BSOD Multiple!


  1. Posts : 8
    Windows 7 Home Premium x64
       #1

    BSOD Multiple!


    Hi guys. I am having a couple BSODs tonight. The reason? Apparently the same. Dumps are attached. So please help me! Thanks..

    PS: The most recent ones are included in minidump.rar
    Last edited by Tamirci; 31 Jan 2011 at 14:46.
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    Dumps are blaming ntoskrnl.exe, a system file. Most probably another driver caused this issue
    Enable driver verifier to identify the faulting driver and upload the newly created dump files

    Driver Verifier - Enable and Disable
      My Computer


  3. Posts : 8
    Windows 7 Home Premium x64
    Thread Starter
       #3

    The DMP you've asked.
      My Computer


  4. Posts : 927
    windows 7 ultimate
       #4

    Hi Tamarci.

    STOP 0x0000000A: IRQL_NOT_LESS_OR_EQUAL
    Usual causes:
    Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility

    Your dump file blames the ntkrnlmp.exe which is a Windows System file and is highly unlikely to be the cause.

    In fact I can't see the cause!! With this list of drivers the only way you should get a blue screen as far as I can see is if you got a tin of paint out! :)

    Can you ensure driver verifier is running. Also please fill in some of your System specs under your user profile.

    Finally Please see and follow:Bugcheck Analysis
    Code:
    Loading Dump File [D:\DOWNLOADS\DUMPS\TamirciMinidump\020111-15834-01 - Copy.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
    Debug session time: Tue Feb  1 14:23:01.688 2011 (UTC + 0:00)
    System Uptime: 0 days 0:00:10.436
    Loading Kernel Symbols
    ...............................................................
    ..................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff800032253c0, 2, 0, fffff80002ea1f62}
    
    Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff800032253c0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ea1f62, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0
     fffff800032253c0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!RtlDispatchException+122
    fffff800`02ea1f62 410fb60c24      movzx   ecx,byte ptr [r12]
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002faf090 -- (.trap 0xfffff88002faf090)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a000493bd0 rbx=0000000000000000 rcx=0000000000000008
    rdx=fffff88002faf2e0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032253c0 rsp=fffff88002faf228 rbp=fffff88002faf4b0
     r8=fffff8a000003001  r9=0000000000000017 r10=fffffa8003b9b660
    r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!CmpCallCallBacks:
    fffff800`032253c0 488bc4          mov     rax,rsp
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff88002faeb18 -- (.exr 0xfffff88002faeb18)
    ExceptionAddress: fffff80002e794d8 (nt!KiTryUnwaitThread+0x0000000000000028)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    LOCK_ADDRESS:  fffff80003077400 -- (!locks fffff80003077400)
    
    Resource @ nt!PiEngineLock (0xfffff80003077400)    Available
    
    WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
    
    
    WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
    
    1 total locks
    
    PNP_TRIAGE: 
        Lock address  : 0xfffff80003077400
        Thread Count  : 0
        Thread address: 0x0000000000000000
        Thread wait   : 0x0
    
