Win 7 BSOD

Page 1 of 2 12 LastLast

  1. Posts : 6
    Windows 7 64-bit
       #1

    Win 7 BSOD


    Hi Everyone,

    I am a fairly advanced user but this has me at my wits end.

    The machine in question is home built by me:

    ASUS M3N78-VM
    AMD Athlon 7850 64bit
    8 GB RAM
    1 TB Maxtor Black
    80GB boot drive

    This machines purpose was to run virtual machine for my development work which it did fine for some time, ~8 to 12 months. About 3 weeks ago the BSOD started. At first pointing to some BitDefender driver file, so I uninstalled BitDefender and went with MSE. Then BSOD on VPCNFLTR.SYS (VirtualPC network driver). I couldn't find a solution for that so I wiped the HD and reinstalled Win7 64bit. Still get BSOD.

    My guess at this point is that its a hardware issue. I'd love to get a second opinion.

    Regards

    Attachment 142426

    Attachment 142432
    Attachment 142433
    Attachment 142447
    Attachment 142448
    Attachment 142449
    Last edited by rags; 08 Mar 2011 at 10:51.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2


    BugCheck 109, {a3a039d89844769f, b3b7465eeac148cd, fffff8000286dba0, 1}

    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : memory_corruption


    ~~~~~~~~~~~~~
    ~~~~~~~~~~~~~


    BugCheck 1A, {41284, 7fef6492001, 1cec, fffff70001080000}

    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )





    1. Check the memory settings, attach Rammon HTML report:

    PassMark RAMMon - Identify RAM type, speed & memory timings



    2. Run Memtest86+ - Advanced Memory Diagnostic Tool 10 passes overnight.







    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-35661-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02800000 PsLoadedModuleList = 0xfffff800`02a3de50
    Debug session time: Tue Mar  8 08:43:35.255 2011 (UTC - 5:00)
    System Uptime: 0 days 0:05:52.019
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 34, {50830, fffff880065034a8, fffff88006502d00, fffff80002976c95}
    
    Probably caused by : memory_corruption ( nt!MiLogPageAccess+e5 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CACHE_MANAGER (34)
        See the comment for FAT_FILE_SYSTEM (0x23)
    Arguments:
    Arg1: 0000000000050830
    Arg2: fffff880065034a8
    Arg3: fffff88006502d00
    Arg4: fffff80002976c95
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff880065034a8 -- (.exr 0xfffff880065034a8)
    ExceptionAddress: fffff80002976c95 (nt!MiLogPageAccess+0x00000000000000e5)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88006502d00 -- (.cxr 0xfffff88006502d00)
    rax=0000000000000001 rbx=fffffa8008733000 rcx=f8a00a36dba80000
    rdx=fffff6fcc0086fa8 rsi=fffffa8003853520 rdi=fffff6fcc0086fa8
    rip=fffff80002976c95 rsp=fffff880065036e0 rbp=0000000000000000
     r8=fffff98010df5001  r9=0000000000002eb2 r10=fffff780c0000488
    r11=fffff780c0000000 r12=fa80072cc3a004c0 r13=0000000000000035
    r14=fffffa8008733ff8 r15=fffff8a00a36dba8
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!MiLogPageAccess+0xe5:
    fffff800`02976c95 410fba64243814  bt      dword ptr [r12+38h],14h ds:002b:fa80072c`c3a004f8=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aa80e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    nt!MiLogPageAccess+e5
    fffff800`02976c95 410fba64243814  bt      dword ptr [r12+38h],14h
    
    FAULTING_IP: 
    nt!MiLogPageAccess+e5
    fffff800`02976c95 410fba64243814  bt      dword ptr [r12+38h],14h
    
