8a0f3bd0 8d6c0778 86577ae0 85b6e030 00000000 nt!IopfCompleteRequest+0x3b4 WARNING: Stack unwind information not available. Following frames may be wrong. 8a0f3bfc 82a474bc 85b6e030 b30af778 b30af778 avgmfx86+0x2778 8a0f3c14 82c4950e 86577ae0 b30af778 b30af7e8 nt!IofCallDriver+0x63 8a0f3c34 82c66349 85b6e030 86577ae0 00000000 nt!IopSynchronousServiceTail+0x1f8 8a0f3cd0 82c68b24 85b6e030 b30af778 00000000 nt!IopXxxControlFile+0x6aa 8a0f3d04 82a4e44a 0000047c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a 8a0f3d04 76e06194 0000047c 00000000 00000000 nt!KiFastCallEntry+0x12a 02cafd64 00000000 00000000 00000000 00000000 0x76e06194 STACK_COMMAND: kb FOLLOWUP_NAME: MachineOwner MODULE_NAME: hardware IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: TWO_BIT_CPU_CALL_ERROR Followup: MachineOwner --------- *** Possible invalid call from 82aa52b8 ( nt!MiUnlinkPageFromLockedList+0x194 ) *** Expected target 82a73710 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )
Damn. Id composed a big ass thank you reply and was just about to send it when bam! Another BSOD! Here's the minidump.
Ps:Thank you note is forthcoming. Just spent way too long hunched typing that. And I have been paranoid about my back for a few days now.
Um, just to check do you have driver verifier enabled?
If so you should turn it off now.
Driver Verifier - Enable and Disable
The reason I ask is because flashplayer caused a kernel failure. It shouldn't do that it should just lock up then close. It leads me to believe driver verifier might be turned on.
Code:Use !analyze -v to get detailed debugging information. BugCheck 1000008E, {c0000005, 8324dbb3, a4aebb44, 0} GetPointerFromAddress: unable to read from 83170718 Unable to read MiSystemVaType memory at 83150160 GetPointerFromAddress: unable to read from 83170718 Unable to read MiSystemVaType memory at 83150160 GetPointerFromAddress: unable to read from 83170718 Unable to read MiSystemVaType memory at 83150160 Probably caused by : ntkrpamp.exe ( nt!ObpCloseHandleTableEntry+28 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 8324dbb3, The address that the exception occurred at Arg3: a4aebb44, Trap Frame Arg4: 00000000 Debugging Details: ------------------ GetPointerFromAddress: unable to read from 83170718 Unable to read MiSystemVaType memory at 83150160 GetPointerFromAddress: unable to read from 83170718 Unable to read MiSystemVaType memory at 83150160 GetPointerFromAddress: unable to read from 83170718 Unable to read MiSystemVaType memory at 83150160 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!ObpCloseHandleTableEntry+28 8324dbb3 837b7400 cmp dword ptr [ebx+74h],0 