    LAST_CONTROL_TRANSFER:  from fffff80002e74469 to fffff80002e74f00
    
    STACK_TEXT:  
    fffff880`02fad988 fffff800`02e74469 : 00000000`0000000a fffff800`032253c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02fad990 fffff800`02e730e0 : fffff880`02fadbe0 00000000`00000000 00000000`00037464 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02fadad0 fffff800`02ea1f62 : fffff800`032253c0 fffff880`02fadca8 fffff880`02faeb18 fffff800`02e03000 : nt!KiPageFault+0x260
    fffff880`02fadc60 fffff800`02eaf1b5 : fffff880`02faeb18 fffff880`02fae370 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
    fffff880`02fae340 fffff800`02e74542 : fffff880`02faeb18 ffff0800`00000011 fffff880`02faebc0 00000000`00000000 : nt!KiDispatchException+0x135
    fffff880`02fae9e0 fffff800`02e72e4a : 00000000`00000001 00000000`80000000 fffff880`02faed90 fffff800`02e4d6d6 : nt!KiExceptionDispatch+0xc2
    fffff880`02faebc0 fffff800`02e794d8 : fffff6fc`00019128 fffff800`03000440 00000000`00000000 fffff800`032253c0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`02faed50 fffff800`02eef22d : fffff980`03182ee0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
    fffff880`02faedb0 fffff800`02e5192f : fffff6fc`00018a68 00000000`00000002 fffff800`02fffb00 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x3cae9
    fffff880`02faee80 fffff800`02e26ba9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`02faef00 fffff800`02e90424 : 00000000`00000000 fffff800`02e8efa0 00b00000`0314d121 0000007f`ffffffff : nt!KiCheckForKernelApcDelivery+0x25
    fffff880`02faef30 fffff800`02e72fee : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1844
    fffff880`02faf090 fffff800`032253c0 : fffff800`03191315 00400000`0321e100 00000000`00000001 fffffa80`03b9b660 : nt!KiPageFault+0x16e
    fffff880`02faf228 fffff800`03191315 : 00400000`0321e100 00000000`00000001 fffffa80`03b9b660 00001f80`01080000 : nt!CmpCallCallBacks
    fffff880`02faf230 fffff800`02e74153 : fffffa80`03b86b60 fffff880`02faf5e8 fffffa80`00000001 fffff980`015d6fc0 : nt! ?? ::NNGAKEGL::`string'+0x2c83e
    fffff880`02faf3c0 fffff800`02e706f0 : fffff800`030e52ab ffffffff`80000138 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`02faf5c8 fffff800`030e52ab : ffffffff`80000138 00000000`00000001 00000000`00000000 ffffffff`8000014c : nt!KiServiceLinkage
    fffff880`02faf5d0 fffff800`0321ee99 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff880`02faf700 : nt!IopGetRegistryValue+0xab
    fffff880`02faf630 fffff800`0325576e : fffff880`02faf708 00000000`00000002 00080dce`00000000 fffff880`02faf700 : nt!PipGetRegistryDwordWithFallback+0x99
    fffff880`02faf6b0 fffff800`0325fa03 : fffffa80`0599e9b0 fffffa80`053f8480 fffff8a0`00469e20 fffffa80`053b86e0 : nt!PipChangeDeviceObjectFromRegistryProperties+0x8e
    fffff880`02faf7a0 fffff800`03260ec2 : fffffa80`053aad90 fffffa80`053b86e0 00000000`00000002 fffffa80`053b9a20 : nt!PipCallDriverAddDevice+0x733
    fffff880`02faf950 fffff800`0326135c : fffffa80`05d47400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
    fffff880`02fafbc0 fffff800`02f75322 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
    fffff880`02fafc10 fffff800`02e82161 : fffff800`02f75020 fffff800`0316e501 fffffa80`03b86b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
    fffff880`02fafcb0 fffff800`03118166 : 00000604`00000000 fffffa80`03b86b60 00000000`00000080 fffffa80`03b10b30 : nt!ExpWorkerThread+0x111
    fffff880`02fafd40 fffff800`02e53486 : fffff880`02d64180 fffffa80`03b86b60 fffff880`02d6efc0 00000604`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`02fafd80 00000000`00000000 : fffff880`02fb0000 fffff880`02faa000 fffff880`02faf180 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!RtlDispatchException+122
    fffff800`02ea1f62 410fb60c24      movzx   ecx,byte ptr [r12]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!RtlDispatchException+122
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!RtlDispatchException+122
    