    BUGCHECK_STR:  0x34
    
    LAST_CONTROL_TRANSFER:  from fffff8000281418b to fffff80002976c95
    
    STACK_TEXT:  
    fffff880`065036e0 fffff800`0281418b : 00000003`00000000 00000000`00002eb2 fffffa80`03171a80 fffff880`06503968 : nt!MiLogPageAccess+0xe5
    fffff880`06503730 fffff800`02b85e35 : fffff980`10df5000 fffff8a0`0a87e8b0 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x2bf68
    fffff880`06503a10 fffff800`0288ad47 : 00000000`00140000 fffffa80`066f9990 00000000`00000000 00000000`00200000 : nt!CcUnmapVacb+0x5d
    fffff880`06503a50 fffff800`02861ad4 : 00000000`00000001 fffffa80`081d21f0 fffffa80`06d0de00 00000000`00000000 : nt!CcUnmapVacbArray+0x1b7
    fffff880`06503ae0 fffff800`0286555c : fffffa80`06d0de10 00000000`00000011 fffffa80`06d0de10 fffffa80`00000000 : nt!CcDeleteSharedCacheMap+0x140
    fffff880`06503b50 fffff800`02865d60 : fffff800`02a77100 fffff880`06503c58 00000000`00000000 fffffa80`00000000 : nt!CcWriteBehind+0x5bc
    fffff880`06503c00 fffff800`0287f161 : fffffa80`06747190 fffff800`02b6b504 fffff800`02a77140 fffff880`00000000 : nt!CcWorkerThread+0x1c8
    fffff880`06503cb0 fffff800`02b15166 : fffff880`00000103 fffffa80`06c0d760 00000000`00000080 fffffa80`066a8890 : nt!ExpWorkerThread+0x111
    fffff880`06503d40 fffff800`02850486 : fffff800`029eae80 fffffa80`06c0d760 fffff800`029f8c40 fffff880`0123dbf0 : nt!PspSystemThreadStartup+0x5a
    fffff880`06503d80 00000000`00000000 : fffff880`06504000 fffff880`064fe000 fffff880`06502f30 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiLogPageAccess+e5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    STACK_COMMAND:  .cxr 0xfffff88006502d00 ; kb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x34_nt!MiLogPageAccess+e5
    
    BUCKET_ID:  X64_0x34_nt!MiLogPageAccess+e5
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-30654-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02802000 PsLoadedModuleList = 0xfffff800`02a3fe50
    Debug session time: Tue Mar  8 08:48:45.818 2011 (UTC - 5:00)
    System Uptime: 0 days 0:04:03.582
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 109, {a3a039d89844769f, b3b7465eeac148cd, fffff8000286dba0, 1}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CRITICAL_STRUCTURE_CORRUPTION (109)
    This bugcheck is generated when the kernel detects that critical kernel code or
    data have been corrupted. There are generally three causes for a corruption:
    1) A driver has inadvertently or deliberately modified critical kernel code
     or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
    2) A developer attempted to set a normal kernel breakpoint using a kernel
     debugger that was not attached when the system was booted. Normal breakpoints,
     "bp", can only be set if the debugger is attached at boot time. Hardware
     breakpoints, "ba", can be set at any time.
    3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
    Arguments:
    Arg1: a3a039d89844769f, Reserved
    Arg2: b3b7465eeac148cd, Reserved
    Arg3: fffff8000286dba0, Failure type dependent information
    Arg4: 0000000000000001, Type of corrupted region, can be
    	0 : A generic data region
    	1 : Modification of a function or .pdata
    	2 : A processor IDT
    	3 : A processor GDT
    	4 : Type 1 process list corruption
    	5 : Type 2 process list corruption
    	6 : Debug routine modification
    	7 : Critical MSR modification
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x109
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002873f00
    
    STACK_TEXT:  
    fffff880`02fef5d8 00000000`00000000 : 00000000`00000109 a3a039d8`9844769f b3b7465e`eac148cd fffff800`0286dba0 : nt!KeBugCheckEx
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff8000286dbad - nt!ZwDisableLastKnownGood+d
    	[ 8d:89 ]
    1 error : !nt (fffff8000286dbad)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BIT
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    Followup: memory_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-45973-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c57e50
    Debug session time: Tue Mar  8 09:42:54.102 2011 (UTC - 5:00)
    System Uptime: 0 days 0:06:21.757
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41284, 7fef6492001, 1cec, fffff70001080000}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041284, A PTE or the working set list is corrupt.
    Arg2: 000007fef6492001
    Arg3: 0000000000001cec
    Arg4: fffff70001080000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41284
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  mscorsvw.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002adf3b3 to fffff80002a8a740
    
