Random BSOD Win 7 64-bit

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by bullinc, May 3, 2011.

  1. bullinc

    bullinc New Member

    Joined:
    May 3, 2011
    Messages:
    12
    Likes Received:
    0
    Hi everyone!

    Lately (2 month) I always having this BSOD, and al the time random.
    Reinstalled windows 4 times, updated all drivers, updated BIOS, even cleaned dust inside......
    But BSOD still here... still random... still blue ;(

    I hope you can help me!

    > Mainboard : Asus M4A785TD-V EVO
    > Chipset : AMD 785G
    > Processor : AMD Athlon II X4 620 @ 2600MHz
    > Physical Memory : 12288 MB DDR3-SDRAM
    > Video Card : NVIDIA GeForce GTX 460
    > Hard Disk : Western Digital WD10EADS-00M2B0 ATA Device (1000GB)
    > DVD-Rom Drive : HL-DT-ST DVD-RAM GSA-H50N
    > DVD-Rom Drive : XIJWX ZKDABO96J
    > Network Card : Realtek Semiconductor RTL8168/8111 PCIe Gigabit Ethernet Adapter
    > Network Card : Atheros Communications AR5212 802.11a/b/g Wireless Network Adapter
    > Operating System : Windows 7 Professional / Service Pack 1 (64-bit)
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Your crashes are related to hardware, graphic_tdr 116 and memory menagement 1a, probably caused by overclocking:





    1. Attach CPUZ CPU tab snip
    2. Attach RAMMon HTML report
    3. Uninstall Daemon Tools (or perhaps Alcohol 120%)
    DuplexSecure - FAQ

    4. Update Atheros Extensible Wireless LAN device
    athrx.sys Wed Jul 08 20:49:13 2009




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041911-31090-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e59e50
    Debug session time: Tue Apr 19 11:57:09.418 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:18.869
    Loading Kernel Symbols
    ................................................
    Loading User Symbols
    Loading unloaded module list
    .......Missing image name, possible paged-out or corrupt data.
    ..Missing image name, possible paged-out or corrupt data.
    ....Missing image name, possible paged-out or corrupt data.
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 116, {fffffa800a5ee4e0, fffff8800cdaff08, ffffffffc000009a, 4}
    
    Unable to load image Unknown_Module_00000000`000000b0, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Unknown_Module_00000000`000000b0
    *** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`000000b0
    Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
    !vad_reload -1 0xb0
    fffffa80`09b772c0: Unable to get VAD.PrivateMemory
    Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    VIDEO_TDR_FAILURE (116)
    Attempt to reset the display driver and recover from timeout failed.
    Arguments:
    Arg1: fffffa800a5ee4e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
    Arg2: fffff8800cdaff08, The pointer into responsible device driver module (e.g. owner tag).
    Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
    Arg4: 0000000000000004, Optional internal context dependent data.
    
    Debugging Details:
    ------------------
    
    Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
    !vad_reload -1 0xb0
    fffffa80`09b772c0: Unable to get VAD.PrivateMemory
    
    FAULTING_IP: 
    +3537303537613334
    fffff880`0cdaff08 4883ec28        sub     rsp,28h
    
    DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_TDR_FAULT
    
    CUSTOMER_CRASH_COUNT:  1
    
    BUGCHECK_STR:  0x116
    
    PROCESS_NAME:  Óystem
    
    CURRENT_IRQL:  0
    
    STACK_TEXT:  
    fffff880`026ceb88 fffff880`04262000 : 00000000`00000116 fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a : nt!KeBugCheckEx
    fffff880`026ceb90 00000000`00000116 : fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 : 0xfffff880`04262000
    fffff880`026ceb98 fffffa80`0a5ee4e0 : fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 00000000`00000001 : Unknown_Module_00000000_000000b0+0x66
    fffff880`026ceba0 fffff880`0cdaff08 : ffffffff`c000009a 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 : 0xfffffa80`0a5ee4e0
    fffff880`026ceba8 ffffffff`c000009a : 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 : 0xfffff880`0cdaff08
    fffff880`026cebb0 00000000`00000004 : 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 : 0xffffffff`c000009a
    fffff880`026cebb8 00000000`00000001 : fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 : 0x4
    fffff880`026cebc0 fffffa80`0a5ee4e0 : fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 : 0x1
    fffff880`026cebc8 fffff880`04235867 : fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a : 0xfffffa80`0a5ee4e0
    fffff880`026cebd0 fffff880`0cdaff08 : fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 : 0xfffff880`04235867
    fffff880`026cebd8 fffffa80`0a61c000 : 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 : 0xfffff880`0cdaff08
    fffff880`026cebe0 00000000`00000000 : ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 00000000`00000000 : 0xfffffa80`0a61c000
    
