BSOD While loading Windows

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Apman, May 9, 2011.

  1. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    View attachment Ambiente de trabalho.rar

    While loading windows 7 64 bits ultimate i have several, if not many, crashes. Although loading my other system (XP SP3 32bit) don't have any crash by loading it (sometimes).
    i'm kinda tired of this problem, it annoys me and keeps me wasting time.

    Sincerely

    Arpman.
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    RAM looks to be the causer of your blue screens:

    1. RAM is currently at 1200 mhz 9-9-9-24, set it 1333mhz 9-9-9-24 1.5v.
    2. Attach Passmark RAMMon HTML.zip
    3. Command Prompt > chkdsk /f
    4. Uninstall Daemon Tools
    DuplexSecure - FAQ

    5. Uninstall Avast

    avast! Uninstall Utility

    Virus, Spyware & Malware Protection | Microsoft Security Essentials

    6. Update drivers:

    Marvell Yukon networking
    yk62x64.sys Mon Feb 23 10:02:27 2009
    Marvell: Support
    ASUSTeK Computer Inc. -Support- Drivers and Download

    XBox USB wireless controller
    xusb21.sys Thu Aug 13 18:10:17 2009
    Software Downloads | Microsoft Hardware




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\040911-24024-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030ace90
    Debug session time: Sat Apr  9 16:25:00.997 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:13.339
    Loading Kernel Symbols
    ...............................................................
    ......................................................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff800031b43de, fffff880035c7098, fffff880035c68f0}
    
    Probably caused by : NETIO.SYS ( NETIO!NsipOpenKey+56 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff800031b43de, The address that the exception occurred at
    Arg3: fffff880035c7098, Exception Record Address
    Arg4: fffff880035c68f0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpKcbCacheLookup+1de
    fffff800`031b43de 418b45f4        mov     eax,dword ptr [r13-0Ch]
    
    EXCEPTION_RECORD:  fffff880035c7098 -- (.exr 0xfffff880035c7098)
    ExceptionAddress: fffff800031b43de (nt!CmpKcbCacheLookup+0x00000000000001de)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff880035c68f0 -- (.cxr 0xfffff880035c68f0)
    rax=0000000000000009 rbx=0000000000000000 rcx=00000000000001ec
    rdx=0000000001cb3401 rsi=fffff880035c74e0 rdi=00000000e5c014d4
    rip=fffff800031b43de rsp=fffff880035c72d0 rbp=fffff8a0000231f0
     r8=0000000000000008  r9=0000000000000000 r10=0000000000000009
    r11=fffff880035c7480 r12=fffff8a0046f0b98 r13=0200000000000000
    r14=0000000000000004 r15=0000000000000004
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    nt!CmpKcbCacheLookup+0x1de:
    fffff800`031b43de 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:002b:01ffffff`fffffff4=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031180e8
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    NETIO!NsipOpenKey+56
    fffff880`016128e6 488b5c2470      mov     rbx,qword ptr [rsp+70h]
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from fffff800031b50e5 to fffff800031b43de
    
    STACK_TEXT:  
    fffff880`035c72d0 fffff800`031b50e5 : fffff880`035c7480 fffff880`00000005 fffff880`035c7868 fffff880`035c7860 : nt!CmpKcbCacheLookup+0x1de
    fffff880`035c73c0 fffff800`031b1794 : fffff8a0`0000efa0 fffff880`035c7860 fffff880`035c78b0 fffff880`035c7890 : nt!CmpBuildHashStackAndLookupCache+0x335
    fffff880`035c77a0 fffff800`031e1d38 : fffffa80`04f56a98 fffff800`02e67000 fffffa80`04f568e0 fffff800`00000001 : nt!CmpParseKey+0x294
    fffff880`035c7aa0 fffff800`031e2f56 : 00000000`00000000 fffffa80`04f568e0 00000000`00000000 fffffa80`03a34a50 : nt!ObpLookupObjectName+0x588
    fffff880`035c7b90 fffff800`031b682c : 00000000`00000002 00000000`00000000 00000000`65726300 00000000`00000052 : nt!ObOpenObjectByName+0x306
    fffff880`035c7c60 fffff800`031c1922 : fffff880`035c8320 fffff880`00020019 fffff880`035c7fc0 fffffa80`00000000 : nt!CmOpenKey+0x28a
    fffff880`035c7db0 fffff800`02ee68d3 : 00000000`00000000 00000000`040d1860 00000000`00000000 fffff800`0306bec0 : nt!NtOpenKey+0x12
    fffff880`035c7df0 fffff800`02ee2e70 : fffff880`016128e6 ffff0800`00009b1a 00000000`000011d4 fffff6fb`00000091 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`035c7f88 fffff880`016128e6 : ffff0800`00009b1a 00000000`000011d4 fffff6fb`00000091 fffff880`00000023 : nt!KiServiceLinkage
    fffff880`035c7f90 fffff880`0161284b : fffff880`035c8448 00000000`00020019 fffff880`01612610 fffff8a0`04710660 : NETIO!NsipOpenKey+0x56
    fffff880`035c8000 fffff880`016141c8 : 00000000`0001010e fffff880`035c8548 00000000`00000000 fffff880`035c8468 : NETIO!NsipOpenInformationObjectKey+0xab
    fffff880`035c8290 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NsipReadPersistentData+0x68
    
