Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD when watching videos?

31 Oct 2013   #1

64 Home Premium
 
 
BSOD when watching videos?

Hello, terribly sorry if I do not have all the information right away. I read as much as possible to provide you the information I currently have.

Anyways, I've recently been receiving some BSODs. I believe I've started to find a connection to them. The past 2 BSODs seem to have happened when I am watching an online video. Not movies. Just short funny videos. I believe around the time I got my 1st BSOD(I've had atleast 4 now) I had attempted to do an update via Windows Update on my IDT Audio. It attempts to update and then says it has failed. I've attempted to update manually, but I cannot seem to find where to update it online.


I've gone and tried to disk defrag my computer. And it doesn't seem to completely defrag. It is like it does it split second defrag!

I don't think my Avast does a whole lot, but I have it scan daily and it doesn't find any issues so far.

I really don't do a whole lot on my laptop these days. Just internet, buy some music on iTunes, watch YouTube, search the web, download maybe a movie or 2 every month? I used to play World of Warcraft on my laptop. Around the end of the Cataclysm expansion, I had a custom made computer designed for my husband. The rig he had at the time could not completely run Star Wars: The Old Republic. So for his birthday he received a $2k custom computer. He was insanely happy and I received his previous rig, Dell XPS and I now play Warcraft on that computer with no problems. That was a little off topic, sorry, I babble on sometimes.

Anyways, I've attached the dump file I read about on the posting instructions page. I hope you can help me solve this problem. While I won't be at a complete loss if I lose my laptop, it holds a sentimental value to me since it was the very 1st thing I saved up money for and made me feel accomplished at the time. Thank you for reading and for any help you provide me.

ETA: I cannot seem to be able to attach the zip folder. I believe I've followed all instructions as closely as possible. But I can only open the folder, not attach it.

My System SpecsSystem Spec
.

31 Oct 2013   #2

Windows 7 Home Premium x64
 
 

Hello and welcome to SF .
Thank you for the background information you provided (it's OK you babble to your hearts content).

How much does the file generated by the SFDT weight (in MB)?
My System SpecsSystem Spec
31 Oct 2013   #3

64 Home Premium
 
 

Okay, apparently the file wasn't finished uploading. I went to the kitchen, came back to a box saying "__ copy has been made" clicked okay, had a few more of the same type of boxes with different names in the blank and clicked okay for them and then got the notification to make it a compressed(zip) folder and can upload it to my thread. So, here is the attached file!


Attached Files
File Type: zip SF_31-10-2013.zip (2.18 MB, 1 views)
My System SpecsSystem Spec
.


31 Oct 2013   #4

64 Home Premium
 
 

I want to note that I don't have a BSOD every time I watch a video. It just seems to occur when I am watching a video.
My System SpecsSystem Spec
31 Oct 2013   #5

Windows 7 Home Premium x64
 
 

Hi, thanks for the files.

I went through the dump files and apart from a few outdated drivers and security oriented software
conflicts, the bug check code is darting around which more often than not
indicates problems regarding the RAM (memory).
  • Also take special note of bug check DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1), second from the bottom of the summaries posted below.

Testing the RAM:

Quote   Quote: Originally Posted by koolkat77 View Post
Test and Diagnose RAM Issues with Memtest86+:
Tip   Tip
  • Pay close attention to part 3 of the tutorial "If you have errors"
  • Test the RAM with Memtest86+ for at least 7-10 passes. It may take up to 22 passes to find problems. Make sure to run it once after the system has been on for a few hours and is warm, and then also run it again when the system has been off for a few hours and is cold.
When done with the testing procedure take a picture and upload it here.