    BUCKET_ID:  X64_0xA_nt!RtlDispatchException+122
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmsmtn
    start             end                 module name
    fffff880`00ee4000 fffff880`00f3b000   ACPI     ACPI.sys     Tue Jul 14 00:19:34 2009 (4A5BC106)
    fffff880`02b3d000 fffff880`02bc7000   afd      afd.sys      Tue Jul 14 00:21:40 2009 (4A5BC184)
    fffff880`03c6f000 fffff880`03c84000   amdppm   amdppm.sys   Tue Jul 14 00:19:25 2009 (4A5BC0FD)
    fffff880`00ff2000 fffff880`00ffd000   amdxata  amdxata.sys  Tue May 19 18:56:59 2009 (4A12F2EB)
    fffff880`00fe9000 fffff880`00ff2000   atapi    atapi.sys    Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Tue Jul 14 00:19:52 2009 (4A5BC118)
    fffff880`02a91000 fffff880`02a98000   Beep     Beep.SYS     Tue Jul 14 01:00:13 2009 (4A5BCA8D)
    fffff880`03c38000 fffff880`03c49000   blbdrive blbdrive.sys Tue Jul 14 00:35:59 2009 (4A5BC4DF)
    fffff880`02a2d000 fffff880`02a57000   cdrom    cdrom.sys    Tue Jul 14 00:19:54 2009 (4A5BC11A)
    fffff880`00ca4000 fffff880`00d64000   CI       CI.dll       Tue Jul 14 02:32:13 2009 (4A5BE01D)
    fffff880`00dc0000 fffff880`00df0000   CLASSPNP CLASSPNP.SYS Tue Jul 14 00:19:58 2009 (4A5BC11E)
    fffff880`00c46000 fffff880`00ca4000   CLFS     CLFS.SYS     Tue Jul 14 00:19:57 2009 (4A5BC11D)
    fffff880`01145000 fffff880`011b8000   cng      cng.sys      Tue Jul 14 00:49:40 2009 (4A5BC814)
    fffff880`013f1000 fffff880`013ff000   crashdmp crashdmp.sys Tue Jul 14 01:01:01 2009 (4A5BCABD)
    fffff880`03c1a000 fffff880`03c38000   dfsc     dfsc.sys     Tue Jul 14 00:23:44 2009 (4A5BC200)
    fffff880`03c0b000 fffff880`03c1a000   discache discache.sys Tue Jul 14 00:37:18 2009 (4A5BC52E)
    fffff880`013db000 fffff880`013f1000   disk     disk.sys     Tue Jul 14 00:19:57 2009 (4A5BC11D)
    fffff880`015f5000 fffff880`015fe000   dump_atapi dump_atapi.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`011f2000 fffff880`011fe000   dump_ataport dump_ataport.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`00c00000 fffff880`00c13000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
    fffff880`1489e000 fffff880`14992000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 02:00:14 2009 (4AC5509E)
    fffff880`14992000 fffff880`149d8000   dxgmms1  dxgmms1.sys  Tue Jul 14 00:38:32 2009 (4A5BC578)
    fffff880`010d3000 fffff880`010e7000   fileinfo fileinfo.sys Tue Jul 14 00:34:25 2009 (4A5BC481)
    fffff880`01087000 fffff880`010d3000   fltmgr   fltmgr.sys   Tue Jul 14 00:19:59 2009 (4A5BC11F)
    fffff880`013d1000 fffff880`013db000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 00:19:45 2009 (4A5BC111)
    fffff880`011b8000 fffff880`011f2000   fvevol   fvevol.sys   Sat Sep 26 03:34:26 2009 (4ABD7DB2)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Tue Jul 14 00:21:08 2009 (4A5BC164)