    
    SYMBOL_STACK_INDEX:  9
    
    SYMBOL_NAME:  NETIO!NsipOpenKey+56
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    STACK_COMMAND:  .cxr 0xfffff880035c68f0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x7E_NETIO!NsipOpenKey+56
    
    BUCKET_ID:  X64_0x7E_NETIO!NsipOpenKey+56
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\030211-24835-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02ea2e90
    Debug session time: Wed Mar  2 13:38:33.491 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:59.880
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff880024472a8, fffff88002446b00, fffff80002fd9b87}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsReadMftRecord+b2 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff880024472a8
    Arg3: fffff88002446b00
    Arg4: fffff80002fd9b87
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff880024472a8 -- (.exr 0xfffff880024472a8)
    ExceptionAddress: fffff80002fd9b87 (nt!CcMapData+0x0000000000000117)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88002446b00 -- (.cxr 0xfffff88002446b00)
    rax=fffffa80018a9150 rbx=000000000000000e rcx=0000000000000000
    rdx=33fff98003677000 rsi=fffff880024476a8 rdi=fffffa8003775060
    rip=fffff80002fd9b87 rsp=fffff880024474e0 rbp=0000000000000090
     r8=000000000000000f  r9=0000000000277000 r10=0000000000000000
    r11=0000000000000001 r12=0000000000000001 r13=fffffa8002922f20
    r14=fffff880024475e8 r15=0000000000000001
    iopl=0         nv up ei ng nz ac po cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
    nt!CcMapData+0x117:
    fffff800`02fd9b87 0fb602          movzx   eax,byte ptr [rdx] ds:002b:33fff980`03677000=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  lsass.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e8
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsReadMftRecord+b2
    fffff880`014b61e2 84c0            test    al,al
    
    FAULTING_IP: 
    nt!CcMapData+117
    fffff800`02fd9b87 0fb602          movzx   eax,byte ptr [rdx]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff880014b61e2 to fffff80002fd9b87
    
    STACK_TEXT:  
    fffff880`024474e0 fffff880`014b61e2 : 00000000`00009000 fffffa80`018a9150 00000000`00000000 00000000`0000000e : nt!CcMapData+0x117
    fffff880`024475a0 fffff880`014b1d5c : fffffa80`04961660 fffffa80`02e4c180 fffff8a0`00239468 fffff880`01222d01 : Ntfs!NtfsReadMftRecord+0xb2
    fffff880`02447650 fffff880`014b6ae0 : fffff880`01226a00 fffff8a0`00239640 fffff8a0`00239590 fffffa80`02ceb0c0 : Ntfs!NtfsLookupInFileRecord+0x6c
    fffff880`024476e0 fffff880`014a016d : fffffa80`02f28c10 fffffa80`02ceb010 00000000`00000000 00000000`00000000 : Ntfs!FindFirstIndexEntry+0x50
    fffff880`02447770 fffff880`0149e9ce : fffffa80`04961660 fffff8a0`03d91930 fffff8a0`00239590 fffffa80`04961660 : Ntfs!NtfsRestartIndexEnumeration+0xed
    fffff880`02447990 fffff880`0149fff1 : fffff880`02447ea0 00000000`00000008 fffffa80`028da530 fffffa80`02f28810 : Ntfs!NtfsQueryDirectory+0x94e
    fffff880`02447d30 fffff880`014a28ef : fffffa80`04961660 00000000`00000000 fffff880`02447e20 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1
    fffff880`02447d70 fffff880`01215bcf : fffffa80`02f28bb0 fffffa80`02f28810 fffffa80`04961660 fffff880`02447d98 : Ntfs!NtfsFsdDirectoryControl+0x10f
    fffff880`02447de0 fffff880`01218aea : 00000000`00000000 00000000`00000000 fffffa80`03a2a400 fffffa80`02ceb010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`02447e70 fffff880`01236978 : fffffa80`0297fbc0 00000000`00000022 fffffa80`029213d0 fffffa80`02ceb0c0 : fltmgr!FltPerformSynchronousIo+0x2ca
    fffff880`02447f10 fffff880`05baad71 : 00000000`00000000 00000000`00000020 fffff880`02447fd0 fffff880`02448060 : fltmgr!FltQueryDirectoryFile+0x98
    fffff880`02447f50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : luafv!LuafvNormalizeNameComponentEx+0x145
    
