BSOD/freezes. Dump File attached

Page 1 of 5 123 ... LastLast

  1. Posts : 35
    Windows 7 x64 Ultimate
       #1

    BSOD/freezes. Dump File attached


    I made a post earlier about having random micro-freezes and now I am getting occasional bsod's. The latest said ntfs.sys etc... I have changed my video card 3 times (first two were ATI, latest is a GTS450 Nvidia). ALL drivers are up to date. Any MS hotfixes have been installed. Memory diagnostic shows no errors. I am at my wits end as I have been struggling with this for over 3 months. Can someone please take a look at the attached memory dump file for me?

    Since it is over the forum limit, it is available for download at:

    Download MEMORY.DMP.zip from Sendspace.com - send big files the easy way Click the ORANGE download bottom at the bottom of the screen.

    Much appreciated,

    David
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    David, read this tutorial and look at the last part of the first post. Make sure your computer is set for mini dumps. https://www.sevenforums.com/tutorials...en-forums.html
    Many of us cannot work with the memory dumps.

    Also read this tutorial for uploading all of the necessary files.
    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  3. Posts : 35
    Windows 7 x64 Ultimate
    Thread Starter
       #3

    Sorry for the confusion. Attached is the minidump file, the bsod file, and the system health report:

    Minidump: Download mini dump.rar from Sendspace.com - send big files the easy way
    BSOD report: Download Windows_NT6_BSOD_jcgriff2.rar from Sendspace.com - send big files the easy way
    System Health Report: Download report.html from Sendspace.com - send big files the easy way

    On a sidenote, prior to my initial post, I have ran memtest86. No errors, though I never let it run more than 30 minutes. I ran into a thread about using the windows memory diagnostic tool, and within a minute, twice, I got errors. They are as follows:

    LaunchTypeManualCompletionTypeFailMemorySize2814TestType10TestDuration582TestCount12NumPagesTested1047083NumPagesUnTested1119NumBadPages6T1NumBadPages0T2NumBadPages0T3NumBadPages0T4NumBadPages4T5NumBadPages0T6NumBadPages0T7NumBadPages0T8NumBadPages0T9NumBadPages0T10NumBadPages2T11NumBadPages0T12NumBadPages0T13NumBadPages0T14NumBadPages0T15NumBadPages0T16NumBadPages0
    Again, your help is appreciated!!!
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    I got the files this time. Thanks. In the future, please attach them to your post; that makes it a lot easier and quicker for us.

    Since the Windows memory diagnostic tool found errors and it is a much less aggressive tool than Memtest, I suggest that you run Memtest again. Run it from a cold boot after your computer has been off for a while and let it run for at least 7 passes. This will take 6-8 hours. Follow the instructions in this tutorial:
    RAM - Test with Memtest86+

    I also suggest that you uninstall Daemon Tools. It uses a driver, found in your dump, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads. Select uninstall; do NOT select reinstall.

    Here is a free alternative CD virtualization program that does not use the sptd.sys driver.
    Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
    Outdated drivers can and do cause memory corruption and BSOD's. You have three outdated drivers loading on your system. Two are really obsolete; they are XP drivers. Update these drivers through the links provided or uninstall the software they are associated with.
    giveio.sys Wed Apr 03 22:33:25 1996 - ADC Analyzer/SwiftForth/Disspy - ?SpeedFan?. Info only (½ way down page) - I/O Port Programming with Delphi and NT. Uninstall the software or rename the driver. It will not work with Win 7..

    nvm62x32.sys Fri Oct 17 17:00:39 2008 - nVidia Ethernet Networking Driver (nForce chipset driver). Drivers - Download NVIDIA Drivers. Update this driver.

    nvstor.sys Wed May 20 02:44:09 2009 - nVidia Storage Drivers Drivers - Download NVIDIA Drivers. Update this driver.
    Post back with the results of Memtest, uninstall sptd.sys, and take care of the three drivers. Reboot and see how your system does. Post back and let us know. If you get another BSOD, upload it and we will go from there.
    Code:
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e3e000 PsLoadedModuleList = 0x82f86810
    Debug session time: Tue Dec 14 18:35:04.574 2010 (GMT-5)
    System Uptime: 0 days 0:52:08.182
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {804000ac, 2, 0, 82ed3a04}
    