    STACK_TEXT:  
    fffff880`0bf317e8 fffff800`02adf3b3 : 00000000`0000001a 00000000`00041284 000007fe`f6492001 00000000`00001cec : nt!KeBugCheckEx
    fffff880`0bf317f0 fffff800`02afdcc3 : fffffa80`03bfacc0 4ec00001`3fe44025 000007fe`f648c000 5f400001`4e231025 : nt! ?? ::FNODOBFM::`string'+0x4a83
    fffff880`0bf31830 fffff800`02abddf9 : 00000000`00000000 000007fe`f6496fff fffffa80`00000000 fffff800`02c04e80 : nt! ?? ::FNODOBFM::`string'+0x3360b
    fffff880`0bf319f0 fffff800`02da1010 : fffffa80`096887f0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
    fffff880`0bf31b10 fffff800`02da141b : 00000000`00000000 000007fe`f6480000 fffffa80`00000001 fffffa80`06807df0 : nt!MiUnmapViewOfSection+0x1b0
    fffff880`0bf31bd0 fffff800`02a89993 : fffffa80`06aa9060 fffff880`0bf31ca0 fffffa80`06a38b30 fffffa80`00008000 : nt!NtUnmapViewOfSection+0x5f
    fffff880`0bf31c20 00000000`77a7f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0017de28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a7f95a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4a83
    fffff800`02adf3b3 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4a83
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83
    
    BUCKET_ID:  X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83
    
    Followup: MachineOwner
    ---------



    Drivers:

    Code:
    start             end                 module name
    fffff880`00f9b000 fffff880`00ff2000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02b17000 fffff880`02ba1000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03dc4000 fffff880`03dda000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`039e0000 fffff880`039f5000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00d93000 fffff880`00d9e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`03a29000 fffff880`03a31000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
    fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d69000 fffff880`00d93000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`02a6b000 fffff880`02a72000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`039cf000 fffff880`039e0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`06db8000 fffff880`06dd6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00750000 fffff960`00777000   cdd      cdd.dll      unavailable (00000000)
    fffff880`02a07000 fffff880`02a31000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d0b000 fffff880`00d69000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`012e4000 fffff880`01357000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03db4000 fffff880`03dc4000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`06c9e000 fffff880`06ca7000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
    fffff880`056ae000 fffff880`056bc000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0392e000 fffff880`039b1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`039b1000 fffff880`039cf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0391f000 fffff880`0392e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0123a000 fffff880`01250000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0566e000 fffff880`05690000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`056c8000 fffff880`056d1000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`056bc000 fffff880`056c8000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`056d1000 fffff880`056e4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`056e4000 fffff880`056f0000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03c71000 fffff880`03d65000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`03d65000 fffff880`03dab000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`06cba000 fffff880`06cf0000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`03826000 fffff880`03833000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`00dea000 fffff880`00dfe000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`04655000 fffff880`04660000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`00d9e000 fffff880`00dea000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01368000 fffff880`01372000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01200000 fffff880`0123a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02ff7000 fffff800`03040000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03aba000 fffff880`03ade000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`03b8a000 fffff880`03be6000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`056fe000 fffff880`05717000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05717000 fffff880`0571f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`056f0000 fffff880`056fe000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`06cf0000 fffff880`06db8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015f1000 fffff880`015fa000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`051b3000 fffff880`051c2000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05767000 fffff880`05775000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc3000 fffff800`00bcd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04600000 fffff880`04643000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`012ca000 fffff880`012e4000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05690000 fffff880`05695200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`057e2000 fffff880`057f7000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0579e000 fffff880`057c1000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`07507000 fffff880`07511000   LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
    fffff880`01c05000 fffff880`01ffba80   lvuvc64  lvuvc64.sys  Tue Nov 09 21:37:14 2010 (4CDA055A)
    fffff880`00cea000 fffff880`00cf7000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`05790000 fffff880`0579e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`051c2000 fffff880`051d1000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05722000 fffff880`0572f000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02a31000 fffff880`02a62000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`07542000 fffff880`07552000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`06dd6000 fffff880`06dee000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`06c00000 fffff880`06c2d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`06c2d000 fffff880`06c7b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`06c7b000 fffff880`06c9e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`02ad0000 fffff880`02adb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0126c000 fffff880`012ca000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03914000 fffff880`0391f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015df000 fffff880`015f1000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014e5000 fffff880`015d7000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03c00000 fffff880`03c0c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03c0c000 fffff880`03c3b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04660000 fffff880`04675000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`0385c000 fffff880`0386b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02ba1000 fffff880`02be6000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`07552000 fffff880`07567000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`02adb000 fffff880`02aec000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03908000 fffff880`03914000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a1a000 fffff800`02ff7000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01041000 fffff880`011e4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`02a62000 fffff880`02a6b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`05185000 fffff880`05186180   nvBridge nvBridge.kmd Wed Jul 08 12:31:23 2009 (4A54C9DB)
    fffff880`05696000 fffff880`056ae000   nvhda64v nvhda64v.sys Fri Jun 26 18:54:59 2009 (4A4551C3)
    fffff880`04688000 fffff880`05184e00   nvlddmkm nvlddmkm.sys Wed Jul 08 13:44:06 2009 (4A54DAE6)
    fffff880`03ade000 fffff880`03b2f500   nvmf6264 nvmf6264.sys Wed Jul 01 14:55:18 2009 (4A4BB116)
    fffff880`03a3d000 fffff880`03a48000   nvsmu    nvsmu.sys    Mon Jun 29 03:36:37 2009 (4A486F05)
    fffff880`03836000 fffff880`0385c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`03a0c000 fffff880`03a29000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00ed7000 fffff880`00ee7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01357000 fffff880`01368000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`072d8000 fffff880`0737e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05631000 fffff880`0566e000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cf7000 fffff880`00d0b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03dda000 fffff880`03dfe000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03c3b000 fffff880`03c56000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`05187000 fffff880`051a8000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03c56000 fffff880`03c70000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`038b7000 fffff880`03908000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`051a8000 fffff880`051b3000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`02ab5000 fffff880`02abe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02abe000 fffff880`02ac7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02ac7000 fffff880`02ad0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`013be000 fffff880`013f8000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05600000 fffff880`05618000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0737e000 fffff880`07389000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03a31000 fffff880`03a3d000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0386b000 fffff880`03888000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`015d7000 fffff880`015df000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`07567000 fffff880`075d8000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`07471000 fffff880`07507000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`07200000 fffff880`07267000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`07389000 fffff880`073b6000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`03dfe000 fffff880`03dff480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`073b6000 fffff880`073c8000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`02b0a000 fffff880`02b17000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`02aec000 fffff880`02b0a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`038a3000 fffff880`038b7000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004c0000 fffff960`004ca000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03800000 fffff880`03826000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04643000 fffff880`04655000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05775000 fffff880`0578fc00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0574a000 fffff880`05767000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05720000 fffff880`05721f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03aa9000 fffff880`03aba000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`03b30000 fffff880`03b8a000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`03a48000 fffff880`03a53000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03a53000 fffff880`03aa9000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0572f000 fffff880`0574a000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`02a72000 fffff880`02a80000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`02a80000 fffff880`02aa5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`014d5000 fffff880`014e5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01372000 fffff880`013be000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03888000 fffff880`038a3000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`02aa5000 fffff880`02ab5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ee8000 fffff880`00f8c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f8c000 fffff880`00f9b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02be6000 fffff880`02bef000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`003a0000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
    fffff880`03dab000 fffff880`03db4000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00ff2000 fffff880`00ffb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`057c1000 fffff880`057e2000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`07511000 fffff880`07542000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`01250000 fffff880`0125e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0125e000 fffff880`0126a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01030000 fffff880`01039000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`011e4000 fffff880`011f7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  3. Posts : 6
    Windows 7 64-bit
    Thread Starter
       #3