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  Ntfs!NtfsReadMftRecord+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9
    
    STACK_COMMAND:  .cxr 0xfffff88002446b00 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsReadMftRecord+b2
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsReadMftRecord+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\030211-24882-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e9ee90
    Debug session time: Wed Mar  2 13:40:08.112 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:47.517
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff880031968d8, fffff88003196130, fffff880014eafe0}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+1a0 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff880031968d8
    Arg3: fffff88003196130
    Arg4: fffff880014eafe0
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff880031968d8 -- (.exr 0xfffff880031968d8)
    ExceptionAddress: fffff880014eafe0 (Ntfs!NtfsCommonClose+0x00000000000001a0)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88003196130 -- (.cxr 0xfffff88003196130)
    rax=00fff8a0028de690 rbx=fffffa80038fd6d0 rcx=fffffa80038fd718
    rdx=fffff8a0028de4a0 rsi=fffff8a0028de370 rdi=fffff88003196c38
    rip=fffff880014eafe0 rsp=fffff88003196b10 rbp=fffff80002e76600
     r8=0000000000000000  r9=0000000000000009 r10=0000000000000004
    r11=fffffa8004391e10 r12=fffffa80028f7180 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000001
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    Ntfs!NtfsCommonClose+0x1a0:
    fffff880`014eafe0 f6400804        test    byte ptr [rax+8],4 ds:002b:00fff8a0`028de698=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0a0e8
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsCommonClose+1a0
    fffff880`014eafe0 f6400804        test    byte ptr [rax+8],4
    
    FAULTING_IP: 
    Ntfs!NtfsCommonClose+1a0
    fffff880`014eafe0 f6400804        test    byte ptr [rax+8],4
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from fffff880014da357 to fffff880014eafe0
    
    STACK_TEXT:  
    fffff880`03196b10 fffff880`014da357 : fffffa80`038fd6d0 fffff8a0`028de4a0 fffff8a0`028de370 fffffa80`028f7180 : Ntfs!NtfsCommonClose+0x1a0
    fffff880`03196be0 fffff800`02ce3a21 : 00000000`00000000 fffff800`02fcff00 fffffa80`01906601 0000059a`00000002 : Ntfs!NtfsFspClose+0x15f
    fffff880`03196cb0 fffff800`02f76cce : 0000059a`00000000 fffffa80`01906680 00000000`00000080 fffffa80`018e5450 : nt!ExpWorkerThread+0x111
    fffff880`03196d40 fffff800`02ccafe6 : fffff880`009e8180 fffffa80`01906680 fffff880`009f2f40 0000059a`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`03196d80 00000000`00000000 : fffff880`03197000 fffff880`03191000 fffff880`031969e0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsCommonClose+1a0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9
    
    STACK_COMMAND:  .cxr 0xfffff88003196130 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonClose+1a0
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonClose+1a0
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042111-25334-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`03045e90
    Debug session time: Thu Apr 21 16:39:52.620 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:33.103
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {31, fffffa8005183700, fffff8800d427000, fffff8a000f27b4d}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+7321 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000031, The subtype of the bugcheck.
    Arg2: fffffa8005183700
    Arg3: fffff8800d427000
    Arg4: fffff8a000f27b4d
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_31
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  runonce.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800030dbd95 to fffff80002e80640
    