TRAP_FRAME: a4aebb44 -- (.trap 0xffffffffa4aebb44) ErrCode = 00000000 eax=a86a93f8 ebx=00000000 ecx=0000006f edx=853324a8 esi=853324a8 edi=854bf540 eip=8324dbb3 esp=a4aebbb8 ebp=a4aebbf0 iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 nt!ObpCloseHandleTableEntry+0x28: 8324dbb3 837b7400 cmp dword ptr [ebx+74h],0 ds:0023:00000074=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: FlashPlayerPlu CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 8327ff87 to 8324dbb3 STACK_TEXT: a4aebbf0 8327ff87 a863aeb8 a86a93f8 854b9c78 nt!ObpCloseHandleTableEntry+0x28 a4aebc20 832858d5 a863aeb8 a4aebc34 92ea5030 nt!ExSweepHandleTable+0x5f a4aebc40 832512a4 baececf0 854bf540 ffffffff nt!ObKillProcess+0x54 a4aebcb4 832857ff ffffffff 86ec2730 00000001 nt!PspExitThread+0x5d9 a4aebccc 830b026f 86ec2730 a4aebcf8 a4aebd04 nt!PsExitSpecialApc+0x22 a4aebd1c 8304b504 00000001 00000000 a4aebd34 nt!KiDeliverApc+0x28b a4aebd1c 77576194 00000001 00000000 a4aebd34 nt!KiServiceExit+0x64 WARNING: Frame IP not in any known module. Following frames may be wrong. 0014f1e4 00000000 00000000 00000000 00000000 0x77576194 STACK_COMMAND: kb FOLLOWUP_IP: nt!ObpCloseHandleTableEntry+28 8324dbb3 837b7400 cmp dword ptr [ebx+74h],0 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ObpCloseHandleTableEntry+28 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f790f9a FAILURE_BUCKET_ID: 0x8E_nt!ObpCloseHandleTableEntry+28 BUCKET_ID: 0x8E_nt!ObpCloseHandleTableEntry+28 Followup: MachineOwner --------- 1: kd> lm tn start end module name 80bd3000 80bdb000 kdcom kdcom.dll Mon Jul 13 20:08:58 2009 (4A5BDAAA) 83008000 83418000 nt ntkrpamp.exe Sun Apr 01 21:31:54 2012 (4F790F9A) 83418000 8344f000 hal halmacpi.dll Mon Jul 13 18:11:03 2009 (4A5BBF07) 83601000 8360c000 mcupdate mcupdate.dll Mon Jul 13 18:13:13 2009 (4A5BBF89) 8360c000 8361d000 PSHED PSHED.dll Mon Jul 13 20:09:36 2009 (4A5BDAD0) 8361d000 83625000 BOOTVID BOOTVID.dll Mon Jul 13 20:04:34 2009 (4A5BD9A2) 83625000 83667000 CLFS CLFS.SYS Mon Jul 13 18:11:10 2009 (4A5BBF0E) 83667000 83712000 CI CI.dll Mon Jul 13 20:09:28 2009 (4A5BDAC8) 83712000 83783000 Wdf01000 Wdf01000.sys Mon Jul 13 18:11:36 2009 (4A5BBF28) 83783000 83791000 WDFLDR WDFLDR.SYS Mon Jul 13 18:11:25 2009 (4A5BBF1D) 83791000 837d9000 ACPI ACPI.sys Mon Jul 13 18:11:11 2009 (4A5BBF0F) 837d9000 837e2000 WMILIB WMILIB.SYS Mon Jul 13 18:11:22 2009 (4A5BBF1A) 837e2000 837ea000 msisadrv msisadrv.sys Mon Jul 13 18:11:09 2009 (4A5BBF0D) 88413000 8843d000 pci pci.sys Mon Jul 13 18:11:16 2009 (4A5BBF14) 8843d000 88448000 vdrvroot vdrvroot.sys Mon Jul 13 18:46:19 2009 (4A5BC74B) 88448000 88459000 partmgr partmgr.sys Sat Mar 17 