Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD again

05 Oct 2010   #11
lightice

Win 7 ultimate 64 bit
 
 

Thanks Carl,

I will update the progress here.


My System SpecsSystem Spec
.
05 Oct 2010   #12
CarlTR6

Windows 7 Ultimate 32 bit
 
 

You are welcome. I did not mean to butt in. When I came online, cybercore was not online. I see he is now. But maybe getting rid of AVG will work for you.
My System SpecsSystem Spec
05 Oct 2010   #13
lightice

Win 7 ultimate 64 bit
 
 

Quote   Quote: Originally Posted by CarlTR6 View Post
You are welcome. I did not mean to butt in. When I came online, cybercore was not online. I see he is now. But maybe getting rid of AVG will work for you.
No problem, any help is appreciated.
I can't seem to use the AVG removal tools you linked.

It just doesn't work. I got this log file posted:
It basically said I didn't have anything installed?

Update 1: I uninstalled using the uninstall for AVG in the start menu. Will download MS essentials now.
My System SpecsSystem Spec
.

05 Oct 2010   #14
cybercore

Windows 7 x64
 
 

Thank you for attaching the latest info. Ok, let's see:


100610-23930-01.dmp
Caused by : ASACPI.sys

100610-23930-01.dmp
Caused by : ASACPI.sys

100510-31449-01.dmp
Caused by : Pool_Corruption

It's still bugging out:

ASACPI.sys Mon Mar 28 05:30:36 2005

Update it before we proceed to Memtest86+ - Advanced Memory Diagnostic Tool.




Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100610-23930-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
System Uptime: 0 days 2:40:17.023
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C9, {22f, fffff8800fe829a0, fffff9801cf74cf0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\ASACPI.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ASACPI.sys
*** ERROR: Module load completed but symbols could not be loaded for ASACPI.sys
Probably caused by : ASACPI.sys ( ASACPI+19a0 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000022f, The caller has completed an untouched IRP_MJ_PNP (instead of passing the IRP down),
    or non-PDO has failed the IRP using incorrect value of STATUS_NOT_SUPPORTED.
Arg2: fffff8800fe829a0, The address in the driver's code where the error was detected.
Arg3: fffff9801cf74cf0, IRP address.
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0xc9_22f

DRIVER_VERIFIER_IO_VIOLATION_TYPE:  22f

FAULTING_IP: 
ASACPI+19a0
fffff880`0fe829a0 53              push    rbx

FOLLOWUP_IP: 
ASACPI+19a0
fffff880`0fe829a0 53              push    rbx

IRP_ADDRESS:  fffff9801cf74cf0

DEVICE_OBJECT: fffffa80060a7610

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  2

LOCK_ADDRESS:  fffff80002e74400 -- (!locks fffff80002e74400)

Resource @ nt!PiEngineLock (0xfffff80002e74400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
    Lock address  : 0xfffff80002e74400
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff800030fa3dc to fffff80002c70740