    STACK_TEXT:  
    fffff880`05633888 fffff800`030dbd95 : 00000000`0000001a 00000000`00000031 fffffa80`05183700 fffff880`0d427000 : nt!KeBugCheckEx
    fffff880`05633890 fffff800`031581b7 : fffffa80`00000000 fffffa80`062fc780 00000000`00000134 fffff8a0`00f17000 : nt! ?? ::NNGAKEGL::`string'+0x7321
    fffff880`056338f0 fffff800`02eb015b : ffffffff`ffffffff fffff880`05633a78 00000000`00008000 fffffa80`06609c00 : nt!MiRelocateImagePfn+0xf7
    fffff880`05633950 fffff800`02ea813f : fffffa80`064232d0 fffff880`05633a80 fffffa80`05e97ec8 fffff880`05633a88 : nt!MiWaitForInPageComplete+0x7ef
    fffff880`05633a30 fffff800`02e8ea8a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff880`00000000 : nt!MiIssueHardFault+0x28b
    fffff880`05633ac0 fffff800`02e7e76e : 00000000`00000008 00000000`76190add 00000000`7efdb001 00000000`00488208 : nt!MmAccessFault+0x146a
    fffff880`05633c20 00000000`76190add : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`000ceebc 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76190add
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::NNGAKEGL::`string'+7321
    fffff800`030dbd95 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+7321
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+7321
    
    BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+7321
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`053b4000 fffff880`053f2000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
    fffff880`03c64000 fffff880`03ca9000   a85e3pcf a85e3pcf.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
    fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`03ec1000 fffff880`03f4a000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`03ca9000 fffff880`03cbf000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`011f4000 fffff880`011f5e80   AiCharger AiCharger.sys Wed May 05 04:37:36 2010 (4BE12E50)
    fffff880`0106e000 fffff880`01079000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`02eeb000 fffff880`02ef3000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
    fffff880`03dcc000 fffff880`03dd2000   AsIO     AsIO.sys     Thu Apr 22 07:18:03 2010 (4BD0306B)
    fffff880`03dc6000 fffff880`03dcc000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
    fffff880`0633b000 fffff880`06344000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
    fffff880`06301000 fffff880`0633b000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
    fffff880`03f4a000 fffff880`03f54000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
    fffff880`03d7d000 fffff880`03dc6000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
    fffff880`01400000 fffff880`01410000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
    fffff880`011f6000 fffff880`011ff000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d96000 fffff880`00dc0000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`054f4000 fffff880`05514000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`04a55000 fffff880`05351000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`03c16000 fffff880`03c64000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff880`018af000 fffff880`018b6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03d6c000 fffff880`03d7d000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`07130000 fffff880`0714e000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
    fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`0187c000 fffff880`018a6000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cd6000 fffff880`00d96000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01816000 fffff880`01846000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c78000 fffff880`00cd6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01200000 fffff880`01272000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`04a2d000 fffff880`04a3d000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`07024000 fffff880`0702d000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`063cd000 fffff880`063db000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03ccb000 fffff880`03d4e000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`03d4e000 fffff880`03d6c000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`03e97000 fffff880`03ea6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01800000 fffff880`01816000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05551000 fffff880`05573000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`063e7000 fffff880`063f0000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`063db000 fffff880`063e7000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05573000 fffff880`05586000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06285000 fffff880`06291000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`02ef9000 fffff880`02fed000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`02e00000 fffff880`02e46000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`02ede000 fffff880`02eeb000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`0131d000 fffff880`01331000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`054d4000 fffff880`054df000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`012d1000 fffff880`0131d000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`015e5000 fffff880`015ef000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01bc0000 fffff880`01bfa000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`01abd000 fffff880`01b07000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff800`033ea000 fffff800`03433000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`02e46000 fffff880`02e6a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`0629f000 fffff880`062b8000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`062b8000 fffff880`062c0080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`06291000 fffff880`0629f000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`07067000 fffff880`07130000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`01bb7000 fffff880`01bc0000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`04a00000 fffff880`04a1e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03c00000 fffff880`03c16000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`04a1e000 fffff880`04a2d000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
    fffff880`0138f000 fffff880`013d2000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`015b9000 fffff880`015d4000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`017d4000 fffff880`017ff000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`02ff9000 fffff880`02ffe200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`055a1000 fffff880`055b6000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`062de000 fffff880`06301000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c15000 fffff880`00c64000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
    fffff880`062c3000 fffff880`062d1000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`00dda000 fffff880`00de9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`062d1000 fffff880`062de000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e6c000 fffff880`00e86000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`0714e000 fffff880`07166000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`07166000 fffff880`07193000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
    fffff880`07193000 fffff880`071e0000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`07000000 fffff880`07024000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`0165e000 fffff880`01669000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01331000 fffff880`0138f000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`03e8c000 fffff880`03e97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01ba5000 fffff880`01bb7000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01681000 fffff880`01774000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`04a45000 fffff880`04a51000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`01294000 fffff880`012c3000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`054df000 fffff880`054f4000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`03fc8000 fffff880`03fd7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03f54000 fffff880`03f99000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01774000 fffff880`017d4000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`01669000 fffff880`0167a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03e80000 fffff880`03e8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e00000 fffff800`033ea000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01416000 fffff880`015b9000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`018a6000 fffff880`018af000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03fa2000 fffff880`03fc8000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`011d8000 fffff880`011ed000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f5d000 fffff880`00f90000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`011ed000 fffff880`011f4000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e5c000 fffff880`00e6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015d4000 fffff880`015e5000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05514000 fffff880`05551000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c64000 fffff880`00c78000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`013d2000 fffff880`013f6000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`03ea6000 fffff880`03ec1000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`00e86000 fffff880`00ea7000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`00dc0000 fffff880`00dda000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03e2f000 fffff880`03e80000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`053f2000 fffff880`053fd000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01643000 fffff880`0164c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0164c000 fffff880`01655000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01655000 fffff880`0165e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01b6b000 fffff880`01ba5000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`055b6000 fffff880`055ce000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06000000 fffff880`06284b80   RTKVHD64 RTKVHD64.sys Tue Nov 30 04:03:19 2010 (4CF4BDD7)
    fffff880`011a9000 fffff880`011d8000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
    fffff880`02fed000 fffff880`02ff9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`03fd7000 fffff880`03ff4000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`04a3d000 fffff880`04a45000   serscan  serscan.sys  Mon Jul 13 20:35:32 2009 (4A5BD2D4)
    fffff880`01b63000 fffff880`01b6b000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0107a000 fffff880`011a0000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
    fffff880`02ef3000 fffff880`02ef4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`018b9000 fffff880`01abd000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`015ef000 fffff880`015fc000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`01272000 fffff880`01294000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`03e1b000 fffff880`03e2f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03dd2000 fffff880`03df8000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`06378000 fffff880`063cd000   udfs     udfs.sys     Sat Nov 20 04:26:11 2010 (4CE79433)
    fffff880`00de9000 fffff880`00dfb000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`05586000 fffff880`055a0c80   usbaudio usbaudio.sys Sat Nov 20 05:43:52 2010 (4CE7A668)
    fffff880`062c1000 fffff880`062c2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`02ecd000 fffff880`02ede000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`0547a000 fffff880`054d4000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`02e77000 fffff880`02ecd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`02e6a000 fffff880`02e77000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01600000 fffff880`0160e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0160e000 fffff880`01633000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fa5000 fffff880`00fe1000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`01b07000 fffff880`01b17000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`00f90000 fffff880`00fa5000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01b17000 fffff880`01b63000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`03e00000 fffff880`03e1b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`01633000 fffff880`01643000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eaa000 fffff880`00f4e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f4e000 fffff880`00f5d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03f99000 fffff880`03fa2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
    fffff880`00fe1000 fffff880`00ff5000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`011a0000 fffff880`011a9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`06344000 fffff880`06365000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    fffff880`06365000 fffff880`06377100   xusb21   xusb21.sys   Thu Aug 13 18:10:17 2009 (4A848F49)
    fffff880`05351000 fffff880`053b4000   yk62x64  yk62x64.sys  Mon Feb 23 10:02:27 2009 (49A2BA83)
    