    Probably caused by : rdbss.sys ( rdbss!RxFastCopyRead+244 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 804000ac, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82ed3a04, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82fa6718
    Unable to read MiSystemVaType memory at 82f86160
     804000ac 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!RtlAreBitsSet+5b
    82ed3a04 8a08            mov     cl,byte ptr [eax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  AVSVideoConver
    
    TRAP_FRAME:  9afed714 -- (.trap 0xffffffff9afed714)
    ErrCode = 00000000
    eax=804000ac ebx=00000007 ecx=00000005 edx=000000ac esi=000000ae edi=82f84820
    eip=82ed3a04 esp=9afed788 ebp=9afed794 iopl=0         nv up ei ng nz ac po cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010293
    nt!RtlAreBitsSet+0x5b:
    82ed3a04 8a08            mov     cl,byte ptr [eax]          ds:0023:804000ac=80
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82ed3a04 to 82e8482b
    
    STACK_TEXT:  
    9afed714 82ed3a04 badb0d00 000000ac 91016220 nt!KiTrap0E+0x2cf
    9afed794 82ee3d5f 00000005 00000567 0000000f nt!RtlAreBitsSet+0x5b
    9afed86c 82ed052c 82f84820 0000000f 00000000 nt!MiReplenishBitMap+0x169
    9afed8cc 82ee4e38 82f84820 c048a058 0000000f nt!MiInsertCachedPte+0x214
    9afed908 82ef25dd 9140b000 86c8ca30 00000000 nt!MmUnmapLockedPages+0xef
    9afed970 82e6d950 86c8ca4c 00000000 00000000 nt!MiWaitForInPageComplete+0x2c0
    9afed994 82e6d1bc 00000000 00000000 00000000 nt!MiPfCompletePrefetchIos+0x6c
    9afed9b0 82ef4864 87c8f6e8 0000f6a4 87d156b8 nt!MmWaitForCacheManagerPrefetch+0x1b
    9afed9dc 8309bdae 87d156b8 00000001 9afeda54 nt!CcFetchDataForRead+0xa4
    9afeda1c 8309da15 87d156b8 6420d0bc 00000000 nt!CcMapAndCopyFromCache+0x71
    9afeda58 9103bef4 87d156b8 858c00ac 0000f6a4 nt!CcCopyRead+0x107
    9afedabc 9103c061 00d156b8 018c00ac 0000f6a4 rdbss!RxFastCopyRead+0x244
    9afedb18 8b5e6460 87d156b8 858c00ac 0000f6a4 rdbss!RxFastIoRead+0x7a
    9afedb44 8af83fec 87d156b8 858c00ac 0000f6a4 mup!MupFastIoRead+0x3c
    9afedb78 8af841bb 00000003 00000000 858c00a4 fltmgr!FltpPerformFastIoCall+0x22e
    9afedba4 8af96c37 00fedbc8 87d156b8 86811b60 fltmgr!FltpPassThroughFastIo+0x7d
    9afedbe8 8af83fec 87d156b8 9afedc5c 0000f6a4 fltmgr!FltpFastIoRead+0x163
    9afedc1c 8af96bba 00000003 00000000 9afedc54 fltmgr!FltpPerformFastIoCall+0x22e
    9afedc74 8308dbbe 87d156b8 9afedcb4 0000f6a4 fltmgr!FltpFastIoRead+0xe6
    9afedd08 82e8144a 86b5e490 00000000 00000000 nt!NtReadFile+0x2d5
    9afedd08 76de64f4 86b5e490 00000000 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    087cfa8c 00000000 00000000 00000000 00000000 0x76de64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    rdbss!RxFastCopyRead+244
    9103bef4 8845e7          mov     byte ptr [ebp-19h],al
    
    SYMBOL_STACK_INDEX:  b
    
    SYMBOL_NAME:  rdbss!RxFastCopyRead+244
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: rdbss
    
