SOLVED BSOD help !

Joined
Jan 9, 2011
Messages
9
Reaction score
0
Hi everyone I get this problem very often
I tried to update everything but Its happening,
so if anyone out there can help me it would be great
thank you


PD: I got 2 kingstone DDR2 2gb ram memories l was reading something that it would be the problem please help :(
 

Attachments

Last edited:
Joined
Sep 22, 2010
Messages
613
Reaction score
102



It does look indeed like your RAM is faulty:

Code:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. 
Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )

------------------------------------


PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.
Typically the address is just plain bad or it
is pointing at freed memory.
Probably caused by : ntkrnlmp.exe ( nt!PoIdle+4f )

------------------------------------

BugCheck A, {ffffcaafffffffe0, 2, 1, fffff80002abae89}
Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )

1. Your RAM settings look right. However, attach the SPD tab of your second RAM slot.


2. Run memtest overnight 10 for passes https://www.w7forums.com/memtest86-memory-testing-t9067.html.










Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\011311-14695-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02c3ee50
Debug session time: Thu Jan 13 09:44:48.048 2011 (UTC - 5:00)
System Uptime: 0 days 1:21:22.828
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffad10507f684, 0, fffff80002a8054f, 5}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!PoIdle+4f )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffad10507f684, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002a8054f, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ca90e0
 fffffad10507f684 

FAULTING_IP: 
nt!PoIdle+4f
fffff800`02a8054f 41f6460402      test    byte ptr [r14+4],2

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88002f1bb10 -- (.trap 0xfffff88002f1bb10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002f1bd78 rbx=0000000000000000 rcx=fffff880009e6180
rdx=00000c7800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a8054f rsp=fffff88002f1bca0 rbp=0000000000000000
 r8=fffffa8003907050  r9=0000000000000000 r10=fffff880009e6180
r11=fffffa80058d3400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
nt!PoIdle+0x4f:
fffff800`02a8054f 41f6460402      test    byte ptr [r14+4],2 ds:f670:00000000`00000004=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002af0b91 to fffff80002a72f00

STACK_TEXT:  
fffff880`02f1b9a8 fffff800`02af0b91 : 00000000`00000050 fffffad1`0507f684 00000000`00000000 fffff880`02f1bb10 : nt!KeBugCheckEx
fffff880`02f1b9b0 fffff800`02a70fee : 00000000`00000000 fffff880`009e6180 00000000`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`02f1bb10 fffff800`02a8054f : 00000000`0029d77a 00000000`00000000 fffffa80`0518f670 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`02f1bca0 fffff800`02a7b6cc : fffff880`009e6180 fffff880`00000000 00000000`00000000 fffff880`01445c50 : nt!PoIdle+0x4f
fffff880`02f1bd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PoIdle+4f
fffff800`02a8054f 41f6460402      test    byte ptr [r14+4],2

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PoIdle+4f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x50_nt!PoIdle+4f

BUCKET_ID:  X64_0x50_nt!PoIdle+4f

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\011311-14227-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Thu Jan 13 08:13:33.711 2011 (UTC - 5:00)
System Uptime: 0 days 0:51:42.490
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {ffffe2001ae05421, 2, 1, fffff80002a93b92}

Probably caused by : ntkrnlmp.exe ( nt!KiTimerWaitTest+252 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe2001ae05421, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a93b92, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0
 ffffe2001ae05421 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiTimerWaitTest+252
fffff800`02a93b92 49898e88200000  mov     qword ptr [r14+2088h],rcx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff80003fb43d0 -- (.trap 0xfffff80003fb43d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8006080100
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a93b92 rsp=fffff80003fb4560 rbp=fffffa8006080128
 r8=fffff80002c05001  r9=0000000000000002 r10=00000000000000dc
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiTimerWaitTest+0x252:
fffff800`02a93b92 49898e88200000  mov     qword ptr [r14+2088h],rcx ds:0001:00000000`00002088=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a89469 to fffff80002a89f00

