System Crash -Help with Dump file

Page 2 of 4 FirstFirst 1234 LastLast

  1. Posts : 23
    Windows 7 Home Premium 64bit.
    Thread Starter
       #11

    New BSOD Attached
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #12

    I looked at your three most recent dumps.
    Error code 19 (2X), BAD_POOL_HEADER. Usual causes: Device driver.

    Error code 50 (3X), PAGE_FAULT_IN_NONPAGED_AREA. Usual causes: Defective hardware (particularly memory - but not just RAM), Faulty system service, Antivirus, Device driver, NTFS corruption, BIOS.
    These point to hardware/hardware related problems, particularly drivers.

    I find these outdated drivers loaded on your system. Update these drivers.
    atikmdag.sys Sun Jun 14 22:41:39 2009 - ATI Video driver (remove the Catalyst Control Center and only install the Display Driver)Global Provider of Innovative Graphics, Processors and Media Solutions | AMD

    k57nd60a.sys Sat Jun 20 07:34:49 2009 - Broadcom NetLink (TM) Gigabit Ethernet driver. Broadcom.com - Products

    PxHlpa64.sys Tue Jun 23 19:16:35 2009 - Sonic CD/DVD driver (used by many different CD/DVD programs) pxHelp20.sys programs
    Go to C:\Windows\System32\drivers and rename PxHlpa64.sys to PxHlpa64.BAK
    This will break your CD/DVD program, but can easily be renamed after we've finished.

    RTKVHD64.sys Fri May 22 14:04:20 2009 - Realtek High Definition Audio Function Driver Realtek
    How to find drivers -
    - I have listed links to most of the drivers in the code box below. Please use the links there to see what info I've found about those drivers.
    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.


    - - The most common drivers are listed on this page: Driver Reference
    - - Driver manufacturer links are on this page: Drivers and Downloads
    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e87e50
    Debug session time: Sat Oct 30 17:13:03.198 2010 (GMT-4)
    System Uptime: 0 days 2:27:39.275
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {21, fffff900c1efb000, 3b80, fffff900c1efebc0}
    
    Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000021, the data following the pool block being freed is corrupt.  Typically this means the consumer (call stack ) has overrun the block.
    Arg2: fffff900c1efb000, The pool pointer being freed.
    Arg3: 0000000000003b80, The number of bytes allocated for the pool block.
    Arg4: fffff900c1efebc0, The corrupted value found following the pool block.
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_21
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef20e0
     fffff900c1efb000 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002ded3cd to fffff80002cba740
    
    STACK_TEXT:  
    fffff880`07b6b768 fffff800`02ded3cd : 00000000`00000019 00000000`00000021 fffff900`c1efb000 00000000`00003b80 : nt!KeBugCheckEx
    fffff880`07b6b770 fffff960`000893f1 : fffff900`c00f5ca0 fffff900`c00f5ca0 00000000`64667454 fffff900`00000001 : nt!ExDeferredFreePool+0xf8a
    fffff880`07b6b820 fffff960`002fadd4 : fffff880`07b6b970 00000000`04f7dd00 fffffa80`00000040 00000000`00000000 : win32k!EngFreeMem+0x21
    fffff880`07b6b850 fffff960`002c211e : fffff960`002fad60 fffff880`07b6b970 fffff900`c09bc260 00000000`00010000 : win32k!ttfdSemDestroyFont+0x74
    fffff880`07b6b880 fffff960`002c034a : fffffa80`0760d4b0 fffff880`07b6b980 fffff880`07b6b9e0 fffff880`07b6bb58 : win32k!PDEVOBJ::DestroyFont+0xf2
    fffff880`07b6b8f0 fffff960`000e7ab7 : fffffa80`0760d4b0 fffff900`c00f5ca0 fffff900`c008a010 fffff960`000eb42c : win32k!RFONTOBJ::vDeleteRFONT+0x4a
    fffff880`07b6b960 fffff960`000e74eb : fffff900`c00f5ca0 fffff880`07b6ba00 fffff900`c00f5ca0 00000000`00000000 : win32k!RFONTOBJ::bMakeInactiveHelper+0x427
    fffff880`07b6b9e0 fffff960`00136195 : fffff880`07b6bb60 fffff880`07b6bb60 00000000`00000000 00000000`00000001 : win32k!RFONTOBJ::vMakeInactive+0xa3
    fffff880`07b6ba80 fffff960`001363f4 : fffff880`07b6bb60 fffff900`c070c350 00000000`00000000 fffff900`c227aca0 : win32k!XDCOBJ::bCleanDC+0x36d
    fffff880`07b6bb40 fffff960`0012f3b7 : fffff900`c070c350 fffff900`c0581e90 00000000`04f7dd00 00000000`04f7dce0 : win32k!GreCleanDC+0x34
    fffff880`07b6bb80 fffff960`0012f2a7 : 00000000`2e01124b fffff880`07b6bca0 00000000`00000001 fffff960`000cce54 : win32k!ReleaseCacheDC+0xfb
    fffff880`07b6bbc0 fffff960`001440ba : ffffffff`930a0d3b fffff880`07b6bca0 fffff960`000f6610 fffff960`000f6610 : win32k!ReleaseDC+0xb
    fffff880`07b6bbf0 fffff800`02cb9993 : fffffa80`0906bb60 fffff880`07b6bca0 fffff900`c00bf010 00000000`00000000 : win32k!NtUserCallOneParam+0x4e
    fffff880`07b6bc20 00000000`7731d33a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`04f7da88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7731d33a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!EngFreeMem+21
    fffff960`000893f1 4883c420        add     rsp,20h
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  win32k!EngFreeMem+21
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    FAILURE_BUCKET_ID:  X64_0x19_21_win32k!EngFreeMem+21
    