    
    STACK_COMMAND:  kb
    
    SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Unknown_Module
    
    IMAGE_NAME:  Unknown_Image
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    FAILURE_BUCKET_ID:  X64_0x116_ANALYSIS_INCONCLUSIVE
    
    BUCKET_ID:  X64_0x116_ANALYSIS_INCONCLUSIVE
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041911-24897-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
    Debug session time: Tue Apr 19 11:51:14.015 2011 (UTC - 4:00)
    System Uptime: 0 days 0:44:29.856
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
    
    FAULTING_IP: 
    +3164366330623263
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
    
    BUGCHECK_STR:  0x1E_0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff88002f1b9f8 -- (.exr 0xfffff88002f1b9f8)
    ExceptionAddress: fffff80002ce43f2 (nt!KiTimerExpiration+0x00000000000000f2)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88002f1baa0 -- (.trap 0xfffff88002f1baa0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=e56d695402170000 rbx=0000000000000000 rcx=fffffa800c28a060
    rdx=0000000000000087 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ce43f2 rsp=fffff88002f1bc30 rbp=0000000000029c87
     r8=fffffa800c402fe0  r9=00000000000000c0 r10=0000000000000087
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    nt!KiTimerExpiration+0xf2:
    fffff800`02ce43f2 48894808        mov     qword ptr [rax+8],rcx ds:e56d6954`02170008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cd046e to fffff80002cd8710
    
    STACK_TEXT:  
    fffff880`02f1aae8 fffff800`02cd046e : fffffa80`0a6aad30 fffffa80`00000001 fffff880`02f1b260 fffff800`02d05668 : nt!KeBugCheck
    fffff880`02f1aaf0 fffff800`02cfe40d : fffff800`02ee6b7c fffff800`02e20ea4 fffff800`02c68000 fffff880`02f1b9f8 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff880`02f1ab20 fffff800`02d05a90 : fffff800`02e27b34 fffff880`02f1ab98 fffff880`02f1b9f8 fffff800`02c68000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`02f1ab50 fffff800`02d129ef : fffff880`02f1b9f8 fffff880`02f1b260 fffff880`00000000 fffff880`009ea180 : nt!RtlDispatchException+0x410
    fffff880`02f1b230 fffff800`02cd7d82 : fffff880`02f1b9f8 00000006`375bd239 fffff880`02f1baa0 fffff880`009ed668 : nt!KiDispatchException+0x16f
    fffff880`02f1b8c0 fffff800`02cd668a : fffffa80`0b2d8000 fffff880`02f1bb00 00000000`00029c87 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`02f1baa0 fffff800`02ce43f2 : 00000006`375b0ee6 fffff880`02f1bc58 00000000`00029c87 fffff880`009ed668 : nt!KiGeneralProtectionFault+0x10a
    fffff880`02f1bc30 fffff800`02ce3cb7 : 00000001`9607b7c0 00000001`00029c87 00000001`9607b7da 00000000`00000087 : nt!KiTimerExpiration+0xf2
    fffff880`02f1bcd0 fffff800`02ce0eea : fffff880`009ea180 fffff880`009f4fc0 00000000`00000000 fffffa80`0b085210 : nt!KiRetireDpcList+0x277
    fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiKernelCalloutExceptionHandler+e
    fffff800`02cd046e 90              nop
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
    
    BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050311-22963-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e5de90
    Debug session time: Tue May  3 22:10:13.948 2011 (UTC - 4:00)
    System Uptime: 0 days 0:56:45.259
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C5, {60000, 2, 0, fffff80002dc26fb}
    
    Unable to load image sptd.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for sptd.sys
    *** ERROR: Module load completed but symbols could not be loaded for sptd.sys
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+ca7 )
    
