Windows 7 BSOD While loading Windows

Apman

New Member
View attachment Ambiente de trabalho.rar

While loading windows 7 64 bits ultimate i have several, if not many, crashes. Although loading my other system (XP SP3 32bit) don't have any crash by loading it (sometimes).
i'm kinda tired of this problem, it annoys me and keeps me wasting time.

Sincerely

Arpman.
 
RAM looks to be the causer of your blue screens:
MEMORY_MANAGEMENT (1a)
NTFS_FILE_SYSTEM (24) ( Ntfs!NtfsCommonClose+1a0 )
NTFS_FILE_SYSTEM (24) ( Ntfs!NtfsReadMftRecord+b2 )
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) (nt!CmpKcbCacheLookup)
(Access violation)


1. RAM is currently at 1200 mhz 9-9-9-24, set it 1333mhz 9-9-9-24 1.5v.
2. Attach Passmark RAMMon HTML.zip
3. Command Prompt > chkdsk /f
4. Uninstall Daemon Tools
DuplexSecure - FAQ

5. Uninstall Avast

avast! Uninstall Utility

Link Removed due to 404 Error

6. Update drivers:

Marvell Yukon networking
yk62x64.sys Mon Feb 23 10:02:27 2009
Marvell: Support
ASUSTeK Computer Inc. -Support- Drivers and Download

XBox USB wireless controller
xusb21.sys Thu Aug 13 18:10:17 2009
Link Removed due to 404 Error




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040911-24024-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030ace90
Debug session time: Sat Apr  9 16:25:00.997 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:13.339
Loading Kernel Symbols
...............................................................
......................................................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff800031b43de, fffff880035c7098, fffff880035c68f0}

Probably caused by : NETIO.SYS ( NETIO!NsipOpenKey+56 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800031b43de, The address that the exception occurred at
Arg3: fffff880035c7098, Exception Record Address
Arg4: fffff880035c68f0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpKcbCacheLookup+1de
fffff800`031b43de 418b45f4        mov     eax,dword ptr [r13-0Ch]

EXCEPTION_RECORD:  fffff880035c7098 -- (.exr 0xfffff880035c7098)
ExceptionAddress: fffff800031b43de (nt!CmpKcbCacheLookup+0x00000000000001de)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880035c68f0 -- (.cxr 0xfffff880035c68f0)
rax=0000000000000009 rbx=0000000000000000 rcx=00000000000001ec
rdx=0000000001cb3401 rsi=fffff880035c74e0 rdi=00000000e5c014d4
rip=fffff800031b43de rsp=fffff880035c72d0 rbp=fffff8a0000231f0
 r8=0000000000000008  r9=0000000000000000 r10=0000000000000009
r11=fffff880035c7480 r12=fffff8a0046f0b98 r13=0200000000000000
r14=0000000000000004 r15=0000000000000004
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!CmpKcbCacheLookup+0x1de:
fffff800`031b43de 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:002b:01ffffff`fffffff4=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031180e8
 ffffffffffffffff 

FOLLOWUP_IP: 
NETIO!NsipOpenKey+56
fffff880`016128e6 488b5c2470      mov     rbx,qword ptr [rsp+70h]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff800031b50e5 to fffff800031b43de