    BUCKET_ID:  X64_0x19_21_win32k!EngFreeMem+21
    
    Followup: MachineOwner
    ---------
    
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff900c2a74290, 1, fffff80002e0c93e, 0}
    
    
    Could not read faulting driver name
    Probably caused by : win32k.sys ( win32k!RFONTOBJ::bRealizeFont+79 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff900c2a74290, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002e0c93e, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f100e0
     fffff900c2a74290 
    
    FAULTING_IP: 
    nt!ExAllocatePoolWithTag+56e
    fffff800`02e0c93e 8803            mov     byte ptr [rbx],al
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  OUTLOOK.EXE
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880026a05c0 -- (.trap 0xfffff880026a05c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000070 rbx=0000000000000000 rcx=fffff900c2a73ba0
    rdx=fffff900c2a73b90 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002e0c93e rsp=fffff880026a0750 rbp=fffff88003cd4cc0
     r8=0000000000000021  r9=fffff88003cd5260 r10=fffff88003cd4cc8
    r11=fffffa80081c7b60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!ExAllocatePoolWithTag+0x56e:
    fffff800`02e0c93e 8803            mov     byte ptr [rbx],al ds:00000000`00000000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002d58f14 to fffff80002cd8740
    
    STACK_TEXT:  
    fffff880`026a0458 fffff800`02d58f14 : 00000000`00000050 fffff900`c2a74290 00000000`00000001 fffff880`026a05c0 : nt!KeBugCheckEx
    fffff880`026a0460 fffff800`02cd682e : 00000000`00000001 fffff900`c2a74290 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`026a05c0 fffff800`02e0c93e : fffff960`000691d8 fffff960`000b482d fffff960`000691d8 fffff900`00000050 : nt!KiPageFault+0x16e
    fffff880`026a0750 fffff960`00070035 : fffff900`00000000 fffff900`c0877af0 00000000`00000002 00000000`00000000 : nt!ExAllocatePoolWithTag+0x56e
    fffff880`026a0840 fffff960`000c8df0 : fffff900`c0877af0 fffff880`026a0ad0 fffff880`026a09d0 fffff880`026a0b20 : win32k!RFONTOBJ::bRealizeFont+0x79
    fffff880`026a0960 fffff960`0009a861 : 00000000`10010000 fffff900`00000000 000002f4`00000000 00190b80`00000002 : win32k!RFONTOBJ::bInit+0x548
    fffff880`026a0a80 fffff960`0009a7eb : 00000000`00000000 fffff880`026a0ca0 00000000`4854414d 00000001`654fb8c7 : win32k!ulGetFontData2+0x31
    fffff880`026a0af0 fffff960`0009a6c1 : 00000000`ffffffff 00000000`ffffffff fffffa80`079e6940 fffff960`00114e4a : win32k!ulGetFontData+0x7f
    fffff880`026a0b40 fffff800`02cd7993 : 00000000`050102f4 00000000`00000000 00000000`0c35e678 00000000`00000000 : win32k!NtGdiGetFontData+0x4d
    fffff880`026a0bb0 00000000`746d093a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0c35e658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x746d093a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!RFONTOBJ::bRealizeFont+79
    fffff960`00070035 488bd8          mov     rbx,rax
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32k!RFONTOBJ::bRealizeFont+79
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    FAILURE_BUCKET_ID:  X64_0x50_win32k!RFONTOBJ::bRealizeFont+79
    