STACK_TEXT:  
fffff880`02fe1368 fffff800`030fa3dc : 00000000`000000c9 00000000`0000022f fffff880`0fe829a0 fffff980`1cf74cf0 : nt!KeBugCheckEx
fffff880`02fe1370 fffff800`0310447a : fffff800`030f89f0 fffff880`0fe829a0 fffff980`1cf74cf0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`02fe13b0 fffff800`03105483 : 00000000`0000022f fffff980`1cf74cf0 fffff980`1cf74cf0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`02fe1400 fffff800`03110eed : 00000000`00000000 00000000`00000000 fffff800`02dfd440 00000000`00000000 : nt!VfErrorReport1+0x63
fffff880`02fe14a0 fffff800`030fa04e : fffffa80`04ae23a8 00000000`00000001 00000000`00000000 00000000`00000000 : nt!VfPnpVerifyIrpStackUpward+0xdd
fffff880`02fe1500 fffff800`03106b2d : fffffa80`058385f0 fffffa80`04ae2010 fffff980`1cf74cf0 fffff980`1cf74cf0 : nt!VfMajorVerifyIrpStackUpward+0x6e
fffff880`02fe1540 fffff800`0311850d : fffff980`1cf74f70 fffff880`02fe1720 00000000`c00000bb fffff980`1cf74f70 : nt!IovpCompleteRequest2+0xad
fffff880`02fe15b0 fffff800`02c72d26 : fffff980`1cf74f73 fffff800`00000000 00000000`00000001 fffff880`00000005 : nt!IovpLocalCompletionRoutine+0x9d
fffff880`02fe1610 fffff800`0311019f : fffff980`1cf74cf0 00000000`00000000 fffffa80`060a7b00 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02fe16f0 fffff880`0fe82a13 : fffff880`02fe1878 fffff800`031032a7 00000000`c00000bb fffffa80`060a7bd0 : nt!IovCompleteRequest+0x19f
fffff880`02fe17c0 fffff880`02fe1878 : fffff800`031032a7 00000000`c00000bb fffffa80`060a7bd0 fffff980`1cf74fb8 : ASACPI+0x1a13
fffff880`02fe17c8 fffff800`031032a7 : 00000000`c00000bb fffffa80`060a7bd0 fffff980`1cf74fb8 fffffa80`05405ba0 : 0xfffff880`02fe1878
fffff880`02fe17d0 fffff800`03116c16 : fffff980`1cf74cf0 00000000`00000002 fffff980`1cf74cf0 fffff800`0311237e : nt!VfIrpAllocateCallDriverData+0x47
fffff880`02fe1800 fffff800`0311952a : fffff980`1cf74f70 fffffa80`060a7bd0 fffffa80`060a7610 fffffa80`05405ba0 : nt!IovCallDriver+0x566
fffff880`02fe1860 fffff800`03116c16 : fffff980`1cf74cf0 00000000`00000002 fffffa80`060a7610 fffffa80`055219a0 : nt!ViFilterDispatchPnp+0x13a
fffff880`02fe1890 fffff800`0302f06e : fffff980`1cf74cf0 fffff880`02fe1970 fffffa80`060a7610 fffffa80`055219a0 : nt!IovCallDriver+0x566
fffff880`02fe18f0 fffff800`03050f4a : fffffa80`05623060 fffff880`02fe1a40 00000000`00000000 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`02fe1930 fffff800`03051047 : 00000000`00000010 00000000`00010246 fffff880`02fe1b40 fffff880`02fe1c38 : nt!PiIrpQueryRemoveDevice+0xda
fffff880`02fe1a10 fffff800`0305a3cd : 00000000`00000000 fffffa80`05625890 fffff880`02fe1b40 00000000`00000000 : nt!PnpQueryRemoveLockedDeviceNode+0x67
fffff880`02fe1a40 fffff800`0305a490 : 00000000`00000000 fffff8a0`08bd6501 fffff8a0`02704bd0 ffffe6c5`0e43fa5f : nt!PnpDeleteLockedDeviceNode+0x8d
fffff880`02fe1a70 fffff800`030ea5b4 : 00000000`00000002 00000000`00000000 fffffa80`05625890 fffff8a0`08bd6550 : nt!PnpDeleteLockedDeviceNodes+0xa0
fffff880`02fe1ae0 fffff800`030eafdc : fffff880`00000000 00000000`00010200 fffff880`02fe1c00 00000000`00000000 : nt!PnpProcessQueryRemoveAndEject+0x864
fffff880`02fe1c20 fffff800`02fd60dc : 00000000`00000000 fffffa80`07758940 fffff8a0`08bd6550 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0x4c
fffff880`02fe1c50 fffff800`02c7d961 : fffff800`02edc008 fffff8a0`08bd6550 fffff800`02e155f8 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x58ffb
fffff880`02fe1cb0 fffff800`02f14c06 : 00000000`00000000 fffffa80`04607040 00000000`00000080 fffffa80`039ea040 : nt!ExpWorkerThread+0x111
fffff880`02fe1d40 fffff800`02c4ec26 : fffff880`009ec180 fffffa80`04607040 fffff880`009f6f40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fe1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  .bugcheck ; kb

SYMBOL_NAME:  ASACPI+19a0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ASACPI

IMAGE_NAME:  ASACPI.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  42476c4c

FAILURE_BUCKET_ID:  X64_0xc9_22f_VRF_ASACPI+19a0

BUCKET_ID:  X64_0xc9_22f_VRF_ASACPI+19a0

Followup: MachineOwner
---------

1: kd> lmvm ASACPI
start             end                 module name
fffff880`0fe81000 fffff880`0fe89000   ASACPI   T (no symbols)           
    Loaded symbol image file: ASACPI.sys
    Image path: \SystemRoot\system32\DRIVERS\ASACPI.sys
    Image name: ASACPI.sys
    Timestamp:        Mon Mar 28 05:30:36 2005 (42476C4C)
    CheckSum:         00003C77
    ImageSize:        00008000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4




