    Unloaded modules:
    fffff880`01846000 fffff880`01854000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01854000 fffff880`01860000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01860000 fffff880`01869000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01869000 fffff880`0187c000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    i kinda would like to do those steps, but i can't since my bluscreens are during the logo of the load of the system
    PS: my RAMs had those frequencies because my computer set the saving energy mode from asus AI suite
     
  4. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    oh, i forgot, here it is the HTML from RAMmon which i got from my other system (XP)
     

    Attached Files:

  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Thanks for the attachment,

    1. RAM is currently at 1200 mhz 9-9-9-24, set it 1333mhz 9-9-9-24 1.5v.


    2. The 4 Corsair sticks are not quite matching:

    # of Row Addressing Bits 13 14 13 14
    # of Ranks 2 1 2 1
    Row Active Delay, tRRD (ns) 6.000 7.500 6.000 7.500
    Minimum Auto-Refresh to Active/Auto-Refresh Time, tRC (ns) 49.500 50.625 49.500 50.625
    Minimum Auto-Refresh to Active/Auto-Refresh Command Period, tRFC (ns) 90.000 110.000 90.000 110.000
    Minimum Four Activate Window Delay, tFAW (ns) 30.000 37.500 30.000 37.500
    Partial Array Self Refresh Supported No Yes No Yes
    Module Height (mm) 30 46 30 46
    Reference Raw Card Used Raw Card B Rev. 0 Raw Card A Rev. 0 Raw Card B Rev. 0 Raw Card A Rev. 0


    3. If blue screens persist after adjusting the memory settings to its rated values, remove either pair of sticks from slots 1 and 3 or from slots 2 and 4. Then load bios defaults and enjoy.
     