Code:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002ec1001

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ec1169 to fffff80002ec1bc0

STACK_TEXT:  
fffff800`00ba4d28 fffff800`02ec1169 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02ebf632 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02ec1001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x1a6


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02ebf632 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  521ea035

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------
Code:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005001, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000001d43b
Arg4: 0001d4310003a874

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5001

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002eef5af to fffff80002e86b80

STACK_TEXT:  
fffff880`0924b9c8 fffff800`02eef5af : 00000000`0000001a 00000000`00005001 fffff700`01080000 00000000`0001d43b : nt!KeBugCheckEx
fffff880`0924b9d0 fffff800`02e933fe : 00000000`00000001 00000000`1a34f000 fffff880`0924bc20 fffff680`000d1a78 : nt! ?? ::FNODOBFM::`string'+0x2993d
fffff880`0924bac0 fffff800`02e84cae : 00000000`00000001 00000000`1a34f000 00000000`00000001 00000000`0000004a : nt!MmAccessFault+0x5de
fffff880`0924bc20 00000000`6eeb604a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0024e378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6eeb604a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+2993d
fffff800`02eef5af cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2993d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  51fb06cd

FAILURE_BUCKET_ID:  X64_0x1a_5001_nt!_??_::FNODOBFM::_string_+2993d

BUCKET_ID:  X64_0x1a_5001_nt!_??_::FNODOBFM::_string_+2993d

Followup: MachineOwner
Code:
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffffa8006b25730, The pool entry we were looking for within the page.
Arg3: fffffa8006b25bc0, The next pool entry.
Arg4: 0000000004490015, (reserved)

Debugging Details:
------------------


BUGCHECK_STR:  0x19_20

POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b9100
GetUlongFromAddress: unable to read from fffff800030b91c0
 fffffa8006b25730 Nonpaged pool

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  AvastSvc.exe

CURRENT_IRQL:  2

TAG_NOT_DEFINED_c000000f:  FFFFF88003722FB0

LAST_CONTROL_TRANSFER:  from fffff80002fb4cae to fffff80002e81b80

STACK_TEXT:  
fffff880`03722ac8 fffff800`02fb4cae : 00000000`00000019 00000000`00000020 fffffa80`06b25730 fffffa80`06b25bc0 : nt!KeBugCheckEx
fffff880`03722ad0 fffff880`0139a7e1 : fffffa80`042a61a0 00000000`00000001 fffffa80`4c627249 00000000`00000000 : nt!ExDeferredFreePool+0x12da
fffff880`03722b80 fffff880`013a2476 : 00000000`00000002 fffff880`0484f353 fffff880`03722c40 00000000`00000100 : ataport!IdepFreeCrb+0x3d
fffff880`03722bb0 fffff880`0139ce32 : 00000000`00000002 00000000`00000000 fffffa80`00000000 00000000`00000100 : ataport!IdeCompleteCrb+0x2a
fffff880`03722be0 fffff880`013a5821 : fffffa80`042a61a0 fffffa80`06b25740 00000000`00000000 00000000`00000000 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`03722d10 fffff880`013a5120 : fffffa80`042a61a0 00000000`00000000 fffffa80`042a61a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`03722e40 fffff800`02e8c30c : fffff880`009e8180 fffffa80`04882db0 fffffa80`042a6050 fffffa80`042a6118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`03722f00 fffff800`02e84d15 : 00000000`00000000 fffffa80`0438c060 00000000`00000000 fffff880`013a4f78 : nt!KiRetireDpcList+0x1bc
fffff880`03722fb0 fffff800`02e84b2c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08f68be0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdepFreeCrb+3d
fffff880`0139a7e1 eb19            jmp     ataport!IdepFreeCrb+0x58 (fffff880`0139a7fc)

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  ataport!IdepFreeCrb+3d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  51fef9b5

FAILURE_BUCKET_ID:  X64_0x19_20_ataport!IdepFreeCrb+3d

BUCKET_ID:  X64_0x19_20_ataport!IdepFreeCrb+3d

Followup: MachineOwner
---------
Code:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880044d17c6, Address of the instruction which caused the bugcheck
Arg3: fffff880079c5ea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
aswSP+f7c6
fffff880`044d17c6 48396b48        cmp     qword ptr [rbx+48h],rbp