    BUCKET_ID:  X64_0x50_win32k!RFONTOBJ::bRealizeFont+79
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 23
    Windows 7 Home Premium 64bit.
    Thread Starter
       #13

    I tried to update the drivers and it said I had the most current drivers.
    Do you think the latest windows update could have corrupted some drivers.
    It seem to have started around after this past Tuesday.
    I restored the computer back to before the update but had no luck.
    From what I can tell, nothing else had changed prior to this problem.
    Was wondering is I needed to reinstall the OS.
    Bad thing is it was preinstalled on the machine already.
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #14

    I don't think you need to reinstall yet. How did you try to update the drivers? Through Device Manager? You need to go either to your computer manufacturer's website or the websites I linked above, download the appropriate driver to your desktop and install them. I know there is an update for the first one.
      My Computer


  5. Posts : 23
    Windows 7 Home Premium 64bit.
    Thread Starter
       #15

    Just finished updating the ethernet and ATI drivers.
    Also I changed the extension of the CD driver tob .BAK
    Currently downloading the Realtek driver.
    Will let you know when I get it installed.
      My Computer


  6. Posts : 23
    Windows 7 Home Premium 64bit.
    Thread Starter
       #16

    Just finished the last driver update.
    Tried to open the font folder and got the dreaded BSOD
    I have attached the latest dump file
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #17

    Great job updating drivers. I do not see any that are out of date. Unfortunately, the dump does not point to specific driver. It is time to enable Driver Verifier. Follow the instructions in the tutorial below. Use your system normally whiole Driver Verifier is running. If Driver Verifier finds a faulty driver, it will trigger a BSOD. Upload any and all Driver Verifier enabled dumps. Hopefully, the dump(s) will point to the offending driver(s).

    Error code 19 (2X), BAD_POOL_HEADER. Usual causes: Device driver
    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50
    Debug session time: Sun Oct 31 18:31:57.746 2010 (GMT-4)
    System Uptime: 0 days 0:02:43.198
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {21, fffff900c2a60000, 3b80, fffff900c2a63bc0}
    
    Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000021, the data following the pool block being freed is corrupt.  Typically this means the consumer (call stack ) has overrun the block.
    Arg2: fffff900c2a60000, The pool pointer being freed.
    Arg3: 0000000000003b80, The number of bytes allocated for the pool block.
    Arg4: fffff900c2a63bc0, The corrupted value found following the pool block.
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_21
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0
     fffff900c2a60000 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002da83cd to fffff80002c75740
    