    Followup: Pool_corruption
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_CORRUPTED_EXPOOL (c5)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is
    caused by drivers that have corrupted the system pool.  Run the driver
    verifier against any new (or suspect) drivers, and if that doesn't turn up
    the culprit, then use gflags to enable special pool.
    Arguments:
    Arg1: 0000000000060000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff80002dc26fb, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC5_2
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+ca7
    fffff800`02dc26fb 488b00          mov     rax,qword ptr [rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  shift2u.exe
    
    TRAP_FRAME:  fffff880009b0a00 -- (.trap 0xfffff880009b0a00)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000060000 rbx=0000000000000000 rcx=fffff80002e1fe10
    rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002dc26fb rsp=fffff880009b0b90 rbp=0000000000000000
     r8=fffffa800ae37100  r9=fffffa800ae370f8 r10=0000000000000001
    r11=fffffa800ae37100 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    nt!ExDeferredFreePool+0xca7:
    fffff800`02dc26fb 488b00          mov     rax,qword ptr [rax] ds:9550:00000000`00060000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c97be9 to fffff80002c98640
    
    STACK_TEXT:  
    fffff880`009b08b8 fffff800`02c97be9 : 00000000`0000000a 00000000`00060000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`009b08c0 fffff800`02c96860 : fffffa80`0bcba220 fffffa80`0bcbaa90 fffffa80`0bd04020 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009b0a00 fffff800`02dc26fb : fffffa80`0bd21260 00000000`00000000 fffffa80`0af29530 fffff800`02c84e89 : nt!KiPageFault+0x260
    fffff880`009b0b90 fffff800`02dc41a1 : 00000000`00000000 fffffa80`0d0719e0 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0xca7
    fffff880`009b0c20 fffff880`0457d6f3 : fffffa80`0b823a90 fffffa80`0b7ce260 fffffa80`70627375 00000000`000003ed : nt!ExFreePoolWithTag+0x411
    fffff880`009b0cd0 fffff880`0457dab7 : fffffa80`0d071902 fffffa80`0bd21260 00000000`ffffffff fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xb2f
    fffff880`009b0db0 fffff880`0457b64f : fffffa80`0aed4ea8 fffffa80`0aed41a0 fffffa80`0aed5040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
    fffff880`009b0e10 fffff880`0456cf89 : fffffa80`0aed4050 00000000`00000000 fffffa80`0aed4e02 fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
    fffff880`009b0e50 fffff880`010e2ae8 : fffffa80`0af32000 fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
    fffff880`009b0e80 fffffa80`0af32000 : fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 : sptd+0x46ae8
    fffff880`009b0e88 fffffa80`0aed4ec0 : fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 00000000`00000000 : 0xfffffa80`0af32000
    fffff880`009b0e90 fffffa80`0aed4e00 : fffff880`009b0ef8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`0aed4ec0
    fffff880`009b0e98 fffff880`009b0ef8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`75302450 : 0xfffffa80`0aed4e00
    fffff880`009b0ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`75302450 00000000`00000000 : 0xfffff880`009b0ef8
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+ca7
    fffff800`02dc26fb 488b00          mov     rax,qword ptr [rax]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+ca7
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0xC5_2_nt!ExDeferredFreePool+ca7
    
    BUCKET_ID:  X64_0xC5_2_nt!ExDeferredFreePool+ca7
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050311-23665-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c1b000 PsLoadedModuleList = 0xfffff800`02e60e90
    Debug session time: Tue May  3 22:11:45.928 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:26.613
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {403, fffff6800007a748, 85800002962ea867, fffff6800007ab00}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000403, The subtype of the bugcheck.
    Arg2: fffff6800007a748
    Arg3: 85800002962ea867
    Arg4: fffff6800007ab00
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_403
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  MsMpEng.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002c42ca6 to fffff80002c9b640
    
    STACK_TEXT:  
    fffff880`068937a8 fffff800`02c42ca6 : 00000000`0000001a 00000000`00000403 fffff680`0007a748 85800002`962ea867 : nt!KeBugCheckEx
    fffff880`068937b0 fffff800`02ccd627 : 00000000`00000000 fffff680`0007aff8 fffffa80`0c681b30 fffff880`06893a00 : nt! ?? ::FNODOBFM::`string'+0x330bc
    fffff880`06893960 fffff800`02c88aef : fffffa80`00000000 00000000`112f8fff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x41f
    fffff880`06893b20 fffff800`02c9a8d3 : ffffffff`ffffffff 00000000`0095e5b0 00000000`0095e578 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
    fffff880`06893c20 00000000`771a14fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0095e4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771a14fa
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+330bc
    fffff800`02c42ca6 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+330bc
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
    
    BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`047ad000 fffff880`047eb000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
    fffff880`0613e000 fffff880`06199000   a2djavs  a2djavs.sys  Wed Oct 20 06:51:47 2010 (4CBEC9C3)
    fffff880`06123000 fffff880`0613e000   a2djusb  a2djusb.sys  Wed Oct 20 06:51:48 2010 (4CBEC9C4)
    fffff880`0124b000 fffff880`0128f000   a4s27gsh a4s27gsh.SYS Sat Jul 17 06:58:04 2010 (4C418CBC)
    fffff880`00f58000 fffff880`00faf000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`042c4000 fffff880`0434d000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`04610000 fffff880`04626000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`04152000 fffff880`04167000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e8a000 fffff880`00e95000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`1124d000 fffff880`11255000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
    fffff880`04126000 fffff880`0412c000   AsIO     AsIO.sys     Mon Apr 06 03:21:08 2009 (49D9AD64)
    fffff880`04120000 fffff880`04126000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
    fffff880`011f3000 fffff880`011fc000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dc2000 fffff880`00dec000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`04631000 fffff880`047a0000   athrx    athrx.sys    Wed Jul 08 20:49:13 2009 (4A553E89)
    fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Sat Feb 19 04:00:32 2011 (4D5F86B0)
    fffff880`018bf000 fffff880`018c6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0410f000 fffff880`04120000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`017d4000 fffff880`017fe000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cc6000 fffff880`00d86000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c68000 fffff880`00cc6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0138b000 fffff880`013fd000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`04600000 fffff880`04610000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`060ed000 fffff880`060fb000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0406e000 fffff880`040f1000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`040f1000 fffff880`0410f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`042b4000 fffff880`042c3000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0183a000 fffff880`01850000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04c60000 fffff880`04c82000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06107000 fffff880`06110000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`060fb000 fffff880`06107000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06110000 fffff880`06123000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0606b000 fffff880`06077000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`11eb4000 fffff880`11fa8000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`11fa8000 fffff880`11fee000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`01319000 fffff880`0132d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`012cd000 fffff880`01319000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`01411000 fffff880`0141b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`01acf000 fffff880`01b19000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`11240000 fffff880`1124d000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`03205000 fffff800`0324e000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`11200000 fffff880`11224000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`0600f000 fffff880`0606b000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
    fffff880`061a7000 fffff880`061c0000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`061c0000 fffff880`061c8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`06199000 fffff880`061a7000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`01bd3000 fffff880`01bdc000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`04d0c000 fffff880`04d1b000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`061d6000 fffff880`061e4000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
    fffff800`00bca000 fffff800`00bd4000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
    fffff880`04d2c000 fffff880`04d6f000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`015e3000 fffff880`015fe000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`017a9000 fffff880`017d4000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`04c82000 fffff880`04c87200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`061e4000 fffff880`061f9000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04c88000 fffff880`04cab000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c47000 fffff880`00c54000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`06077000 fffff880`06085000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04d1b000 fffff880`04d2a000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`061c9000 fffff880`061d6000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e5c000 fffff880`00e76000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`01600000 fffff880`01631000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`01200000 fffff880`0120b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`011c7000 fffff880`011d1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0132d000 fffff880`0138b000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`042a9000 fffff880`042b4000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01bc1000 fffff880`01bd3000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01656000 fffff880`01749000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`047f4000 fffff880`04800000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06d34000 fffff880`06d47000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`00c00000 fffff880`00c2f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`04ddb000 fffff880`04df0000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`043d7000 fffff880`043e6000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`0434d000 fffff880`04392000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01749000 fffff880`017a9000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`0120b000 fffff880`0121c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0429d000 fffff880`042a9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c1b000 fffff800`03205000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01440000 fffff880`015e3000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
    fffff880`018b6000 fffff880`018bf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`11eb2000 fffff880`11eb3180   nvBridge nvBridge.kmd Wed Feb 23 02:34:23 2011 (4D64B87F)