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100510-31449-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
System Uptime: 0 days 0:00:13.868
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
.............................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80000000009, 2, 1, fffff80002a9a44b}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+126d )

Followup: Pool_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80000000009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a9a44b, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb20e0
 fffff80000000009 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+c88
fffff800`02a9a44b 48894108        mov     qword ptr [rcx+8],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

IRP_ADDRESS:  fffff7ffffffff89

TRAP_FRAME:  fffff88002fedfb0 -- (.trap 0xfffff88002fedfb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff98002c64ff0 rbx=0000000000000000 rcx=fffff80000000001
rdx=fffff88002feefb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a9a44b rsp=fffff88002fee140 rbp=fffff88002fee290
 r8=fffff88002fee248  r9=fffff88002fee240 r10=0000000000000002
r11=fffff80002a997d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!IopCompleteRequest+0xc88:
fffff800`02a9a44b 48894108        mov     qword ptr [rcx+8],rax ds:a000:fffff800`00000009=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a79ca9 to fffff80002a7a740

STACK_TEXT:  
fffff880`02fede68 fffff800`02a79ca9 : 00000000`0000000a fffff800`00000009 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02fede70 fffff800`02a78920 : 00000000`80000000 fffff980`02fe6ee0 00000000`02fee0d0 fffff880`02fef0e0 : nt!KiBugCheckDispatch+0x69
fffff880`02fedfb0 fffff800`02a9a44b : ffffffff`80000234 fffff880`02ff0000 00000000`00000004 00000000`0000001b : nt!KiPageFault+0x260
fffff880`02fee140 fffff800`02a570c7 : fffff800`00000001 fffff880`02fee290 fffff880`02fee500 fffff880`00000000 : nt!IopCompleteRequest+0xc88
fffff880`02fee210 fffff800`02a57487 : fffff800`02c82000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02fee290 fffff800`02a530af : fffff880`00000003 00000000`00458a19 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
fffff880`02fee420 fffff800`02a52e62 : fffff800`02d171f9 fffff880`02fee630 fffffa80`045ca618 fffff880`02fee610 : nt!RtlLookupFunctionTable+0x12f
fffff880`02fee480 fffff800`02a1ab16 : 00000000`0002f790 00000000`00000000 fffff880`02fee610 00000000`00000000 : nt!RtlpLookupFunctionEntryForStackWalks+0x32
fffff880`02fee4f0 fffff800`02a1a967 : fffffa80`045ca618 fffff880`00000011 00000000`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x18e
fffff880`02feeb90 fffff800`02b3dc2b : 00000000`00000003 fffffa80`045ca618 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
fffff880`02feebc0 fffff800`02f110dc : fffffa80`045ca600 00000000`00000040 00000000`00000003 fffff800`02b711d1 : nt!RtlCaptureStackBackTrace+0x4b
fffff880`02feebf0 fffff800`02f1333a : fffff880`02fea000 fffff880`02ff0000 00000000`00000000 fffff800`02d5e630 : nt!IovpLogStackCallout+0x1c
fffff880`02feec20 fffff800`02f15c9a : fffff8a0`00794090 00000000`00000004 00000000`00000001 00000000`00000003 : nt!ViPoolLogStackTrace+0x8a
fffff880`02feec50 fffff800`02bad67c : fffff8a0`00794080 00000000`00000040 00000000`00000003 00000000`00000001 : nt!VfFreePoolNotification+0x4a
fffff880`02feec80 fffff800`02e2bd66 : fffff8a0`00063190 fffff800`02d17b71 fffff880`02feee30 01cb6492`00000000 : nt!ExDeferredFreePool+0x126d
fffff880`02feed30 fffff800`02dacbf0 : 00000000`00000010 fffff880`02feee30 fffff8a0`00065500 00000000`00000010 : nt!CmpCallCallBacks+0x4f6
fffff880`02feee00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x1394b


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+126d
fffff800`02bad67c 90              nop

SYMBOL_STACK_INDEX:  e

SYMBOL_NAME:  nt!ExDeferredFreePool+126d

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+126d

BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+126d

Followup: Pool_corruption
---------

















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\100310-22698-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
System Uptime: 0 days 0:03:58.523
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002a9f86e, fffff880099bf3f0, 0}

Probably caused by : memory_corruption ( nt!MiLocateWsle+e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002a9f86e, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880099bf3f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiLocateWsle+e
fffff800`02a9f86e 418b5320        mov     edx,dword ptr [r11+20h]