STACK_TEXT:  
fffff880`035c72d0 fffff800`031b50e5 : fffff880`035c7480 fffff880`00000005 fffff880`035c7868 fffff880`035c7860 : nt!CmpKcbCacheLookup+0x1de
fffff880`035c73c0 fffff800`031b1794 : fffff8a0`0000efa0 fffff880`035c7860 fffff880`035c78b0 fffff880`035c7890 : nt!CmpBuildHashStackAndLookupCache+0x335
fffff880`035c77a0 fffff800`031e1d38 : fffffa80`04f56a98 fffff800`02e67000 fffffa80`04f568e0 fffff800`00000001 : nt!CmpParseKey+0x294
fffff880`035c7aa0 fffff800`031e2f56 : 00000000`00000000 fffffa80`04f568e0 00000000`00000000 fffffa80`03a34a50 : nt!ObpLookupObjectName+0x588
fffff880`035c7b90 fffff800`031b682c : 00000000`00000002 00000000`00000000 00000000`65726300 00000000`00000052 : nt!ObOpenObjectByName+0x306
fffff880`035c7c60 fffff800`031c1922 : fffff880`035c8320 fffff880`00020019 fffff880`035c7fc0 fffffa80`00000000 : nt!CmOpenKey+0x28a
fffff880`035c7db0 fffff800`02ee68d3 : 00000000`00000000 00000000`040d1860 00000000`00000000 fffff800`0306bec0 : nt!NtOpenKey+0x12
fffff880`035c7df0 fffff800`02ee2e70 : fffff880`016128e6 ffff0800`00009b1a 00000000`000011d4 fffff6fb`00000091 : nt!KiSystemServiceCopyEnd+0x13
fffff880`035c7f88 fffff880`016128e6 : ffff0800`00009b1a 00000000`000011d4 fffff6fb`00000091 fffff880`00000023 : nt!KiServiceLinkage
fffff880`035c7f90 fffff880`0161284b : fffff880`035c8448 00000000`00020019 fffff880`01612610 fffff8a0`04710660 : NETIO!NsipOpenKey+0x56
fffff880`035c8000 fffff880`016141c8 : 00000000`0001010e fffff880`035c8548 00000000`00000000 fffff880`035c8468 : NETIO!NsipOpenInformationObjectKey+0xab
fffff880`035c8290 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NsipReadPersistentData+0x68


SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  NETIO!NsipOpenKey+56

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

STACK_COMMAND:  .cxr 0xfffff880035c68f0 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_NETIO!NsipOpenKey+56

BUCKET_ID:  X64_0x7E_NETIO!NsipOpenKey+56

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\030211-24835-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02ea2e90
Debug session time: Wed Mar  2 13:38:33.491 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:59.880
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880024472a8, fffff88002446b00, fffff80002fd9b87}

Probably caused by : Ntfs.sys ( Ntfs!NtfsReadMftRecord+b2 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880024472a8
Arg3: fffff88002446b00
Arg4: fffff80002fd9b87

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880024472a8 -- (.exr 0xfffff880024472a8)
ExceptionAddress: fffff80002fd9b87 (nt!CcMapData+0x0000000000000117)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88002446b00 -- (.cxr 0xfffff88002446b00)
rax=fffffa80018a9150 rbx=000000000000000e rcx=0000000000000000
rdx=33fff98003677000 rsi=fffff880024476a8 rdi=fffffa8003775060
rip=fffff80002fd9b87 rsp=fffff880024474e0 rbp=0000000000000090
 r8=000000000000000f  r9=0000000000277000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000001 r13=fffffa8002922f20
r14=fffff880024475e8 r15=0000000000000001
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
nt!CcMapData+0x117:
fffff800`02fd9b87 0fb602          movzx   eax,byte ptr [rdx] ds:002b:33fff980`03677000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  lsass.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e8
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsReadMftRecord+b2
fffff880`014b61e2 84c0            test    al,al

FAULTING_IP: 
nt!CcMapData+117
fffff800`02fd9b87 0fb602          movzx   eax,byte ptr [rdx]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880014b61e2 to fffff80002fd9b87