  6. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    i'm going to remove one pair of them, probably 1 and 3 just to check out, the bios was already on its defaults, but just to make sure, i reset it again.
    But anyway, how can they be not the same? they have the same reference and appearance, i bought 2 months ago ones on 3 and 4 without BSODs till now. this is so strange and confusing, these RAMs are combatible with my computer, but they can't be at the same time? :p
     
  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    This is where your sticks are different
    :


    Frequency and timings can be the same, but other vital operational parameters are not. This is why it is recommended to install identical sticks from the same RAM kit.

    You may want to uninstall AI suite and follow my 1st post, but I'm afraid it won't help you:


    So if blue screens persist, don't hesitate to remove either pair of sticks from slots 1 and 3 or from slots 2 and 4.
     
  8. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    ok then, here's what i've done:
    i removed the new ones from 2 & 4, and i got 2 bluescreens
    the i decided to remove 1 & 3 and add the new ones on the same place, without sucess, i also got more 2 bluscreens.
    without knowing what to do more I also removed all USB interfaces and also my ethernet connection, same result.
    i think i'm in a dead end.
     
  9. kaos

    kaos Senior Member

    Joined:
    May 9, 2011
    Messages:
    1,747
    Likes Received:
    33
    in had a similar issue ages ago

    did u reset your bios after to took out the ram

    if u feel they may hve been a change from the bsod then IF YOU WANT upload the new crash dump and ill we can see if anythin has changed..
     
  10. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    Kaos is absolutely right, that's why I said to load bios defaults after removing one pair of sticks:

    Attach the latest crash dumps + RAMMON HTML + cpu-z MEMORY tab.
     
  11. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    I did reset the bios, before and after.
    here's the stuff:

    View attachment RAMMon - SPD Info.rar

    I have no new minidumps. I checked them, and all are the same as the ones I sent above, curiously none of them are from this month, it's probalby not generating them or saving somewhere else. could be this a driver or something?
     
    #11 Apman, May 15, 2011
    Last edited: May 15, 2011
  12. kaos

    kaos Senior Member

    Joined:
    May 9, 2011
    Messages:
    1,747
    Likes Received:
    33
    just to check if they are still loggin

    go to start

    right clicking my computer

    properties

    advanced system properties

    advanced tab

    click settings under start up and recover ( its the bottom option

    should layout as follows


    KERNEL MEMORY DUMP

    (yours might say none, small memory dump ,complete dump.)
    .... to make life easier, the kernel dump is to be selected


    dump file
    can be

    %SystemRoot%\MEMORY.DMP
     
  13. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    It depends on the stop errors you get. The 2 sticks you have now are matching and set right. It could be bad motherboard slot, in theory.

    If no crash dumps but still getting blue screens, attach your loaded drivers list:

    DriverView: Loaded Windows Drivers List

    ~~~~~~~~~~

    Test the hardware too:

    www.memtest.org

    http://hddscan.com/
     
  14. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    I can't load windows 7.

    i have found the MEMORY.DMP which is rather.. big, even compressed.

    i tried to solve the problem with the recovery disc of win7, and i found something
    It can't recover because there is a bad controller.
    i also asked for a report of the problems on the system, and it says a "patch" isn't letting him boot.

    i tried to fix it by all cost, but it says it failed all the time, and since i can't load the system, probalby format is the best option?
     
  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Do SMART scan if you can boot windows HDDScan.

    If you can't boot, test from bootable media from your HDD manufacturer HD Diagnostic

    It can be bad motherboard or bad hard disk.

    Reinstalling os won't fix you if there's faulty hardware.
     
  16. Apman

    Apman New Member

    Joined:
    Dec 13, 2010
    Messages:
    20
    Likes Received:
    0
    It all seems ok on the disks. Is there a way to remove this "bad driver" without booting the windows?
     

Share This Page

Loading...