CONTEXT:  fffff880079c5ea0 -- (.cxr 0xfffff880079c5ea0)
rax=fffff880045063f0 rbx=0000000100000001 rcx=00000000000002c8
rdx=0000000000000000 rsi=fffff880044cf300 rdi=0000000000000200
rip=fffff880044d17c6 rsp=fffff880079c6880 rbp=00000000000002c8
 r8=fffffa80047466c0  r9=0000000000000088 r10=0000000000000001
r11=0000000000000000 r12=fffff880079c69c0 r13=0000000000000001
r14=0000000000000001 r15=fffffa80047495e0
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010207
aswSP+0xf7c6:
fffff880`044d17c6 48396b48        cmp     qword ptr [rbx+48h],rbp ds:002b:00000001`00000049=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880044d17c6

STACK_TEXT:  
fffff880`079c6880 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : aswSP+0xf7c6


FOLLOWUP_IP: 
aswSP+f7c6
fffff880`044d17c6 48396b48        cmp     qword ptr [rbx+48h],rbp

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  aswSP+f7c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: aswSP

IMAGE_NAME:  aswSP.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4dc929b6

STACK_COMMAND:  .cxr 0xfffff880079c5ea0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_aswSP+f7c6

BUCKET_ID:  X64_0x3B_aswSP+f7c6

Followup: MachineOwner
Code:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff88000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: fffffa8003f0d100, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.

FAULTING_IP: 
+0
fffff880`00000000 ff              ???

BUGCHECK_STR:  0x1E_c000001d

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  AvastSvc.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ed5a88 to fffff80002e8afc0

FAILED_INSTRUCTION_ADDRESS: 
+0
fffff880`00000000 ff              ???

STACK_TEXT:  
fffff880`040baa88 fffff800`02ed5a88 : 00000000`0000001e ffffffff`c000001d fffff880`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`040baa90 fffff800`02e8a642 : fffff880`040bb268 00000000`00000200 fffff880`040bb310 ffffffff`80004f20 : nt! ?? ::FNODOBFM::`string'+0x487ad
fffff880`040bb130 fffff800`02e8879f : fffff880`040bb310 00000000`00000000 fffffa80`03f0d000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`040bb310 fffff880`00000000 : 00000000`00000200 ffffffff`80004f20 fffff8a0`00000005 00000000`000007ff : nt!KiInvalidOpcodeFault+0x11f
fffff880`040bb4a0 00000000`00000200 : ffffffff`80004f20 fffff8a0`00000005 00000000`000007ff fffff880`040bb5c8 : 0xfffff880`00000000
fffff880`040bb4a8 ffffffff`80004f20 : fffff8a0`00000005 00000000`000007ff fffff880`040bb5c8 00000000`00000000 : 0x200
fffff880`040bb4b0 fffff8a0`00000005 : 00000000`000007ff fffff880`040bb5c8 00000000`00000000 ffffffff`80004f20 : 0xffffffff`80004f20
fffff880`040bb4b8 00000000`000007ff : fffff880`040bb5c8 00000000`00000000 ffffffff`80004f20 ffffffff`800046d8 : 0xfffff8a0`00000005
fffff880`040bb4c0 fffff880`040bb5c8 : 00000000`00000000 ffffffff`80004f20 ffffffff`800046d8 00000000`00000000 : 0x7ff
fffff880`040bb4c8 00000000`00000000 : ffffffff`80004f20 ffffffff`800046d8 00000000`00000000 00000000`00000000 : 0xfffff880`040bb5c8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+487ad
fffff800`02ed5a88 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+487ad

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  503f82be

FAILURE_BUCKET_ID:  X64_0x1E_c000001d_BAD_IP_nt!_??_::FNODOBFM::_string_+487ad

BUCKET_ID:  X64_0x1E_c000001d_BAD_IP_nt!_??_::FNODOBFM::_string_+487ad

Followup: MachineOwner
Code:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000b824b48b48, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 000000b824b48b48, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fd100
GetUlongFromAddress: unable to read from fffff800030fd1c0
 000000b824b48b48 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
+0
000000b8`24b48b48 ??              ???