STACK_TEXT:  
fffff880`024474e0 fffff880`014b61e2 : 00000000`00009000 fffffa80`018a9150 00000000`00000000 00000000`0000000e : nt!CcMapData+0x117
fffff880`024475a0 fffff880`014b1d5c : fffffa80`04961660 fffffa80`02e4c180 fffff8a0`00239468 fffff880`01222d01 : Ntfs!NtfsReadMftRecord+0xb2
fffff880`02447650 fffff880`014b6ae0 : fffff880`01226a00 fffff8a0`00239640 fffff8a0`00239590 fffffa80`02ceb0c0 : Ntfs!NtfsLookupInFileRecord+0x6c
fffff880`024476e0 fffff880`014a016d : fffffa80`02f28c10 fffffa80`02ceb010 00000000`00000000 00000000`00000000 : Ntfs!FindFirstIndexEntry+0x50
fffff880`02447770 fffff880`0149e9ce : fffffa80`04961660 fffff8a0`03d91930 fffff8a0`00239590 fffffa80`04961660 : Ntfs!NtfsRestartIndexEnumeration+0xed
fffff880`02447990 fffff880`0149fff1 : fffff880`02447ea0 00000000`00000008 fffffa80`028da530 fffffa80`02f28810 : Ntfs!NtfsQueryDirectory+0x94e
fffff880`02447d30 fffff880`014a28ef : fffffa80`04961660 00000000`00000000 fffff880`02447e20 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1
fffff880`02447d70 fffff880`01215bcf : fffffa80`02f28bb0 fffffa80`02f28810 fffffa80`04961660 fffff880`02447d98 : Ntfs!NtfsFsdDirectoryControl+0x10f
fffff880`02447de0 fffff880`01218aea : 00000000`00000000 00000000`00000000 fffffa80`03a2a400 fffffa80`02ceb010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`02447e70 fffff880`01236978 : fffffa80`0297fbc0 00000000`00000022 fffffa80`029213d0 fffffa80`02ceb0c0 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`02447f10 fffff880`05baad71 : 00000000`00000000 00000000`00000020 fffff880`02447fd0 fffff880`02448060 : fltmgr!FltQueryDirectoryFile+0x98
fffff880`02447f50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : luafv!LuafvNormalizeNameComponentEx+0x145


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsReadMftRecord+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

STACK_COMMAND:  .cxr 0xfffff88002446b00 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsReadMftRecord+b2

BUCKET_ID:  X64_0x24_Ntfs!NtfsReadMftRecord+b2

Followup: MachineOwner
---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\030211-24882-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e9ee90
Debug session time: Wed Mar  2 13:40:08.112 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:47.517
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880031968d8, fffff88003196130, fffff880014eafe0}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+1a0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880031968d8
Arg3: fffff88003196130
Arg4: fffff880014eafe0

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880031968d8 -- (.exr 0xfffff880031968d8)
ExceptionAddress: fffff880014eafe0 (Ntfs!NtfsCommonClose+0x00000000000001a0)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88003196130 -- (.cxr 0xfffff88003196130)
rax=00fff8a0028de690 rbx=fffffa80038fd6d0 rcx=fffffa80038fd718
rdx=fffff8a0028de4a0 rsi=fffff8a0028de370 rdi=fffff88003196c38
rip=fffff880014eafe0 rsp=fffff88003196b10 rbp=fffff80002e76600
 r8=0000000000000000  r9=0000000000000009 r10=0000000000000004
r11=fffffa8004391e10 r12=fffffa80028f7180 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
Ntfs!NtfsCommonClose+0x1a0:
fffff880`014eafe0 f6400804        test    byte ptr [rax+8],4 ds:002b:00fff8a0`028de698=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0a0e8
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsCommonClose+1a0
fffff880`014eafe0 f6400804        test    byte ptr [rax+8],4

FAULTING_IP: 
Ntfs!NtfsCommonClose+1a0
fffff880`014eafe0 f6400804        test    byte ptr [rax+8],4

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880014da357 to fffff880014eafe0

STACK_TEXT:  
fffff880`03196b10 fffff880`014da357 : fffffa80`038fd6d0 fffff8a0`028de4a0 fffff8a0`028de370 fffffa80`028f7180 : Ntfs!NtfsCommonClose+0x1a0
fffff880`03196be0 fffff800`02ce3a21 : 00000000`00000000 fffff800`02fcff00 fffffa80`01906601 0000059a`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`03196cb0 fffff800`02f76cce : 0000059a`00000000 fffffa80`01906680 00000000`00000080 fffffa80`018e5450 : nt!ExpWorkerThread+0x111
fffff880`03196d40 fffff800`02ccafe6 : fffff880`009e8180 fffffa80`01906680 fffff880`009f2f40 0000059a`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03196d80 00000000`00000000 : fffff880`03197000 fffff880`03191000 fffff880`031969e0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsCommonClose+1a0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