    STACK_TEXT:  
    fffff880`06f0d768 fffff800`02da83cd : 00000000`00000019 00000000`00000021 fffff900`c2a60000 00000000`00003b80 : nt!KeBugCheckEx
    fffff880`06f0d770 fffff960`000793f1 : fffff900`c0975700 fffff900`c0975700 00000000`64667454 fffff900`00000001 : nt!ExDeferredFreePool+0xf8a
    fffff880`06f0d820 fffff960`002eadd4 : fffff880`06f0d970 00000000`0463dd00 fffffa80`00000048 00000000`00000000 : win32k!EngFreeMem+0x21
    fffff880`06f0d850 fffff960`002b211e : fffff960`002ead60 fffff880`06f0d970 fffff900`c09c7dd0 00000000`00010000 : win32k!ttfdSemDestroyFont+0x74
    fffff880`06f0d880 fffff960`002b034a : fffffa80`079dc8b0 fffff880`06f0d980 fffff880`06f0d9e0 fffff880`06f0db58 : win32k!PDEVOBJ::DestroyFont+0xf2
    fffff880`06f0d8f0 fffff960`000d7ab7 : fffffa80`079dc8b0 fffff900`c0975700 fffff900`c008a010 fffff960`000db42c : win32k!RFONTOBJ::vDeleteRFONT+0x4a
    fffff880`06f0d960 fffff960`000d74eb : fffff900`c0975700 fffff880`06f0da00 fffff900`c0975700 00000000`00000000 : win32k!RFONTOBJ::bMakeInactiveHelper+0x427
    fffff880`06f0d9e0 fffff960`00126195 : fffff880`06f0db60 fffff880`06f0db60 00000000`00000000 00000000`00000001 : win32k!RFONTOBJ::vMakeInactive+0xa3
    fffff880`06f0da80 fffff960`001263f4 : fffff880`06f0db60 fffff900`c281d6d0 00000000`00000000 fffff900`c3aafca0 : win32k!XDCOBJ::bCleanDC+0x36d
    fffff880`06f0db40 fffff960`0011f3b7 : fffff900`c281d6d0 fffff900`c0581e90 00000000`0463dd00 00000000`0463dce0 : win32k!GreCleanDC+0x34
    fffff880`06f0db80 fffff960`0011f2a7 : 00000000`2b010b43 fffff880`06f0dca0 00000000`00000001 fffff960`000bce54 : win32k!ReleaseCacheDC+0xfb
    fffff880`06f0dbc0 fffff960`001340ba : ffffffff`a70a0fdb fffff880`06f0dca0 fffff960`000e6610 fffff960`000e6610 : win32k!ReleaseDC+0xb
    fffff880`06f0dbf0 fffff800`02c74993 : fffffa80`083a6660 fffff880`06f0dca0 fffff900`c00bf010 00000000`00000000 : win32k!NtUserCallOneParam+0x4e
    fffff880`06f0dc20 00000000`7703d33a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0463da88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7703d33a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!EngFreeMem+21
    fffff960`000793f1 4883c420        add     rsp,20h
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  win32k!EngFreeMem+21
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    FAILURE_BUCKET_ID:  X64_0x19_21_win32k!EngFreeMem+21
    