00:01:13 2012 (4F641A99) 88459000 88469000 volmgr volmgr.sys Mon Jul 13 18:11:25 2009 (4A5BBF1D) 88469000 884b4000 volmgrx volmgrx.sys Mon Jul 13 18:11:41 2009 (4A5BBF2D) 884b4000 884bb000 pciide pciide.sys Mon Jul 13 18:11:19 2009 (4A5BBF17) 884bb000 884c9000 PCIIDEX PCIIDEX.SYS Mon Jul 13 18:11:15 2009 (4A5BBF13) 884c9000 884df000 mountmgr mountmgr.sys Mon Jul 13 18:11:27 2009 (4A5BBF1F) 884df000 884e8000 atapi atapi.sys Mon Jul 13 18:11:15 2009 (4A5BBF13) 884e8000 8850b000 ataport ataport.SYS Mon Jul 13 18:11:18 2009 (4A5BBF16) 8850b000 88514000 amdxata amdxata.sys Fri Mar 19 11:19:01 2010 (4BA3A3F5) 88514000 88548000 fltmgr fltmgr.sys Mon Jul 13 18:11:13 2009 (4A5BBF11) 88548000 88559000 fileinfo fileinfo.sys Mon Jul 13 18:21:51 2009 (4A5BC18F) 88559000 8857a000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 18:25:49 2009 (4A5BC27D) 8857a000 88587000 watchdog watchdog.sys Mon Jul 13 18:24:10 2009 (4A5BC21A) 88587000 8858f000 RDPCDD RDPCDD.sys Mon Jul 13 19:01:40 2009 (4A5BCAE4) 8858f000 88597000 rdpencdd rdpencdd.sys Mon Jul 13 19:01:39 2009 (4A5BCAE3) 88597000 8859f000 rdprefmp rdprefmp.sys Mon Jul 13 19:01:41 2009 (4A5BCAE5) 8859f000 885aa000 Msfs Msfs.SYS Mon Jul 13 18:11:26 2009 (4A5BBF1E) 885aa000 885b8000 Npfs Npfs.SYS Mon Jul 13 18:11:31 2009 (4A5BBF23) 885b8000 885cf000 tdx tdx.sys Mon Jul 13 18:12:10 2009 (4A5BBF4A) 885cf000 885da000 TDI TDI.SYS Mon Jul 13 18:12:12 2009 (4A5BBF4C) 885da000 885fb000 tunnel tunnel.sys Mon Jul 13 18:54:03 2009 (4A5BC91B) 88600000 8860e000 pcw pcw.sys Mon Jul 13 18:11:10 2009 (4A5BBF0E) 8860e000 88617000 Fs_Rec Fs_Rec.sys Wed Feb 29 21:29:01 2012 (4F4EECFD) 88617000 8861e000 Beep Beep.SYS Mon Jul 13 18:45:00 2009 (4A5BC6FC) 8861e000 88629000 avgtpx86 avgtpx86.sys Thu Jul 19 09:07:14 2012 (50081492) 88629000 88635000 vga vga.sys Mon Jul 13 18:25:50 2009 (4A5BC27E) 88635000 88764000 Ntfs Ntfs.sys Thu Mar 10 21:29:11 2011 (4D799707) 88764000 8878f000 msrpc msrpc.sys Mon Jul 13 18:11:59 2009 (4A5BBF3F) 8878f000 887a2000 ksecdd ksecdd.sys Fri Jun 01 21:34:22 2012 (4FC97BAE) 887a2000 887ff000 cng cng.sys Fri Jun 01 21:56:24 2012 (4FC980D8) 88800000 8881f000 cdrom cdrom.sys Mon Jul 13 18:11:24 2009 (4A5BBF1C) 8881f000 88826000 Null Null.SYS Mon Jul 13 18:11:12 2009 (4A5BBF10) 8882b000 888e2000 ndis ndis.sys Mon Jul 13 18:12:24 2009 (4A5BBF58) 888e2000 88920000 NETIO NETIO.SYS Mon Jul 13 18:12:35 2009 (4A5BBF63) 88920000 88945000 ksecpkg ksecpkg.sys Fri Jun 01 21:57:18 2012 (4FC9810E) 88945000 88972000 rdyboost rdyboost.sys Mon Jul 13 18:22:02 2009 (4A5BC19A) 88972000 889a4000 fvevol fvevol.sys Fri Sep 25 21:24:21 2009 (4ABD7B55) 889a4000 889c9000 CLASSPNP CLASSPNP.SYS