STACK_COMMAND:  .cxr 0xfffff88003196130 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonClose+1a0

BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonClose+1a0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042111-25334-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`03045e90
Debug session time: Thu Apr 21 16:39:52.620 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:33.103
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {31, fffffa8005183700, fffff8800d427000, fffff8a000f27b4d}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+7321 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: fffffa8005183700
Arg3: fffff8800d427000
Arg4: fffff8a000f27b4d

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_31

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  runonce.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800030dbd95 to fffff80002e80640

STACK_TEXT:  
fffff880`05633888 fffff800`030dbd95 : 00000000`0000001a 00000000`00000031 fffffa80`05183700 fffff880`0d427000 : nt!KeBugCheckEx
fffff880`05633890 fffff800`031581b7 : fffffa80`00000000 fffffa80`062fc780 00000000`00000134 fffff8a0`00f17000 : nt! ?? ::NNGAKEGL::`string'+0x7321
fffff880`056338f0 fffff800`02eb015b : ffffffff`ffffffff fffff880`05633a78 00000000`00008000 fffffa80`06609c00 : nt!MiRelocateImagePfn+0xf7
fffff880`05633950 fffff800`02ea813f : fffffa80`064232d0 fffff880`05633a80 fffffa80`05e97ec8 fffff880`05633a88 : nt!MiWaitForInPageComplete+0x7ef
fffff880`05633a30 fffff800`02e8ea8a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff880`00000000 : nt!MiIssueHardFault+0x28b
fffff880`05633ac0 fffff800`02e7e76e : 00000000`00000008 00000000`76190add 00000000`7efdb001 00000000`00488208 : nt!MmAccessFault+0x146a
fffff880`05633c20 00000000`76190add : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`000ceebc 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76190add


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::NNGAKEGL::`string'+7321
fffff800`030dbd95 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+7321