CONTEXT:  fffff880099bf3f0 -- (.cxr 0xfffff880099bf3f0)
rax=0000000000094b10 rbx=f3b0000094b10963 rcx=fffff8a009201000
rdx=fffff80002c05b40 rsi=ffffffffffffffff rdi=fffffa8006ccda10
rip=fffff80002a9f86e rsp=fffff880099bfdc0 rbp=fffffa8001be1300
 r8=fffff8a009201000  r9=0000000000007f3b r10=0000000fffffffff
r11=bffff781c0000000 r12=0000007ffffffff8 r13=fffff80002c05b40
r14=fffff6fc50049008 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!MiLocateWsle+0xe:
fffff800`02a9f86e 418b5320        mov     edx,dword ptr [r11+20h] ds:002b:bffff781`c0000020=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  TrustedInstall

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002a6f339 to fffff80002a9f86e

STACK_TEXT:  
fffff880`099bfdc0 fffff800`02a6f339 : 00000000`00040001 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiLocateWsle+0xe
fffff880`099bfe00 fffff800`02a6ed49 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!MiDeleteSystemPagableVm+0x179
fffff880`099bff60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFreePagedPoolPages+0x129


FOLLOWUP_IP: 
nt!MiLocateWsle+e
fffff800`02a9f86e 418b5320        mov     edx,dword ptr [r11+20h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiLocateWsle+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff880099bf3f0 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiLocateWsle+e