    IMAGE_NAME:  rdbss.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbfd2
    
    FAILURE_BUCKET_ID:  0xA_rdbss!RxFastCopyRead+244
    
    BUCKET_ID:  0xA_rdbss!RxFastCopyRead+244
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Tue Dec 14 17:41:37.819 2010 (GMT-5)
    System Uptime: 0 days 6:33:49.427
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    1: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {3452, 66c000, c0808ca0, 8c06f05a}
    
    Probably caused by : memory_corruption ( nt!MiDeleteAddressesInWorkingSet+389 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 00003452, The subtype of the bugcheck.
    Arg2: 0066c000
    Arg3: c0808ca0
    Arg4: 8c06f05a
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_3452
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  newsLeecher.ex
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82ea70a8 to 82ea25bc
    
    STACK_TEXT:  
    98affc5c 82ea70a8 87edb030 87edb030 00000000 nt!MiDeleteAddressesInWorkingSet+0x389
    98affc88 8304adae b62e6e5c 00000000 87d08030 nt!MmCleanProcessAddressSpace+0x8c
    98affcfc 83063dc7 00000000 ffffffff 0012feac nt!PspExitThread+0x683
    98affd24 82e4544a ffffffff 00000000 0012feb8 nt!NtTerminateProcess+0x1fa
    98affd24 77cd64f4 ffffffff 00000000 0012feb8 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0012feb8 00000000 00000000 00000000 00000000 0x77cd64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiDeleteAddressesInWorkingSet+389
    82ea25bc cc              int     3
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiDeleteAddressesInWorkingSet+389
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0x1a_3452_nt!MiDeleteAddressesInWorkingSet+389
    
    BUCKET_ID:  0x1a_3452_nt!MiDeleteAddressesInWorkingSet+389
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Fri Dec 24 00:35:21.589 2010 (GMT-5)
    System Uptime: 0 days 4:37:51.212
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    .................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 8b42f82b, 8d5439c4, 8d5435a0}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsDecodeFileObject+6e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8b42f82b, The address that the exception occurred at
    Arg3: 8d5439c4, Exception Record Address
    Arg4: 8d5435a0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    Ntfs!NtfsDecodeFileObject+6e
    8b42f82b 0fb64034        movzx   eax,byte ptr [eax+34h]
    
    EXCEPTION_RECORD:  8d5439c4 -- (.exr 0xffffffff8d5439c4)
    ExceptionAddress: 8b42f82b (Ntfs!NtfsDecodeFileObject+0x0000006e)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 00000037
    Attempt to read from address 00000037
    
    CONTEXT:  8d5435a0 -- (.cxr 0xffffffff8d5435a0)
    eax=00000003 ebx=00000000 ecx=a6fffc18 edx=8d543b04 esi=87d36b50 edi=00000000
    eip=8b42f82b esp=8d543a8c ebp=8d543a90 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    Ntfs!NtfsDecodeFileObject+0x6e:
    8b42f82b 0fb64034        movzx   eax,byte ptr [eax+34h]     ds:0023:00000037=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  00000037
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 833af718
    Unable to read MiSystemVaType memory at 8338f160
     00000037 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsDecodeFileObject+6e
    8b42f82b 0fb64034        movzx   eax,byte ptr [eax+34h]
    
    BUGCHECK_STR:  0x7E
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from 8b4b5e05 to 8b42f82b
    