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+7321

BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+7321

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`053b4000 fffff880`053f2000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`03c64000 fffff880`03ca9000   a85e3pcf a85e3pcf.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`03ec1000 fffff880`03f4a000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`03ca9000 fffff880`03cbf000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`011f4000 fffff880`011f5e80   AiCharger AiCharger.sys Wed May 05 04:37:36 2010 (4BE12E50)
fffff880`0106e000 fffff880`01079000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`02eeb000 fffff880`02ef3000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`03dcc000 fffff880`03dd2000   AsIO     AsIO.sys     Thu Apr 22 07:18:03 2010 (4BD0306B)
fffff880`03dc6000 fffff880`03dcc000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`0633b000 fffff880`06344000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
fffff880`06301000 fffff880`0633b000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
fffff880`03f4a000 fffff880`03f54000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
fffff880`03d7d000 fffff880`03dc6000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
fffff880`01400000 fffff880`01410000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
fffff880`011f6000 fffff880`011ff000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d96000 fffff880`00dc0000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`054f4000 fffff880`05514000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`04a55000 fffff880`05351000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`03c16000 fffff880`03c64000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`018af000 fffff880`018b6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d6c000 fffff880`03d7d000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07130000 fffff880`0714e000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`0187c000 fffff880`018a6000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cd6000 fffff880`00d96000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01816000 fffff880`01846000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c78000 fffff880`00cd6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01200000 fffff880`01272000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`04a2d000 fffff880`04a3d000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`07024000 fffff880`0702d000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`063cd000 fffff880`063db000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ccb000 fffff880`03d4e000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`03d4e000 fffff880`03d6c000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`03e97000 fffff880`03ea6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01800000 fffff880`01816000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05551000 fffff880`05573000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`063e7000 fffff880`063f0000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`063db000 fffff880`063e7000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05573000 fffff880`05586000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06285000 fffff880`06291000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`02ef9000 fffff880`02fed000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`02e00000 fffff880`02e46000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`02ede000 fffff880`02eeb000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`0131d000 fffff880`01331000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`054d4000 fffff880`054df000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`012d1000 fffff880`0131d000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`015e5000 fffff880`015ef000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01bc0000 fffff880`01bfa000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01abd000 fffff880`01b07000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`033ea000 fffff800`03433000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`02e46000 fffff880`02e6a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`0629f000 fffff880`062b8000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`062b8000 fffff880`062c0080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06291000 fffff880`0629f000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`07067000 fffff880`07130000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01bb7000 fffff880`01bc0000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04a00000 fffff880`04a1e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03c00000 fffff880`03c16000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04a1e000 fffff880`04a2d000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`0138f000 fffff880`013d2000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`015b9000 fffff880`015d4000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`017d4000 fffff880`017ff000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`02ff9000 fffff880`02ffe200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`055a1000 fffff880`055b6000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`062de000 fffff880`06301000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c15000 fffff880`00c64000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`062c3000 fffff880`062d1000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`00dda000 fffff880`00de9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`062d1000 fffff880`062de000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e6c000 fffff880`00e86000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`0714e000 fffff880`07166000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07166000 fffff880`07193000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`07193000 fffff880`071e0000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`07000000 fffff880`07024000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0165e000 fffff880`01669000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01331000 fffff880`0138f000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`03e8c000 fffff880`03e97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01ba5000 fffff880`01bb7000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01681000 fffff880`01774000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`04a45000 fffff880`04a51000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`01294000 fffff880`012c3000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`054df000 fffff880`054f4000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03fc8000 fffff880`03fd7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03f54000 fffff880`03f99000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01774000 fffff880`017d4000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`01669000 fffff880`0167a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e80000 fffff880`03e8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e00000 fffff800`033ea000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01416000 fffff880`015b9000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`018a6000 fffff880`018af000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03fa2000 fffff880`03fc8000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`011d8000 fffff880`011ed000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f5d000 fffff880`00f90000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`011ed000 fffff880`011f4000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e5c000 fffff880`00e6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015d4000 fffff880`015e5000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05514000 fffff880`05551000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c64000 fffff880`00c78000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`013d2000 fffff880`013f6000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`03ea6000 fffff880`03ec1000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`00e86000 fffff880`00ea7000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`00dc0000 fffff880`00dda000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e2f000 fffff880`03e80000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`053f2000 fffff880`053fd000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01643000 fffff880`0164c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0164c000 fffff880`01655000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01655000 fffff880`0165e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01b6b000 fffff880`01ba5000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`055b6000 fffff880`055ce000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06000000 fffff880`06284b80   RTKVHD64 RTKVHD64.sys Tue Nov 30 04:03:19 2010 (4CF4BDD7)
fffff880`011a9000 fffff880`011d8000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`02fed000 fffff880`02ff9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03fd7000 fffff880`03ff4000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`04a3d000 fffff880`04a45000   serscan  serscan.sys  Mon Jul 13 20:35:32 2009 (4A5BD2D4)
fffff880`01b63000 fffff880`01b6b000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0107a000 fffff880`011a0000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`02ef3000 fffff880`02ef4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`018b9000 fffff880`01abd000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`015ef000 fffff880`015fc000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01272000 fffff880`01294000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`03e1b000 fffff880`03e2f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03dd2000 fffff880`03df8000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`06378000 fffff880`063cd000   udfs     udfs.sys     Sat Nov 20 04:26:11 2010 (4CE79433)
fffff880`00de9000 fffff880`00dfb000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`05586000 fffff880`055a0c80   usbaudio usbaudio.sys Sat Nov 20 05:43:52 2010 (4CE7A668)
fffff880`062c1000 fffff880`062c2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02ecd000 fffff880`02ede000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0547a000 fffff880`054d4000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`02e77000 fffff880`02ecd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`02e6a000 fffff880`02e77000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01600000 fffff880`0160e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0160e000 fffff880`01633000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fa5000 fffff880`00fe1000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01b07000 fffff880`01b17000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00f90000 fffff880`00fa5000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01b17000 fffff880`01b63000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`03e00000 fffff880`03e1b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01633000 fffff880`01643000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eaa000 fffff880`00f4e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f4e000 fffff880`00f5d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f99000 fffff880`03fa2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00fe1000 fffff880`00ff5000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`011a0000 fffff880`011a9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06344000 fffff880`06365000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`06365000 fffff880`06377100   xusb21   xusb21.sys   Thu Aug 13 18:10:17 2009 (4A848F49)
fffff880`05351000 fffff880`053b4000   yk62x64  yk62x64.sys  Mon Feb 23 10:02:27 2009 (49A2BA83)