    fffff800`033e0000 fffff800`03429000   hal      hal.dll      Tue Jul 14 02:27:36 2009 (4A5BDF08)
    fffff880`015ec000 fffff880`015f5000   hwpolicy hwpolicy.sys Tue Jul 14 00:19:22 2009 (4A5BC0FA)
    fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Tue Jul 14 02:31:07 2009 (4A5BDFDB)
    fffff880`013a6000 fffff880`013c0000   ksecdd   ksecdd.sys   Tue Jul 14 00:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:03:32 2009 (4B21E0B4)
    fffff880`00c25000 fffff880`00c32000   mcupdate mcupdate.dll Tue Jul 14 02:29:09 2009 (4A5BDF65)
    fffff880`00fcf000 fffff880`00fe9000   mountmgr mountmgr.sys Tue Jul 14 00:19:54 2009 (4A5BC11A)
    fffff880`02a57000 fffff880`02a88000   MpFilter MpFilter.sys Wed Sep 15 01:19:28 2010 (4C901110)
    fffff880`02af6000 fffff880`02b01000   Msfs     Msfs.SYS     Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`00f44000 fffff880`00f4e000   msisadrv msisadrv.sys Tue Jul 14 00:19:26 2009 (4A5BC0FE)
    fffff880`010e7000 fffff880`01145000   msrpc    msrpc.sys    Tue Jul 14 00:21:32 2009 (4A5BC17C)
    fffff880`03c00000 fffff880`03c0b000   mssmbios mssmbios.sys Tue Jul 14 00:31:10 2009 (4A5BC3BE)
    fffff880`015da000 fffff880`015ec000   mup      mup.sys      Tue Jul 14 00:23:45 2009 (4A5BC201)
    fffff880`01488000 fffff880`0157a000   ndis     ndis.sys     Tue Jul 14 00:21:40 2009 (4A5BC184)
    fffff880`03d46000 fffff880`03d55000   netbios  netbios.sys  Tue Jul 14 01:09:26 2009 (4A5BCCB6)
    fffff880`03cd2000 fffff880`03d17000   netbt    netbt.sys    Tue Jul 14 00:21:28 2009 (4A5BC178)
    fffff880`0157a000 fffff880`015da000   NETIO    NETIO.SYS    Fri Apr 09 03:43:59 2010 (4BBE946F)
    fffff880`02b01000 fffff880`02b12000   Npfs     Npfs.SYS     Tue Jul 14 00:19:48 2009 (4A5BC114)
    fffff880`03df2000 fffff880`03dfe000   nsiproxy nsiproxy.sys Tue Jul 14 00:21:02 2009 (4A5BC15E)
    fffff800`02e03000 fffff800`033e0000   nt       ntkrnlmp.exe Tue Jul 14 00:40:48 2009 (4A5BC600)
    fffff880`01203000 fffff880`013a6000   Ntfs     Ntfs.sys     Tue Jul 14 00:20:47 2009 (4A5BC14F)
    fffff880`02a88000 fffff880`02a91000   Null     Null.SYS     Tue Jul 14 00:19:37 2009 (4A5BC109)
    fffff880`1489c000 fffff880`1489d180   nvBridge nvBridge.kmd Sat Jan 08 01:57:22 2011 (4D27C482)
    fffff880`13c41000 fffff880`1489bd00   nvlddmkm nvlddmkm.sys Sat Jan 08 02:07:22 2011 (4D27C6DA)
    fffff880`03d20000 fffff880`03d46000   pacer    pacer.sys    Tue Jul 14 01:09:41 2009 (4A5BCCC5)
    fffff880`00f8e000 fffff880`00fa3000   partmgr  partmgr.sys  Tue Jul 14 00:19:58 2009 (4A5BC11E)
    fffff880`00f4e000 fffff880`00f81000   pci      pci.sys      Tue Jul 14 00:19:51 2009 (4A5BC117)
    fffff880`00fb8000 fffff880`00fbf000   pciide   pciide.sys   Tue Jul 14 00:19:49 2009 (4A5BC115)
    fffff880`00fbf000 fffff880`00fcf000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:19:48 2009 (4A5BC114)