    STACK_TEXT:  
    8d543a90 8b4b5e05 00000000 87d36b50 8d543afc Ntfs!NtfsDecodeFileObject+0x6e
    8d543b28 832834bc 00000003 860dee00 860dee00 Ntfs!NtfsFsdClose+0x5f
    8d543b40 8b3ac20c 86c556d0 860dee00 00000000 nt!IofCallDriver+0x63
    8d543b64 8b3ac3cb 8d543b84 86c556d0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
    8d543b9c 832834bc 86c556d0 860dee00 860dee00 fltmgr!FltpDispatch+0xc5
    8d543bb4 8b3ac20c 86ff0528 860dee00 00000000 nt!IofCallDriver+0x63
    8d543bd8 8b3ac3cb 8d543bf8 86ff0528 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
    8d543c10 832834bc 86ff0528 860dee00 8734f024 fltmgr!FltpDispatch+0xc5
    8d543c28 83488e47 85a19a38 87d36b38 00000000 nt!IofCallDriver+0x63
    8d543c6c 83468788 87d36b50 87d36b50 87d36b38 nt!IopDeleteFile+0x10c
    8d543c84 832aff60 00000000 000c0000 00000000 nt!ObpRemoveObjectRoutine+0x59
    8d543c98 832afed0 87d36b50 83478a75 85b93e08 nt!ObfDereferenceObjectWithTag+0x88
    8d543ca0 83478a75 85b93e08 85b93e30 833b1680 nt!ObfDereferenceObject+0xd
    8d543ccc 83272f39 85b93e08 00000000 00000000 nt!MiSegmentDelete+0x191
    8d543d28 83272e51 85a38638 00000000 04020304 nt!MiProcessDereferenceList+0xdb
    8d543d50 834556d3 00000000 a3d00e9e 00000000 nt!MiDereferenceSegmentThread+0xc5
    8d543d90 833070f9 83272d8a 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsDecodeFileObject+6e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45
    
    STACK_COMMAND:  .cxr 0xffffffff8d5435a0 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_Ntfs!NtfsDecodeFileObject+6e
    