    Thanks cybercore!

    I'll start the memtest shortly.

    Attachment 142456
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    The sticks are matching and are set right, thank you for the attachments.
      My Computer


  5. Posts : 6
    Windows 7 64-bit
    Thread Starter
       #5

    I got errors right away in memtest. I am still reading up on how to diagnose but all errors are in the 4100 mb to 4600 mb range. I am guessing this a bad stick. Once the first pass is done I'll retest on each stick individually.
      My Computer


  6. Posts : 6
    Windows 7 64-bit
    Thread Starter
       #6

    Thanks so much for your help!

    Attachment 142475
      My Computer


  7. Posts : 6,668
    Windows 7 x64
       #7

    Wow I'm surprised you were even able to boot properly with that.
    Removing the offending stick will hopefully help you in the short run, and you can simply replace it later.
      My Computer


  8. Posts : 6
    Windows 7 64-bit
    Thread Starter
       #8

    Really? I've never had RAM stick go bad so this is new to me.
      My Computer


  9. Posts : 6,668
    Windows 7 x64
       #9

    they just don't usually start spewing out massive errors right off the bat, usually you at least have to flood them a couple of times first.

    If it's not very old you can always rma it for a replacement, you'll have to contact the manufacturer concerning that though.
    ...after you identify which stick it is of course.
      My Computer


  10. Posts : 670
    Windows 7 x64
       #10

    rags said:
    Really? I've never had RAM stick go bad so this is new to me.

    If memtest shows errors that means bad RAM for sure. You may want to test per stick and per slot to find out which one is guilty, as Maguscreed already said. Sometimes it's a bad RAM slot that gives you errors.
      My Computer


 
Page 1 of 2 12 LastLast

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 02:35.
Find Us