PROCESS_NAME:  FlashPlayerPlu

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xD1

TRAP_FRAME:  fffff80002ed0170 -- (.trap 0xfffff80002ed0170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=000000b824b48b48 rsp=fffff80002ed0304 rbp=fffff880009e8180
 r8=0000000000000029  r9=0000000000000000 r10=0000000000000000
r11=0000000000000064 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
000000b8`24b48b48 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ec51a9 to fffff80002ec5c00

FAILED_INSTRUCTION_ADDRESS: 
+0
000000b8`24b48b48 ??              ???

CHKIMG_EXTENSION: !chkimg -d !nt
604 errors : !nt (fffff80002ed0008-fffff80002ed02ff)
Code:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000001127
Arg4: 00000fa30000224c

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  AvastSvc.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88003c7a930 -- (.trap 0xfffff88003c7a930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000ed0000
rdx=0000000000ec2000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031aa512 rsp=fffff88003c7aac0 rbp=fffff88003c7aca0
 r8=0000000000000000  r9=0000000000010000 r10=fffffa80033e99f0
r11=0000000000120189 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!NtReadFile+0x142:
fffff800`031aa512 0fb602          movzx   eax,byte ptr [rdx] ds:00000000`00ec2000=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e59700 to fffff80002ebfc00

STACK_TEXT:  
fffff880`03c7a7c8 fffff800`02e59700 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00001127 : nt!KeBugCheckEx
fffff880`03c7a7d0 fffff800`02ebdd2e : 00000000`00000000 00000000`00ec2000 00000000`00ec0000 fffffa80`04bd0f20 : nt! ?? ::FNODOBFM::`string'+0x45f7d
fffff880`03c7a930 fffff800`031aa512 : 00000000`0189e700 fffffa80`00000001 fffffa80`033e99f0 fffffa80`058f0601 : nt!KiPageFault+0x16e
fffff880`03c7aac0 fffff800`02ebee93 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x142
fffff880`03c7abb0 00000000`72e62e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0189f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72e62e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+45f7d
fffff800`02e59700 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+45f7d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5147d9c6

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+45f7d

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+45f7d

Followup: MachineOwner
---------
My System SpecsSystem Spec
31 Oct 2013   #6

64 Home Premium
 
 

So I need to run the test that you linked?
I'd have to wait until my husband gets home with his flash drive. My flash drive seems to have magically disappeared, remember keeping it only in 1 particular spot and now it is not there :P And we don't have any blank CD's laying around.
My System SpecsSystem Spec
31 Oct 2013   #7

Windows 7 Home Premium x64
 
 

Yes please .
It's OK, take your time.
My System SpecsSystem Spec
01 Nov 2013   #8

64 Home Premium
 
 

So my husband broke his flash drive. I had told him I felt like it wasn't a good idea to keep it on his keys.
Can I do this scan via an external hard drive? It's the only other thing I have available to me currently....without going out and purchasing a new flash drive.
My System SpecsSystem Spec
01 Nov 2013   #9

Windows 7 Home Premium x64
 
 

Yes you can perform the test using a CD, just follow Method 2: With a CD of the tutorial.
My System SpecsSystem Spec
01 Nov 2013   #10

64 Home Premium
 
 

External hard drive. One that you plug into a USB port.
My System SpecsSystem Spec
Reply

 BSOD when watching videos?




Thread Tools



Similar help and support threads for2: BSOD when watching videos?
Thread Forum
BSOD while watching MLB.com videos BSOD Help and Support
BSOD watching videos off the net. BSOD Help and Support
Solved Several Different BSOD While Watching Videos BSOD Help and Support
BSOD When Watching Videos BSOD Help and Support
BSOD while watching videos BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 01:19 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33