    BUCKET_ID:  0x7E_Ntfs!NtfsDecodeFileObject+6e
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start    end        module name
    8f892000 8f8be000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
    8b147000 8b18f000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    90ca2000 90cfc000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    8f9e0000 8f9f2000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8b392000 8b39b000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    8b34b000 8b35b000   arcm_x86 arcm_x86.sys Thu Jun 10 04:25:52 2010 (4C10A190)
    9e8ea000 9e8f3000   asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
    8b2b3000 8b2bc000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8b2bc000 8b2df000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    82bb0000 82bfd000   ATMFD    ATMFD.DLL    unavailable (00000000)
    8f913000 8f94c000   aumdtxep aumdtxep.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
    8b1e5000 8b1f0000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
    8b62c000 8b633000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    900c7000 900d5000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    8ae94000 8ae9c000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    961e2000 961fb000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    900ba000 900c6300   CBDisk   CBDisk.sys   Wed Jan 13 04:15:41 2010 (4B4D8F3D)
    82b90000 82bae000   cdd      cdd.dll      unavailable (00000000)
    82321000 82340000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    8aede000 8af89000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    8b600000 8b625000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    8ae9c000 8aede000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8b58f000 8b5ec000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    8b1dd000 8b1e5000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    8f94c000 8f959000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    82346000 82353000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    9003e000 900a2000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    900a2000 900ba000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    90c0a000 90c16000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8b7ed000 8b7fe000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8f993000 8f9ac000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    8235d000 8236d000   dump_arcm_x86 dump_arcm_x86.sys Thu Jun 10 04:25:52 2010 (4C10A190)
    82353000 8235d000   dump_diskdump dump_diskdump.sys Mon Jul 13 19:45:49 2009 (4A5BC72D)
    8236d000 8237e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    8237e000 82388000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    90108000 901bf000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    901bf000 901f8000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    921e7000 921f2000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
    8b3da000 8b3eb000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8b3a6000 8b3da000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8b400000 8b409000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    8b7bb000 8b7ed000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    8b959000 8b98a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    82340000 82345280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
    8b9f4000 8b9f4680   giveio   giveio.sys   Wed Apr 03 22:33:25 1996 (316334F5)
    83210000 83247000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    90000000 9001f000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    9e904000 9e917000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    823ec000 823f2480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    9e8f9000 9e904000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    9615d000 961e2000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8b9ec000 8b9f4000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    900f6000 90108000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    96073000 96080000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9e94b000 9e957000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
    80bc4000 80bcc000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8f9ac000 8f9e0000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    8b57c000 8b58f000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    8b728000 8b74d000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    9e919000 9e920d80   LHidFilt LHidFilt.Sys Thu Mar 18 04:50:19 2010 (4BA1E94B)
    96117000 96127000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    9e92c000 9e933780   LMouFilt LMouFilt.Sys Thu Mar 18 04:50:27 2010 (4BA1E953)
    82393000 823ae000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    9e8f3000 9e8f8580   LUsbFilt LUsbFilt.Sys Thu Mar 18 04:50:32 2010 (4BA1E958)
    8ae0b000 8ae83000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    8b77a000 8b7bb000   MDFSYSNT MDFSYSNT.sys Tue May 18 10:07:00 2010 (4BF29F04)
    8b39b000 8b3a6000   MDPMGRNT MDPMGRNT.sys Mon Apr 26 11:25:21 2010 (4BD5B061)
    82388000 82393000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    96080000 9608d000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9e921000 9e92c000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8b29d000 8b2b3000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    8b200000 8b223000   MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
    9e877000 9e87fe00   MpNWMon  MpNWMon.sys  Sat Mar 20 00:03:24 2010 (4BA4490C)
    8f823000 8f835000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    9b213000 9b236000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    9b236000 9b271000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    9b271000 9b28c000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    90c67000 90c72000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    8b18f000 8b197000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8b551000 8b57c000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    90c00000 90c0a000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8b9dc000 8b9ec000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8b633000 8b6ea000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    8f818000 8f823000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    96001000 96023000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    960e1000 960f2000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    90d54000 90d62000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    90cfc000 90d2e000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    8b6ea000 8b728000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    90c72000 90c80000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    90dee000 90df8000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    83247000 83657000   nt       ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
    8b422000 8b551000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    8b625000 8b62c000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    921e5000 921e6040   nvBridge nvBridge.kmd Wed Jul 28 11:37:38 2010 (4C504EC2)
    960f2000 9610f000   nvhda32v nvhda32v.sys Mon Jun 21 18:07:07 2010 (4C1FE28B)
    9180d000 921e42e0   nvlddmkm nvlddmkm.sys Wed Jul 28 10:40:15 2010 (4C50414F)
    8f8be000 8f912c80   nvm62x32 nvm62x32.sys Fri Oct 17 17:00:39 2008 (48F8FCF7)
    8b2df000 8b304000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
    8b35b000 8b392000   nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
    90d35000 90d54000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    8b1cc000 8b1dd000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    8b1a2000 8b1cc000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8b288000 8b28f000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8b28f000 8b29d000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8b5ec000 8b5fa000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9b2a6000 9b33d000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    8f964000 8f993000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    8ae83000 8ae94000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8f800000 8f818000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    96023000 9603b000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    9603b000 96052000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    96052000 96069000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    90dad000 90dee000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    96069000 96073000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    90c4f000 90c57000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    90c57000 90c5f000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    90c5f000 90c67000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    8b74d000 8b77a000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    96127000 9613a000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    8200e000 823209c0   RTKVHDA  RTKVHDA.sys  Tue Nov 02 07:18:52 2010 (4CCFF39C)
    90d9f000 90daca60   SCDEmu   SCDEmu.SYS   Mon Apr 12 04:44:34 2010 (4BC2DD72)
    8b121000 8b147000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
    9b33d000 9b347000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    921f2000 921fc000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    90d62000 90d7c000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    8b9da000 8b9db480   speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
    8b9d2000 8b9da000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    8b025000 8b118000   sptd     sptd.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
    9e826000 9e877000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
    9b375000 9b3c4000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
    9b347000 9b368000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
    8b304000 8b34b000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
    9608d000 9608e380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8b810000 8b959000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
    9b368000 9b375000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    90c97000 90ca2000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    90c80000 90c97000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    90d8f000 90d9f000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    82b60000 82b69000   TSDDD    TSDDD.dll    unavailable (00000000)
    900d5000 900f6000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    9608f000 9609d000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    9e934000 9e94b000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    9e917000 9e918700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8f883000 8f892000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    9609d000 960e1000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    91800000 9180a000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8f838000 8f883000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    8b197000 8b1a2000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    8b223000 8b22f000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    90c21000 90c42000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    8b98a000 8b992380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    8b1f0000 8b200000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8b23d000 8b288000   volmgrx  volmgrx.sys  unavailable (00000000)
    8b993000 8b9d2000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    8f959000 8f963b80   vrtaucbl vrtaucbl.sys Mon Feb 15 12:07:04 2010 (4B797F38)
    90d7c000 90d8f000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    90c42000 90c4f000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8af89000 8affa000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    8b017000 8b025000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    90d2e000 90d35000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    82900000 82b4b000   win32k   win32k.sys   unavailable (00000000)
    8b118000 8b121000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    823ae000 823c8000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    823f5000 823fd000   LHidFilt.Sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9610f000 96117000   LMouFilt.Sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    823c8000 823ce000   LUsbFilt.Sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    823f3000 823f5000   USBD.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    823d9000 823ec000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    823ce000 823d9000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    82000000 8200b000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9613a000 96151000   usbccgp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    96151000 9615d000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9e880000 9e8ea000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9b2a4000 9b2a6000   SOFTLOK.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9b28c000 9b2a4000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b800000 8b80d000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b9f5000 8b9ff000   dump_scsipor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b409000 8b419000   dump_arcm_x8
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b3eb000 8b3fc000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b200000 8b21f000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  5. Posts : 35
    Windows 7 x64 Ultimate
    Thread Starter
       #5