Mon Jul 13 18:11:20 2009 (4A5BBF18) 88a00000 88a10000 mup mup.sys Mon Jul 13 18:14:14 2009 (4A5BBFC6) 88a10000 88a18000 hwpolicy hwpolicy.sys Mon Jul 13 18:11:01 2009 (4A5BBF05) 88a18000 88a29000 disk disk.sys Mon Jul 13 18:11:28 2009 (4A5BBF20) 88a29000 88b73000 tcpip tcpip.sys Fri Mar 30 03:12:47 2012 (4F756AFF) 88b73000 88ba4000 fwpkclnt fwpkclnt.sys Mon Jul 13 18:12:03 2009 (4A5BBF43) 88ba4000 88bac380 vmstorfl vmstorfl.sys Mon Jul 13 18:28:44 2009 (4A5BC32C) 88bad000 88bec000 volsnap volsnap.sys Mon Jul 13 18:11:34 2009 (4A5BBF26) 88bec000 88bf4000 spldr spldr.sys Mon May 11 11:13:47 2009 (4A084EBB) 88bf4000 88bfc000 AtiPcie AtiPcie.sys Tue May 05 10:00:16 2009 (4A005480) 8d604000 8d636000 netbt netbt.sys Mon Jul 13 18:12:18 2009 (4A5BBF52) 8d636000 8d690000 afd afd.sys Sun Apr 24 21:35:37 2011 (4DB4DDF9) 8d690000 8d697000 wfplwf wfplwf.sys Mon Jul 13 18:53:51 2009 (4A5BC90F) 8d697000 8d6b6000 pacer pacer.sys Mon Jul 13 18:53:58 2009 (4A5BC916) 8d6b6000 8d6c4000 netbios netbios.sys Mon Jul 13 18:53:54 2009 (4A5BC912) 8d6c4000 8d6de000 serial serial.sys Mon Jul 13 18:45:33 2009 (4A5BC71D) 8d6de000 8d6f1000 wanarp wanarp.sys Mon Jul 13 18:55:02 2009 (4A5BC956) 8d6f1000 8d701000 termdd termdd.sys Mon Jul 13 19:01:35 2009 (4A5BCADF) 8d701000 8d742000 rdbss rdbss.sys Mon Jul 13 18:14:26 2009 (4A5BBFD2) 8d742000 8d74c000 nsiproxy nsiproxy.sys Mon Jul 13 18:12:08 2009 (4A5BBF48) 8d74c000 8d756000 mssmbios mssmbios.sys Mon Jul 13 18:19:25 2009 (4A5BC0FD) 8d756000 8d762000 discache discache.sys Mon Jul 13 18:24:04 2009 (4A5BC214) 8d762000 8d7c6000 csc csc.sys Mon Jul 13 18:15:08 2009 (4A5BBFFC) 8d7c6000 8d7de000 dfsc dfsc.sys Tue Apr 26 21:33:45 2011 (4DB78089) 8d7de000 8d7ec000 blbdrive blbdrive.sys Mon Jul 13 18:23:04 2009 (4A5BC1D8) 8d7ec000 8d7fd000 amdppm amdppm.sys Mon Jul 13 18:11:03 2009 (4A5BBF07) 8dc20000 8e134000 atikmdag atikmdag.sys Thu Jun 25 18:16:16 2009 (4A440540) 8e134000 8e1eb000 dxgkrnl dxgkrnl.sys Mon Nov 01 21:37:53 2010 (4CCF7981) 8e200000 8e218000 rasl2tp rasl2tp.sys Mon Jul 13 18:54:33 2009 (4A5BC939) 8e218000 8e223000 ndistapi ndistapi.sys Mon Jul 13 18:54:24 2009 (4A5BC930) 8e22f000 8e268000 dxgmms1 dxgmms1.sys Wed Feb 02 21:34:49 2011 (4D4A2259) 8e268000 8e287000 HDAudBus HDAudBus.sys Mon Jul 13 18:50:55 2009 (4A5BC85F) 8e287000 8e30e000 Rt86win7 Rt86win7.sys Tue Jun 12 08:55:44 2012 (4FD74A60) 8e30e000 8e318000 usbohci usbohci.sys Thu Mar 24 22:06:11 2011 (4D8C06A3) 8e318000 8e363000 USBPORT USBPORT.SYS Thu Mar 24 22:06:22 2011 (4D8C06AE) 8e363000 8e372000 usbehci usbehci.sys Thu Mar 24 22:06:12 2011 (4D8C06A4) 8e372000 8e38a000 i8042prt i8042prt.sys Mon Jul 13 18:11:23 2009 (4A5BBF1B) 8e38a000 8e397000 kbdclass kbdclass.sys Mon Jul 13 18:11:15 2009 (4A5BBF13) 8e397000 8e3a1000 serenum serenum.sys Mon Jul 13 18:45:27 2009 (4A5BC717) 8e3a1000 8e3cd000 1394ohci 1394ohci.sys Mon Jul 13 18:51:59 2009 (4A5BC89F) 8e3cd000 8e3d6000 wmiacpi wmiacpi.sys Mon Jul 13 18:19:16 2009 (4A5BC0F4) 8e3d6000 8e3e3000 CompositeBus CompositeBus.sys Mon Jul 13 18:45:26 2009 (4A5BC716) 8e3e3000 8e3f5000 AgileVpn AgileVpn.sys Mon Jul 13 18:55:00 2009 (4A5BC954) 8e414000 8e436000 ndiswan ndiswan.sys Mon Jul 13 18:54:34 2009 (4A5BC93A) 8e436000 8e44e000 raspppoe raspppoe.sys Mon Jul 13 18:54:53 2009 (4A5BC94D) 8e44e000 8e465000 raspptp raspptp.sys Mon Jul 13 18:54:47 2009 (4A5BC947) 8e465000 8e47c000 rassstp rassstp.sys Mon Jul 13 18:54:57 2009 (4A5BC951) 8e47c000 8e486000 rdpbus rdpbus.sys Mon Jul 13 19:02:40 2009 (4A5BCB20) 8e486000 8e493000 mouclass mouclass.sys Mon Jul 13 18:11:15 2009 (4A5BBF13) 8e493000 8e494380 swenum swenum.sys Mon Jul 13 18:45:08 2009 (4A5BC704) 8e495000 8e4c9000 ks ks.sys Wed Mar 03 21:57:52 2010 (4B8F2FC0) 8e4c9000 8e4d7000 umbus umbus.sys Mon Jul 13 18:51:38 2009 (4A5BC88A) 8e4d7000 8e51b000 usbhub usbhub.sys Thu Mar 24 22:06:43 2011 (4D8C06C3) 8e51b000 8e52c000 NDProxy NDProxy.SYS Mon Jul 13 18:54:27 2009 (4A5BC933) 8e52c000 8e57c000 HdAudio HdAudio.sys Mon Jul 13 18:51:46 2009 (4A5BC892) 8e57c000 8e5ab000 portcls portcls.sys Mon Jul 13 18:51:00 2009 (4A5BC864) 8e5ab000 8e5c4000 drmk drmk.sys Mon Jul 13 19:36:05 2009 (4A5BD2F5) 8ea02000 8eca0540 RTKVHDA RTKVHDA.sys Tue Aug 18 04:30:35 2009 (4A8A74BB) 8eca1000 8ecac000 hidusb hidusb.sys Mon Jul 13 18:51:04 2009 (4A5BC868) 8ecac000 8ecbf000 HIDCLASS HIDCLASS.SYS Mon Jul 13 18:51:01 2009 (4A5BC865) 8ecbf000 8ecc5480 HIDPARSE HIDPARSE.SYS Mon Jul 13 18:50:59 2009 (4A5BC863) 8ecc6000 8ecc7700 USBD USBD.SYS Thu Mar 24 22:06:06 2011 (4D8C069E) 8ecc8000 8ecde000 cdfs cdfs.sys Mon Jul 13 18:11:14 2009 (4A5BBF12) 8ecde000 8ece9000 mouhid mouhid.sys Mon Jul 13 18:45:08 2009 (4A5BC704) 8ece9000 8ecf3000 Dxapi Dxapi.sys Mon Jul 13 18:25:25 2009 (4A5BC265) 8ecf3000 8ed00000 crashdmp crashdmp.sys Mon Jul 13 18:45:50 2009 (4A5BC72E) 8ed00000 8ed0b000 dump_ataport dump_ataport.sys Mon Jul 13 18:11:16 2009 (4A5BBF14) 8ed0b000 8ed14000 dump_atapi dump_atapi.sys Mon Jul 13 18:11:15 2009 (4A5BBF13) 8ed14000 8ed25000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 18:12:47 2009 (4A5BBF6F) 8ed25000 8ed30000 monitor monitor.sys Mon Jul 13 18:25:58 2009 (4A5BC286) 8ed30000 8ed4b000 luafv luafv.sys Mon Jul 13 18:15:44 2009 (4A5BC020) 8ed4b000 8ed65000 WudfPf WudfPf.sys Mon Jul 13 18:50:13 2009 (4A5BC835) 8ed65000 8ed75000 lltdio lltdio.sys Mon