BUCKET_ID:  X64_0x3B_nt!MiLocateWsle+e

Followup: MachineOwner
---------

1: kd> lmtn
start             end                 module name
fffff800`00b9e000 fffff800`00ba8000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02a09000 fffff800`02fe5000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`02fe5000 fffff800`0302e000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c57000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00c57000 fffff880`00c9b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00c9b000 fffff880`00caf000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00caf000 fffff880`00d0d000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d0d000 fffff880`00dcd000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00dcd000 fffff880`00dfc000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`00e07000 fffff880`00eab000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00eab000 fffff880`00eba000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00eba000 fffff880`00fe0000   sptd     sptd.sys     Sun Oct 11 23:55:14 2009 (4AD24632)
fffff880`00fe0000 fffff880`00fe9000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fe9000 fffff880`00ff3000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00ff3000 fffff880`01000000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01060000 fffff880`0108a000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`0108a000 fffff880`01098000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`01098000 fffff880`010ac000   vpcnfltr vpcnfltr.sys Thu Jul 23 01:20:17 2009 (4A6790A1)
fffff880`010b7000 fffff880`010ea000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`010ea000 fffff880`010ff000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`010ff000 fffff880`01114000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01114000 fffff880`01170000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`01170000 fffff880`01177000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`01177000 fffff880`01187000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01187000 fffff880`011a1000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`011a1000 fffff880`011aa000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`011aa000 fffff880`011d4000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`011d4000 fffff880`011df000   msahci   msahci.sys   Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`011df000 fffff880`011ea000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`01200000 fffff880`01215000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`01216000 fffff880`013b9000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013b9000 fffff880`013e9000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`013f5000 fffff880`013fe000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0144c000 fffff880`01486000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01486000 fffff880`01498000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01498000 fffff880`014ae000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`014b6000 fffff880`01514000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01514000 fffff880`0152e000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0152e000 fffff880`015a1000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`015a1000 fffff880`015b2000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`015b2000 fffff880`015bc000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`015bc000 fffff880`015f6000   fvevol   fvevol.sys   Tue Jul 14 02:22:15 2009 (4A5BC1A7)
fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0164a000 fffff880`0165a000   vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0165a000 fffff880`01662000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01662000 fffff880`0166b000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`0166b000 fffff880`01672000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`01673000 fffff880`01765000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`01765000 fffff880`017c5000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`017c5000 fffff880`017f0000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02c8a000 fffff880`02c93000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02c93000 fffff880`02ca2000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02ca6000 fffff880`02ccb000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`02ccb000 fffff880`02cdb000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02cdb000 fffff880`02ce4000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02ce4000 fffff880`02ced000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02ced000 fffff880`02cf6000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02cf6000 fffff880`02d01000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02d01000 fffff880`02d12000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02d12000 fffff880`02d30000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02d30000 fffff880`02d3d000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02d3d000 fffff880`02d8e000   avgtdia  avgtdia.sys  Fri Jun 04 00:09:57 2010 (4C081A25)
fffff880`02d8e000 fffff880`02dd3000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02dd3000 fffff880`02df9000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03a01000 fffff880`03a1e000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`03a1e000 fffff880`03a39000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03a39000 fffff880`03a8ec00   vpcvmm   vpcvmm.sys   Thu Jul 23 01:20:22 2009 (4A6790A6)
fffff880`03a8f000 fffff880`03aa3000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03aa3000 fffff880`03af4000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03af4000 fffff880`03b00000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03b00000 fffff880`03b0b000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03b0b000 fffff880`03b1a000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03b1a000 fffff880`03b9d000   csc      csc.sys      Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`03b9d000 fffff880`03bbb000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03bbb000 fffff880`03bcc000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03bcc000 fffff880`03bd3080   avgmfx64 avgmfx64.sys Mon Apr 26 00:06:15 2010 (4BD4AEC7)
fffff880`03bd4000 fffff880`03bea000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`03bea000 fffff880`03bff000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`03c00000 fffff880`03cf4000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`03cf8000 fffff880`03d3f000   avgldx64 avgldx64.sys Fri Jun 04 00:06:48 2010 (4C081968)
fffff880`03d3f000 fffff880`03d65000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03d65000 fffff880`03d7b000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03d7b000 fffff880`03d99000   i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`03d99000 fffff880`03dde000   ai8tydqa ai8tydqa.SYS Wed Jul 15 00:12:55 2009 (4A5CF4D7)
fffff880`03dde000 fffff880`03dee000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`04000000 fffff880`0401d000   vpcusb   vpcusb.sys   Thu Jul 23 01:20:23 2009 (4A6790A7)
fffff880`0401d000 fffff880`0402c000   usbrpm   usbrpm.sys   Tue Jul 14 03:35:14 2009 (4A5BD2C2)
fffff880`0402c000 fffff880`0402df00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`0402e000 fffff880`0406a000   vpchbus  vpchbus.sys  Thu Jul 23 01:20:23 2009 (4A6790A7)
fffff880`0406a000 fffff880`040c4000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`040ce000 fffff880`040f2000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`040f2000 fffff880`040fe000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`040fe000 fffff880`0412d000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`0412d000 fffff880`04148000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04148000 fffff880`04169000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04169000 fffff880`04183000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04183000 fffff880`0418e000   rdpbus   rdpbus.sys   Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0418e000 fffff880`0419d000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0419d000 fffff880`0419e480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`0419f000 fffff880`041e2000   ks       ks.sys       Tue Jul 14 03:00:31 2009 (4A5BCA9F)
fffff880`041e2000 fffff880`041f4000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`041f4000 fffff880`041ff000   flpydisk flpydisk.sys Tue Jul 14 03:00:54 2009 (4A5BCAB6)
fffff880`05600000 fffff880`0560d000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`0560d000 fffff880`05621000   LMouFilt LMouFilt.Sys Thu Mar 18 10:51:24 2010 (4BA1E98C)
fffff880`05621000 fffff880`05644000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05644000 fffff880`05665000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`0566e000 fffff880`056ca000   HdAudio  HdAudio.sys  Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`056ca000 fffff880`05707000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05707000 fffff880`05729000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05729000 fffff880`0572e200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`0572f000 fffff880`0573d000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`0573d000 fffff880`05749000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05749000 fffff880`05752000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05752000 fffff880`05765000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05765000 fffff880`05771000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`05771000 fffff880`0577f000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`0577f000 fffff880`0579a000   USBSTOR  USBSTOR.SYS  Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`0579a000 fffff880`057b7000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`057b7000 fffff880`057c5000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`057c5000 fffff880`057de000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`057de000 fffff880`057e6080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`057e7000 fffff880`057fc000   LHidFilt LHidFilt.Sys Thu Mar 18 10:51:17 2010 (4BA1E985)
fffff880`05800000 fffff880`0582d000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`0582d000 fffff880`0587b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`0587b000 fffff880`0589e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`058d8000 fffff880`058f0000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`058f0000 fffff880`059b8000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`059b8000 fffff880`059d6000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`059d6000 fffff880`059ee000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`06000000 fffff880`06071000   spsys    spsys.sys    Mon May 11 20:20:58 2009 (4A085E7A)
fffff880`060a8000 fffff880`0614e000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`0614e000 fffff880`06159000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`06159000 fffff880`06186000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`06186000 fffff880`06198000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`06198000 fffff880`06200000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`06e07000 fffff880`06e9d000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`06e9d000 fffff880`06ed3000   fastfat  fastfat.SYS  Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`06ed3000 fffff880`06f04000   WUDFRd   WUDFRd.sys   Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff880`0fe00000 fffff880`0fe12000   L1E62x64 L1E62x64.sys Thu Jun 11 09:45:22 2009 (4A30A802)
fffff880`0fe12000 fffff880`0fe50000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`0fe50000 fffff880`0fe5d000   fdc      fdc.sys      Tue Jul 14 03:00:54 2009 (4A5BCAB6)
fffff880`0fe5d000 fffff880`0fe65000   ASACPI   ASACPI.sys   Mon Mar 28 05:30:36 2005 (42476C4C)
fffff880`0fe65000 fffff880`0fe71000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0fe71000 fffff880`0fe80000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0fe8c000 fffff880`10b1de00   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`10b1e000 fffff880`10b1f180   nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`10b20000 fffff880`10b66000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`10b66000 fffff880`10b73000   usbuhci  usbuhci.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`10b73000 fffff880`10bc9000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`10bc9000 fffff880`10bda000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`10bda000 fffff880`10bfe000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff960`000a0000 fffff960`003af000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      unavailable (00000000)
fffff960`00850000 fffff960`008b1000   ATMFD    ATMFD.DLL    Thu May 27 07:11:31 2010 (4BFDF0F3)