Unloaded modules:
fffff880`01846000 fffff880`01854000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01854000 fffff880`01860000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01860000 fffff880`01869000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01869000 fffff880`0187c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
i kinda would like to do those steps, but i can't since my bluscreens are during the logo of the load of the system
PS: my RAMs had those frequencies because my computer set the saving energy mode from asus AI suite
 
oh, i forgot, here it is the HTML from RAMmon which i got from my other system (XP)
 

Attachments

  • RAMMon - SPD Info.rar
    2.5 KB · Views: 279
Thanks for the attachment,

1. RAM is currently at 1200 mhz 9-9-9-24, set it 1333mhz 9-9-9-24 1.5v.


2. The 4 Corsair sticks are not quite matching:

# of Row Addressing Bits 13 14 13 14
# of Ranks 2 1 2 1
Row Active Delay, tRRD (ns) 6.000 7.500 6.000 7.500
Minimum Auto-Refresh to Active/Auto-Refresh Time, tRC (ns) 49.500 50.625 49.500 50.625
Minimum Auto-Refresh to Active/Auto-Refresh Command Period, tRFC (ns) 90.000 110.000 90.000 110.000
Minimum Four Activate Window Delay, tFAW (ns) 30.000 37.500 30.000 37.500
Partial Array Self Refresh Supported No Yes No Yes
Module Height (mm) 30 46 30 46
Reference Raw Card Used Raw Card B Rev. 0 Raw Card A Rev. 0 Raw Card B Rev. 0 Raw Card A Rev. 0


3. If blue screens persist after adjusting the memory settings to its rated values, remove either pair of sticks from slots 1 and 3 or from slots 2 and 4. Then load bios defaults and enjoy.
 
i'm going to remove one pair of them, probably 1 and 3 just to check out, the bios was already on its defaults, but just to make sure, i reset it again.
But anyway, how can they be not the same? they have the same reference and appearance, i bought 2 months ago ones on 3 and 4 without BSODs till now. this is so strange and confusing, these RAMs are combatible with my computer, but they can't be at the same time? :p
 
But anyway, how can they be not the same?


This is where your sticks are different
:


# of Row Addressing Bits 13 14 13 14
# of Ranks 2 1 2 1
Row Active Delay, tRRD (ns) 6.000 7.500 6.000 7.500
Minimum Auto-Refresh to Active/Auto-Refresh Time, tRC (ns) 49.500 50.625 49.500 50.625
Minimum Auto-Refresh to Active/Auto-Refresh Command Period, tRFC (ns) 90.000 110.000 90.000 110.000

Minimum Four Activate Window Delay, tFAW (ns) 30.000 37.500 30.000 37.500
Partial Array Self Refresh Supported No Yes No Yes
Module Height (mm) 30 46 30 46

Frequency and timings can be the same, but other vital operational parameters are not. This is why it is recommended to install identical sticks from the same RAM kit.