    I uninstalled Daemon Tools Lite, then when trying to run the SPDT uninstaller (x86 version), it says it is not a valid win32 application. I tried downloading it and running it twice. But when I search my system for traces of SPDT.sys, there are none. Am I good to go?

    I have tried installing the Nvidia networking drivers, but for some reason I get TERRIBLE network speeds from my server running Server 2008. I could find no workaround but to use the Windows driver. Very strange...

    Regarding the nvstor.sys driver, I am using an Areca card for a raid array, with NO sata drives at all. Not even for a dvd-rom (use portable USB). Device manager shows no sata storage controllers other than the Areca. I have installed the latest package of Nvidia drivers for my 680i SLI, but I had to back out the ethernet driver as mentioned above. So I am wondering why I don't see the nvidia storage drivers. Any idea?

    I uninstalled speedfan and then deleted the giveio.sys file.

    I am going to run memtest now. Will be checking for your feedback on my other concerns above from my Mac.




    I am going to run memtest now. I will post any findings.

    Thanks again!!!!!
      My Computer


  6. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #6

    You are very welcome. Great job of following suggestions. You can download and install the latest version of Speedfan; it does not use the giveio.sys driver.

    For now, let's not be concerned about nvstor.sys. There is an updated version. The critical ones are the 1996 and 2008 drivers. I am not quite sure I understand what you did about the nVidia Ethernet driver. It is a chipset driver. Did you update your nVidia chipset drivers?

    Waiting for the Memtest results.
      My Computer


  7. Posts : 35
    Windows 7 x64 Ultimate
    Thread Starter
       #7

    Memtest has been running for nearly 6 hours, 7 passes no errors. I have found quite a few posts online about how one memory diagnostic utility will find errors when another will not. 3 out of my 5 windows memory diagnostic found errors pretty quickly. I will post the memtest results in a little
    bit after I have ran it a little longer...

    When I started diagnosing my issues months ago, I installed ALL the latest Nvidia drivers (chipset, ethernet, etc...). From the get-go, I noticed that when streaming videos from my server (running server 2008), it would stutter. I checked the NIC settings (full duplex etc...) and I could not
    get it to stream correctly. I rolled the driver BACK, and I was fine. So, for some reason, the latest nvidia driver is causing issues. This is why I rolled it back. Does this help? Anyways, again, thanks for your help. I am anxious to sort all of this out...
      My Computer


  8. Posts : 35
    Windows 7 x64 Ultimate
    Thread Starter
       #8

    Memtest ran 9 passes, nearly 10 hours. No errors.
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #9

    That tells you that your RAM is probably OK. What you have read about memory testing is true. I have seen Memtest not show any errors until the 13th pass. Usually a shop will let in run for 24 hours.
      My Computer


  10. Posts : 35
    Windows 7 x64 Ultimate
    Thread Starter
       #10

    Are you forgetting that I am getting memory errors with WIndows Memory Diagnostics?
      My Computer


 
Page 1 of 5 123 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 03:11.
Find Us