Unloaded modules:
fffff880`017f0000 fffff880`017fe000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013e9000 fffff880`013f5000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`015f6000 fffff880`015ff000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01200000 fffff880`01213000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
05 Oct 2010   #15
lightice

Win 7 ultimate 64 bit
 
 

I think the dmp files for the ACPI bug I managed to clear.
The BSOD tool dumped it into the same folder, and I followed instructions into not modifying the folder.

But for ATK110, I have updated and it's driver is dated 2009 at the moment.

The latest crash after I updated everything except ATK110 was 100610-23930-01.dmp based on the timing of the file on my computer; this was before I updated ATK110. This crash came about when I tried to do an 'update' to ATK110 driver.

I rebooted and uninstalled the driver, rebooted, and installed the new one. It's updated now. No crashes thus far.

Uninstalled AVG, getting MS essentials now.
My System SpecsSystem Spec
05 Oct 2010   #16
cybercore

Windows 7 x64
 
 

Quote   Quote: Originally Posted by CarlTR6 View Post
You are welcome. I did not mean to butt in. When I came online, cybercore was not online. I see he is now. But maybe getting rid of AVG will work for you.
No problem, Carl, and you are right. I also suggested to uninstall it in my 1st post. But this ASUS 2005 has to be taken care of.
My System SpecsSystem Spec
05 Oct 2010   #17
cybercore

Windows 7 x64
 
 

Quote   Quote: Originally Posted by lightice View Post
I think the dmp files for the ACPI bug I managed to clear.
The BSOD tool dumped it into the same folder, and I followed instructions into not modifying the folder.

But for ATK110, I have updated and it's driver is dated 2009 at the moment.

The latest crash after I updated everything except ATK110 was 100610-23930-01.dmp based on the timing of the file on my computer; this was before I updated ATK110. This crash came about when I tried to do an 'update' to ATK110 driver.

I rebooted and uninstalled the driver, rebooted, and installed the new one. It's updated now. No crashes thus far.

Uninstalled AVG, getting MS essentials now.

Good, please keep us updated on how it goes.
My System SpecsSystem Spec
05 Oct 2010   #18
lightice

Win 7 ultimate 64 bit
 
 

Thanks Cybercore and Carl, I will let the system run a while.
Before I sleep I'll do memtest and let it get through a few passes.

Will update here.

Update 1: I ran 6 full passes of memtest86, no errors.

Anything I should do next?
My System SpecsSystem Spec
06 Oct 2010   #19
cybercore

Windows 7 x64
 
 

Quote   Quote: Originally Posted by lightice View Post
Thanks Cybercore and Carl, I will let the system run a while.
Before I sleep I'll do memtest and let it get through a few passes.

Will update here.

Update 1: I ran 6 full passes of memtest86, no errors.

Anything I should do next?

You should have left it run overnight. (Sometimes it takes to isolate sticks to get errors detected. (Up to you.) If you have any fresh crash dumps, please attach them.
My System SpecsSystem Spec
08 Oct 2010   #20
lightice

Win 7 ultimate 64 bit
 
 

I did let it run overnight, and it was only 6 passes.
Windows did freeze again, just.

I am not sure if there was an actual dump file for this one.
I have uninstalled AVG and pretty much everything else.
My System SpecsSystem Spec
Reply

 BSOD again




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 01:16.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App