You may want to uninstall AI suite and follow my 1st post, but I'm afraid it won't help you:

3. Command Prompt > chkdsk /f
4. Uninstall Daemon Tools
DuplexSecure - FAQ

5. Uninstall Avast

avast! Uninstall Utility

Link Removed due to 404 Error

6. Update drivers:

Marvell Yukon networking
yk62x64.sys Mon Feb 23 10:02:27 2009
Marvell: Support
ASUSTeK Computer Inc. -Support- Drivers and Download

XBox USB wireless controller
xusb21.sys Thu Aug 13 18:10:17 2009
Link Removed due to 404 Error


So if blue screens persist, don't hesitate to remove either pair of sticks from slots 1 and 3 or from slots 2 and 4.
 
ok then, here's what i've done:
i removed the new ones from 2 & 4, and i got 2 bluescreens
the i decided to remove 1 & 3 and add the new ones on the same place, without sucess, i also got more 2 bluscreens.
without knowing what to do more I also removed all USB interfaces and also my ethernet connection, same result.
i think i'm in a dead end.
 
in had a similar issue ages ago

did u reset your bios after to took out the ram

if u feel they may hve been a change from the bsod then IF YOU WANT upload the new crash dump and ill we can see if anythin has changed..
 
in had a similar issue ages ago

did u reset your bios after to took out the ram

if u feel they may hve been a change from the bsod then IF YOU WANT upload the new crash dump and ill we can see if anythin has changed..


Kaos is absolutely right, that's why I said to load bios defaults after removing one pair of sticks:

cybercore said:
remove either pair of sticks from slots 1 and 3 or from slots 2 and 4. Then load bios defaults and enjoy.

Attach the latest crash dumps + RAMMON HTML + cpu-z MEMORY tab.
 
I did reset the bios, before and after.
here's the stuff:

View attachment RAMMon - SPD Info.rar

I have no new minidumps. I checked them, and all are the same as the ones I sent above, curiously none of them are from this month, it's probalby not generating them or saving somewhere else. could be this a driver or something?
 
Last edited:
just to check if they are still loggin

go to start

right clicking my computer

properties

advanced system properties

advanced tab

click settings under start up and recover ( its the bottom option

should layout as follows


KERNEL MEMORY DUMP

(yours might say none, small memory dump ,complete dump.)
.... to make life easier, the kernel dump is to be selected


dump file
can be

%SystemRoot%\MEMORY.DMP
 
I did reset the bios, before and after.
here's the stuff:

View attachment 13588

I have no new minidumps. I checked them, and all are the same as the ones I sent above, curiously none of them are from this month, it's probalby not generating them or saving somewhere else. could be this a driver or something?

It depends on the stop errors you get. The 2 sticks you have now are matching and set right. It could be bad motherboard slot, in theory.

If no crash dumps but still getting blue screens, attach your loaded drivers list:

DriverView: Loaded Windows Drivers List

~~~~~~~~~~

Test the hardware too:

www.memtest.org

http://hddscan.com/
 
just to check if they are still loggin

go to start

right clicking my computer

properties

advanced system properties

advanced tab

click settings under start up and recover ( its the bottom option

should layout as follows


KERNEL MEMORY DUMP

(yours might say none, small memory dump ,complete dump.)
.... to make life easier, the kernel dump is to be selected


dump file
can be

%SystemRoot%\MEMORY.DMP

I can't load windows 7.

i have found the MEMORY.DMP which is rather.. big, even compressed.

i tried to solve the problem with the recovery disc of win7, and i found something
It can't recover because there is a bad controller.
i also asked for a report of the problems on the system, and it says a "patch" isn't letting him boot.

i tried to fix it by all cost, but it says it failed all the time, and since i can't load the system, probalby format is the best option?
 
It can't recover because there is a bad controller.

Do SMART scan if you can boot windows HDDScan.

If you can't boot, test from bootable media from your HDD manufacturer Link Removed - Invalid URL

It can be bad motherboard or bad hard disk.

Reinstalling os won't fix you if there's faulty hardware.
 
It all seems ok on the disks. Is there a way to remove this "bad driver" without booting the windows?
 
Back
Top