    fffff880`04c00000 fffff880`04c23000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D)
    fffff880`11256000 fffff880`11eb1180   nvlddmkm nvlddmkm.sys Wed Feb 23 02:46:52 2011 (4D64BB6C)
    fffff880`06ce1000 fffff880`06d34000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`0439b000 fffff880`043c1000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`041d7000 fffff880`041f4000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`011de000 fffff880`011f3000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00faf000 fffff880`00fe2000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`01015000 fffff880`0101c000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`0101c000 fffff880`0102c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01400000 fffff880`01411000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`04c23000 fffff880`04c60000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c54000 fffff880`00c68000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0128f000 fffff880`012b3000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`00fe2000 fffff880`00ffd000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04cc6000 fffff880`04ce7000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`04ce7000 fffff880`04d01000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0424c000 fffff880`0429d000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`04d01000 fffff880`04d0c000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`0141b000 fffff880`01424000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01424000 fffff880`0142d000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0142d000 fffff880`01436000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01b87000 fffff880`01bc1000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`06d47000 fffff880`06d5f000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04167000 fffff880`041d7000   Rt64win7 Rt64win7.sys Mon Mar 21 09:20:32 2011 (4D8750A0)
    fffff880`01198000 fffff880`011c7000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
    fffff880`11fee000 fffff880`11ffa000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04200000 fffff880`0421d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01b7d000 fffff880`01b87000   speedfan speedfan.sys Sat Dec 18 06:03:51 2010 (4D0C9517)
    fffff880`01b75000 fffff880`01b7d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01032000 fffff880`0118f000   sptd     sptd.sys     Tue Aug 24 02:13:12 2010 (4C7362F8)
    fffff880`04d2a000 fffff880`04d2b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`018cb000 fffff880`01acf000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`0123e000 fffff880`0124b000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`0121c000 fffff880`0123e000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`04238000 fffff880`0424c000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0412c000 fffff880`04152000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`04d6f000 fffff880`04d81000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`060d2000 fffff880`060ecc80   usbaudio usbaudio.sys Sat Nov 20 05:43:52 2010 (4CE7A668)
    fffff880`06085000 fffff880`060a2000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`060a2000 fffff880`060a3f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`1122f000 fffff880`11240000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04d81000 fffff880`04ddb000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`11224000 fffff880`1122f000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`060a4000 fffff880`060d1280   usbvideo usbvideo.sys Sat Nov 20 05:44:34 2010 (4CE7A692)
    fffff880`011d1000 fffff880`011de000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01bdc000 fffff880`01bea000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01631000 fffff880`01656000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00d86000 fffff880`00dc2000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`01b19000 fffff880`01b29000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`01000000 fffff880`01015000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01b29000 fffff880`01b75000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`047a0000 fffff880`047ad000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`043c1000 fffff880`043d7000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`0421d000 fffff880`04238000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`01bea000 fffff880`01bfa000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ea5000 fffff880`00f49000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f49000 fffff880`00f58000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04392000 fffff880`0439b000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`003a2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
    fffff880`00e76000 fffff880`00e8a000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`047eb000 fffff880`047f4000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`0118f000 fffff880`01198000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01880000 fffff880`018a1000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`01880000 fffff880`0188e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0188e000 fffff880`0189a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0189a000 fffff880`018a3000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018a3000 fffff880`018b6000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. bullinc

    bullinc New Member

    Joined:
    May 3, 2011
    Messages:
    12
    Likes Received:
    0
    - Uninstall Daemon Tools (or perhaps Alcohol 120%) - DONE
    - Atheros Extensible Wireless LAN device driver (D-Link AirPlus DWL-G520 Wireless PCI Adapter) - can't find. It's looks like 2009 was latest update!
     

    Attached Files:

  4. bullinc

    bullinc New Member

    Joined:
    May 3, 2011
    Messages:
    12
    Likes Received:
    0
    Oh yeah, and I have that "Kernel - Power" error in the event viewer!
     
  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Yes, hardware it is, the sticks are mismatching:


    Active/Auto-Refresh Command Period, tRFC (ns) 160.000 110.000 160.000 110.000


    Auto-self Refresh Supported Yes No Yes No


    Partial Array Self Refresh Supported No Yes No Yes




    1. Enable AMD Cool and Quiet for the CPU. You can try bios defaults.
    2. Make sure memory is set correctly to its rates 1333Mhz 9-9-9-24 1.5V (that's why I ask to attach cpuz memory snip)
    3. If crashes persist and they will, remove either pair of sticks, 9905403-011.A03LF OR 9905471-009.A00LF.


    Regards.
     

Share This Page

Loading...