Jul 13 18:53:18 2009 (4A5BC8EE) 8ed75000 8ed88000 rspndr rspndr.sys Mon Jul 13 18:53:20 2009 (4A5BC8F0) 8ed88000 8eda9000 srvnet srvnet.sys Thu Apr 28 21:57:12 2011 (4DBA2908) 8eda9000 8edf8000 srv2 srv2.sys Thu Apr 28 21:57:19 2011 (4DBA290F) 930d0000 93320000 win32k win32k.sys Wed Jul 18 12:10:08 2012 (5006EDF0) 93330000 93339000 TSDDD TSDDD.dll Mon Jul 13 19:01:40 2009 (4A5BCAE4) 93360000 9337e000 cdd cdd.dll Mon Nov 01 23:23:36 2010 (4CCF9248) 94a09000 94a8e000 HTTP HTTP.sys Mon Jul 13 18:12:53 2009 (4A5BBF75) 94a8e000 94aa7000 bowser bowser.sys Tue Feb 22 23:05:24 2011 (4D649594) 94aa7000 94ab9000 mpsdrv mpsdrv.sys Mon Jul 13 18:52:52 2009 (4A5BC8D4) 94ab9000 94adc000 mrxsmb mrxsmb.sys Tue May 03 21:43:40 2011 (4DC0BD5C) 94adc000 94b17000 mrxsmb10 mrxsmb10.sys Fri Jul 08 21:26:07 2011 (4E17BC3F) 94b17000 94b32000 mrxsmb20 mrxsmb20.sys Tue May 03 21:43:47 2011 (4DC0BD63) 94b4a000 94be1000 peauth peauth.sys Mon Jul 13 19:35:44 2009 (4A5BD2E0) 94be1000 94beb000 secdrv secdrv.SYS Wed Sep 13 08:18:32 2006 (45080528) 94beb000 94bf8000 tcpipreg tcpipreg.sys Mon Jul 13 18:54:14 2009 (4A5BC926) 95c37000 95c89000 srv srv.sys Thu Apr 28 21:57:31 2011 (4DBA291B) 95c89000 95cf3000 spsys spsys.sys Mon May 11 11:37:10 2009 (4A085436) 95cf3000 95d0a000 USBSTOR USBSTOR.SYS Thu Mar 10 22:08:24 2011 (4D79A038) 95d0a000 95d34000 fastfat fastfat.SYS Mon Jul 13 18:14:01 2009 (4A5BBFB9) Unloaded modules: 94b32000 94b4a000 parport.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00018000 889c9000 889d6000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0000D000 889d6000 889e1000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0000B000 889e1000 889ea000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00009000 889ea000 889fb000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00011000
Oh oh... I think I HAD enabled driver verifier. It was in OCCT! It warned me but I still went ahead like a noob. Followed the instructions and disabled it now.
okay fingers crossed then. It should prevent that last specific crash from occurring anyhow.
...it's also completely possible it's been responsible for all of this.
It's really only meant to be used in debugging situations, it's job is basically to cause problems.
You sir would make a flower shrink, if it was purple, and named Sherlock. The only fingers that will be crossed are mine. You save your magical fingers for saving the day for people like me.
Just a minor detail. It couldn't have been causing all the bsods. Because I enabled it only yesterday. It was in SF diagnostic tool. I confused it with OCCT. Embarrassing, but what the hell. I'm pretty relieved. For now.