    fffff880`013c0000 fffff880`013d1000   pcw      pcw.sys      Tue Jul 14 00:19:27 2009 (4A5BC0FF)
    fffff880`00c32000 fffff880`00c46000   PSHED    PSHED.dll    Tue Jul 14 02:32:23 2009 (4A5BE027)
    fffff880`03da1000 fffff880`03df2000   rdbss    rdbss.sys    Tue Jul 14 00:24:09 2009 (4A5BC219)
    fffff880`02adb000 fffff880`02ae4000   RDPCDD   RDPCDD.sys   Tue Jul 14 01:16:34 2009 (4A5BCE62)
    fffff880`02ae4000 fffff880`02aed000   rdpencdd rdpencdd.sys Tue Jul 14 01:16:34 2009 (4A5BCE62)
    fffff880`02aed000 fffff880`02af6000   rdprefmp rdprefmp.sys Tue Jul 14 01:16:35 2009 (4A5BCE63)
    fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Tue Jul 14 00:34:34 2009 (4A5BC48A)
    fffff880`03d55000 fffff880`03d72000   serial   serial.sys   Tue Jul 14 01:00:40 2009 (4A5BCAA8)
    fffff880`01475000 fffff880`0147d000   spldr    spldr.sys    Mon May 11 17:56:27 2009 (4A0858BB)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jun 14 04:39:04 2010 (4C15A458)
    fffff880`02b30000 fffff880`02b3d000   TDI      TDI.SYS      Tue Jul 14 00:21:18 2009 (4A5BC16E)
    fffff880`02b12000 fffff880`02b30000   tdx      tdx.sys      Tue Jul 14 00:21:15 2009 (4A5BC16B)
    fffff880`03d8d000 fffff880`03da1000   termdd   termdd.sys   Tue Jul 14 01:16:36 2009 (4A5BCE64)
    fffff880`03c49000 fffff880`03c6f000   tunnel   tunnel.sys   Tue Jul 14 01:09:37 2009 (4A5BCCC1)
    fffff880`00f81000 fffff880`00f8e000   vdrvroot vdrvroot.sys Tue Jul 14 01:01:31 2009 (4A5BCADB)
    fffff880`02a98000 fffff880`02aa6000   vga      vga.sys      Tue Jul 14 00:38:47 2009 (4A5BC587)
    fffff880`02aa6000 fffff880`02acb000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:38:51 2009 (4A5BC58B)
    fffff880`00fa3000 fffff880`00fb8000   volmgr   volmgr.sys   Tue Jul 14 00:19:57 2009 (4A5BC11D)
    fffff880`00d64000 fffff880`00dc0000   volmgrx  volmgrx.sys  Tue Jul 14 00:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Tue Jul 14 00:20:08 2009 (4A5BC128)
    fffff880`03d72000 fffff880`03d8d000   wanarp   wanarp.sys   Tue Jul 14 01:10:21 2009 (4A5BCCED)
    fffff880`02acb000 fffff880`02adb000   watchdog watchdog.sys Tue Jul 14 00:37:35 2009 (4A5BC53F)
    fffff880`00e31000 fffff880`00ed5000   Wdf01000 Wdf01000.sys Tue Jul 14 00:22:07 2009 (4A5BC19F)
    fffff880`00ed5000 fffff880`00ee4000   WDFLDR   WDFLDR.SYS   Tue Jul 14 00:19:54 2009 (4A5BC11A)
    fffff880`03d17000 fffff880`03d20000   wfplwf   wfplwf.sys   Tue Jul 14 01:09:26 2009 (4A5BCCB6)
    fffff880`00f3b000 fffff880`00f44000   WMILIB   WMILIB.SYS   Tue Jul 14 00:19:51 2009 (4A5BC117)
      My Computer


  5. Posts : 8
    Windows 7 Home Premium x64
    Thread Starter
       #5

    Is that so? What about this one then? :) (the latest .dmp file in the archive)
    BTW: Im am on safe mode right now and I wanna shut it down but verifier.exe is missing
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:09.
Find Us