    BUCKET_ID:  X64_0x19_21_win32k!EngFreeMem+21
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start             end                 module name
    fffff880`0412f000 fffff880`0416d000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f27000 fffff880`00f7e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c09000 fffff880`02c93000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`041e3000 fffff880`041f9000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00ded000 fffff880`00df8000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00dba000 fffff880`00dc3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dc3000 fffff880`00ded000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0480b000 fffff880`04fe1000   atikmdag atikmdag.sys Tue Sep 28 21:41:26 2010 (4CA29946)
    fffff880`03ea6000 fffff880`03ef1000   atikmpag atikmpag.sys Tue Sep 28 21:14:49 2010 (4CA29309)
    fffff880`01896000 fffff880`0189d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02d95000 fffff880`02da6000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03b32000 fffff880`03b50000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00610000 fffff960`00637000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`01836000 fffff880`01860000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00ce0000 fffff880`00da0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`019d0000 fffff880`01a00000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c82000 fffff880`00ce0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0114e000 fffff880`011c1000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`041d3000 fffff880`041e3000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`058c2000 fffff880`058d0000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02d77000 fffff880`02d95000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02d68000 fffff880`02d77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`019ba000 fffff880`019d0000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04499000 fffff880`044bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`058dc000 fffff880`058e5000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`058d0000 fffff880`058dc000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`058e5000 fffff880`058f8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`058f8000 fffff880`05904000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03ef1000 fffff880`03fe5000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03e00000 fffff880`03e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`059b4000 fffff880`059ea000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`010dc000 fffff880`010f0000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01090000 fffff880`010dc000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01980000 fffff880`019ba000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01000000 fffff880`0104a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`031e1000 fffff800`0322a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03e46000 fffff880`03e6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04400000 fffff880`0445c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`0595a000 fffff880`05973000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05973000 fffff880`0597b080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0594c000 fffff880`0595a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`03a6a000 fffff880`03b32000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01977000 fffff880`01980000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`02dcc000 fffff880`02de2000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0416d000 fffff880`041d3000   k57nd60a k57nd60a.sys Tue Jun 08 07:40:13 2010 (4C0E2C1D)
    fffff880`040b5000 fffff880`040c4000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0597c000 fffff880`0598a000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00ba5000 fffff800`00baf000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`044ef000 fffff880`04532000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`0158f000 fffff880`015ba000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`044bb000 fffff880`044c0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05644000 fffff880`05659000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05600000 fffff880`05623000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c2a000 fffff880`00c6e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05904000 fffff880`05912000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`040c4000 fffff880`040d3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0598a000 fffff880`05997000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00da0000 fffff880`00dba000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01860000 fffff880`0188d000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
    fffff880`061af000 fffff880`061bf000   MpNWMon  MpNWMon.sys  Sat Mar 20 01:58:00 2010 (4BA463E8)
    fffff880`03b50000 fffff880`03b68000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03b68000 fffff880`03b95000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`03b95000 fffff880`03be3000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`03a00000 fffff880`03a23000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`015e5000 fffff880`015f0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f87000 fffff880`00f91000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010f0000 fffff880`0114e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02d5d000 fffff880`02d68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01965000 fffff880`01977000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0143d000 fffff880`0152f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04024000 fffff880`04030000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04030000 fffff880`0405f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0459e000 fffff880`045b3000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02cc2000 fffff880`02cd1000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`0104a000 fffff880`0108f000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0152f000 fffff880`0158f000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01400000 fffff880`01411000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02d51000 fffff880`02d5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c05000 fffff800`031e1000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0125b000 fffff880`013fe000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0188d000 fffff880`01896000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02c9c000 fffff880`02cc2000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fd1000 fffff880`00fe6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f91000 fffff880`00fc4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05c1b000 fffff880`05cc1000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0445c000 fffff880`04499000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c6e000 fffff880`00c82000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04000000 fffff880`04024000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0405f000 fffff880`0407a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0407a000 fffff880`0409b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0409b000 fffff880`040b5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d00000 fffff880`02d51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`015ca000 fffff880`015d3000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015d3000 fffff880`015dc000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015dc000 fffff880`015e5000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0192b000 fffff880`01965000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`044c1000 fffff880`044d9000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0565e000 fffff880`058c1800   RTKVHD64 RTKVHD64.sys Tue Oct 05 05:58:40 2010 (4CAAF6D0)
    fffff880`05cc1000 fffff880`05ccc000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01923000 fffff880`0192b000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06000000 fffff880`06071000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`060e8000 fffff880`0617e000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`05d0b000 fffff880`05d72000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`05ccc000 fffff880`05cf9000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`040d3000 fffff880`040d4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`05cf9000 fffff880`05d0b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0142f000 fffff880`0143c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01411000 fffff880`0142f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02cec000 fffff880`02d00000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04532000 fffff880`04544000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05912000 fffff880`0592f000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0592f000 fffff880`05930f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04fe1000 fffff880`04ff2000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04544000 fffff880`0459e000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`040d9000 fffff880`0412f000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`059a8000 fffff880`059b4000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
    fffff880`05997000 fffff880`059a8000   usbscan  usbscan.sys  Mon Jul 13 20:35:32 2009 (4A5BD2D4)
    fffff880`05931000 fffff880`0594c000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00fc4000 fffff880`00fd1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0189d000 fffff880`018ab000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`018ab000 fffff880`018d0000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fe6000 fffff880`00ffb000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`018d7000 fffff880`01923000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02cd1000 fffff880`02cec000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`015ba000 fffff880`015ca000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e74000 fffff880`00f18000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f18000 fffff880`00f27000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02c93000 fffff880`02c9c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00060000 fffff960`0036f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
    fffff880`00f7e000 fffff880`00f87000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05623000 fffff880`05644000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`0617e000 fffff880`061af000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`01800000 fffff880`0180e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0180e000 fffff880`0181a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0181a000 fffff880`01823000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01823000 fffff880`01836000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`02da6000 fffff880`02dcc000   tunnel.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  8. Posts : 23
    Windows 7 Home Premium 64bit.
    Thread Starter
       #18

    Don't see tutorial in your post
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #19

    I apologize. I will blame it on Old Timer's disease!

    Driver Verified: Driver Verifier - Enable and Disable
      My Computer


  10. Posts : 23
    Windows 7 Home Premium 64bit.
    Thread Starter
       #20

    I really appreciate all the time you have put in trying to help me solve this.
    I will have to let it sit for a few days while I am on business travel down to your neck of the woods (Florida - Kennedy Space Center).
    When I get back I will enable the Driver Verifier.
    Don't think My wife would appreciate me possibly taking down her machine while on travel.
    She is able to work on it as long as she stays out of outlook and does not try to perform any deep (C:/) file searches.
    Will talk when I get back
      My Computer


 
Page 2 of 4 FirstFirst 1234 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:47.
Find Us