New
#11
If you are sure that the memory is free from errors, enable driver verifier for one more time. This crash dump is not providing about on which it is crashed.
BTW, it appears that Daemon Tools are still there.
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {3452, 402000, fffff70001084b70, 8dd00001a9c83424} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+35163 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000003452, The subtype of the bugcheck. Arg2: 0000000000402000 Arg3: fffff70001084b70 Arg4: 8dd00001a9c83424 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_3452 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT PROCESS_NAME: rundll32.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff800030ffe33 to fffff8000308ebc0 STACK_TEXT: fffff880`07928ee8 fffff800`030ffe33 : 00000000`0000001a 00000000`00003452 00000000`00402000 fffff700`01084b70 : nt!KeBugCheckEx fffff880`07928ef0 fffff800`0305f892 : fffffa80`0a951b30 fffffa80`00000000 fffff8a0`000001fc fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x35163 fffff880`079297a0 fffff800`0336315a : fffff8a0`0210c060 fffff880`07929ae0 00000000`00000000 fffffa80`0a8991d0 : nt!MmCleanProcessAddressSpace+0x96 fffff880`079297f0 fffff800`033492ed : 00000000`000000ff 00000000`00000001 000007ff`fffd6000 fffffa80`0a905550 : nt!PspExitThread+0x56a fffff880`079298f0 fffff800`030816fa : 00000000`00000001 fffff880`07929a68 00000000`0095f800 00000000`00000000 : nt!PsExitSpecialApc+0x1d fffff880`07929920 fffff800`03081a40 : 00000000`77cf45e8 fffff880`079299a0 fffff800`03349260 00000000`00000001 : nt!KiDeliverApc+0x2ca fffff880`079299a0 fffff800`0308def7 : fffffa80`0a8991d0 00000000`77cf45c0 00000000`000000c0 00000000`00000000 : nt!KiInitiateUserApc+0x70 fffff880`07929ae0 00000000`77c42bba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`0095f618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c42bba STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+35163 fffff800`030ffe33 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35163 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035 FAILURE_BUCKET_ID: X64_0x1a_3452_nt!_??_::FNODOBFM::_string_+35163 BUCKET_ID: X64_0x1a_3452_nt!_??_::FNODOBFM::_string_+35163 Followup: MachineOwner ---------