New
#1
BSOD STOP: 0x0000007E
After startup animation everytime I see BSOD. I tried all recovery options none succeded. I am attached the crach dump , can you please help me.
After startup animation everytime I see BSOD. I tried all recovery options none succeded. I am attached the crach dump , can you please help me.
Sirishkumar,
That could be bad drivers or a bad BIOS. Since it occurs after Windows starts, it is morelikely a bad driver. Start up your computer and hit F8 until the menu pop up. Choose last known good configuration and try that.
Is this a new install, or did this just occur? If it is a new install, try reinstalling.
~Lordbob
Hi and welcome
this crashed was probably caused by Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility. The dmp seems to indicate ntkrpamp.exe.
I would run a system file check
type cmd in search>right click and run as admin>sfc /scannow
Let us know the results as it may need to be run more than once
If you are overclocking STOP
Ken J
These arre old drivers from as far back as 2005 they need to be updated
Code:mdmxsdk.sys 0x967db000 0x967de100 0x00003100 0x4344688d 10/5/2005 6:58:05 PM rimmptsk.sys 0x8ff52000 0x8ff59100 0x00007100 0x437beacf 11/16/2005 9:28:31 PM HSX_CNXT.sys 0x904f8000 0x905ae000 0x000b6000 0x438fa5f5 12/1/2005 8:40:05 PM HSXHWAZL.sys 0x90119000 0x90153000 0x0003a000 0x438fa5fa 12/1/2005 8:40:10 PM HSX_DPV.sys 0x90401000 0x904f8000 0x000f7000 0x438fa624 12/1/2005 8:40:52 PM rimsptsk.sys 0x8ff5a000 0x8ff66a80 0x0000ca80 0x43aa5d8d 12/22/2005 3:02:21 AM secdrv.SYS 0x980ac000 0x980b6000 0x0000a000 0x45080528 9/13/2006 8:18:32 AM rixdptsk.sys 0x8ff67000 0x8ffb8000 0x00051000 0x455a6ed7 11/14/2006 8:35:19 PM bcm4sbxp.sys 0x8fefc000 0x8ff0d000 0x00011000 0x4562f047 11/21/2006 7:25:43 AMCode:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\K\Desktop\121809-36675-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*d:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.x86fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0x82a42000 PsLoadedModuleList = 0x82b8a810 Debug session time: Fri Dec 18 02:13:06.350 2009 (GMT-5) System Uptime: 0 days 1:00:25.455 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {3f3f3f3f, 2, 1, 82a67a72} Probably caused by : ntkrpamp.exe ( nt!KiRequestProcessInSwap+72 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 3f3f3f3f, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82a67a72, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82baa718 Unable to read MiSystemVaType memory at 82b8a160 3f3f3f3f CURRENT_IRQL: 2 FAULTING_IP: nt!KiRequestProcessInSwap+72 82a67a72 8902 mov dword ptr [edx],eax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: 8a91f718 -- (.trap 0xffffffff8a91f718) ErrCode = 00000002 eax=84ce480c ebx=84ce47cc ecx=00029960 edx=3f3f3f3f esi=84ce4798 edi=0002991c eip=82a67a72 esp=8a91f78c ebp=8a91f7a4 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!KiRequestProcessInSwap+0x72: 82a67a72 8902 mov dword ptr [edx],eax ds:0023:3f3f3f3f=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82a67a72 to 82a887eb STACK_TEXT: 8a91f718 82a67a72 badb0d00 3f3f3f3f 84ce1938 nt!KiTrap0E+0x2cf 8a91f7a4 82a6805a 84ce47f8 0002991c 00000000 nt!KiRequestProcessInSwap+0x72 8a91f7bc 82ab3793 84ce47f8 84ce4798 00000000 nt!KiInSwapSingleProcess+0x68 8a91f7d0 82ad66d6 3f3f3f3f 8a91fa00 84ce4908 nt!KiAttachProcess+0x87 8a91f868 82a82d8d 00000008 00000282 8597d260 nt!KeStackAttachProcess+0xbe 8a91f86c 00000000 00000282 8597d260 800008c0 nt!ZwClose+0x11 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiRequestProcessInSwap+72 82a67a72 8902 mov dword ptr [edx],eax SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiRequestProcessInSwap+72 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007 FAILURE_BUCKET_ID: 0xA_nt!KiRequestProcessInSwap+72 BUCKET_ID: 0xA_nt!KiRequestProcessInSwap+72 Followup: MachineOwner ---------