STACK_TEXT:  
fffff800`03fb4288 fffff800`02a89469 : 00000000`0000000a ffffe200`1ae05421 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`03fb4290 fffff800`02a880e0 : 00000000`00000000 fffffa80`06080128 fffff800`02c02e80 fffff800`03fb4c58 : nt!KiBugCheckDispatch+0x69
fffff800`03fb43d0 fffff800`02a93b92 : ffffffff`fffb6c20 fffff800`02a95fa6 fffff800`0000000f fffff800`00000000 : nt!KiPageFault+0x260
fffff800`03fb4560 fffff800`02a952cd : fffffa80`06080120 fffffa80`06080168 fffffa80`06080168 00000000`00000102 : nt!KiTimerWaitTest+0x252
fffff800`03fb45e0 fffff800`02a95e7e : 00000007`393a8a64 fffff800`03fb4c58 00000000`000308dc fffff800`02c06e08 : nt!KiProcessExpiredTimerList+0x6d
fffff800`03fb4c30 fffff800`02a95697 : 00000001`fb234ac1 00000001`000308dc 00000001`fb234a36 00000000`000000dc : nt!KiTimerExpiration+0x1be
fffff800`03fb4cd0 fffff800`02a926fa : fffff800`02c02e80 fffff800`02c10c40 00000000`00000000 fffff880`03e97db0 : nt!KiRetireDpcList+0x277
fffff800`03fb4d80 00000000`00000000 : fffff800`03fb5000 fffff800`03faf000 fffff800`03fb4d40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiTimerWaitTest+252
fffff800`02a93b92 49898e88200000  mov     qword ptr [r14+2088h],rcx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiTimerWaitTest+252

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+252

BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+252

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\011211-14898-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Wed Jan 12 09:18:49.899 2011 (UTC - 5:00)
System Uptime: 0 days 1:16:44.678
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {ffffcaafffffffe0, 2, 1, fffff80002ad6e89}

Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcaafffffffe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ad6e89, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc60e0
 ffffcaafffffffe0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MmZeroPageThread+3d4
fffff800`02ad6e89 f0410fba6d1000  lock bts dword ptr [r13+10h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880009a9a80 -- (.trap 0xfffff880009a9a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000f8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ad6e89 rsp=fffff880009a9c10 rbp=00000000000000ff
 r8=0000000000000000  r9=0000058000000000 r10=0000000000000002
r11=fffff880009a9c08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MmZeroPageThread+0x3d4:
fffff800`02ad6e89 f0410fba6d1000  lock bts dword ptr [r13+10h],0 ds:1040:00000000`00000010=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8f469 to fffff80002a8ff00

STACK_TEXT:  
fffff880`009a9938 fffff800`02a8f469 : 00000000`0000000a ffffcaaf`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009a9940 fffff800`02a8e0e0 : 00000000`00000000 ffffff00`ffffffff 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009a9a80 fffff800`02ad6e89 : 00000000`000000ff 00000000`000000c6 00000000`00000008 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009a9c10 fffff800`02d33166 : fffffa80`039d1040 00000000`00000080 fffffa80`03973890 fffff800`02a6e479 : nt!MmZeroPageThread+0x3d4
fffff880`009a9d40 fffff800`02a6e486 : fffff800`02c08e80 fffffa80`039d1040 fffff800`02c16c40 43b60f44`2877894c : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MmZeroPageThread+3d4
fffff800`02ad6e89 f0410fba6d1000  lock bts dword ptr [r13+10h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MmZeroPageThread+3d4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4

BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\010911-19593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a02000 PsLoadedModuleList = 0xfffff800`02c3fe50
Debug session time: Sun Jan  9 13:28:40.087 2011 (UTC - 5:00)
System Uptime: 0 days 0:19:42.866
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {ffffcaafffffffe0, 2, 1, fffff80002abae89}

Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcaafffffffe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002abae89, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002caa0e0
 ffffcaafffffffe0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MmZeroPageThread+3d4
fffff800`02abae89 f0410fba6d1000  lock bts dword ptr [r13+10h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff880009a9a80 -- (.trap 0xfffff880009a9a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000c8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002abae89 rsp=fffff880009a9c10 rbp=00000000000000ff
 r8=0000000000000000  r9=0000058000000000 r10=0000000000000002
r11=fffff880009a9c08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MmZeroPageThread+0x3d4:
fffff800`02abae89 f0410fba6d1000  lock bts dword ptr [r13+10h],0 ds:1040:00000000`00000010=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a73469 to fffff80002a73f00

STACK_TEXT:  
fffff880`009a9938 fffff800`02a73469 : 00000000`0000000a ffffcaaf`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009a9940 fffff800`02a720e0 : 00000000`00000000 ffffff00`ffffffff 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009a9a80 fffff800`02abae89 : 00000000`000000ff 00000000`000000a5 00000000`00000007 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009a9c10 fffff800`02d17166 : fffffa80`039d1040 00000000`00000080 fffffa80`03973890 fffff800`02a52479 : nt!MmZeroPageThread+0x3d4
fffff880`009a9d40 fffff800`02a52486 : fffff800`02bece80 fffffa80`039d1040 fffff800`02bfac40 8b4c7024`7c8b4868 : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MmZeroPageThread+3d4
fffff800`02abae89 f0410fba6d1000  lock bts dword ptr [r13+10h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MmZeroPageThread+3d4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4

BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\010911-14742-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
Debug session time: Sun Jan  9 19:38:35.105 2011 (UTC - 5:00)
System Uptime: 0 days 2:02:42.619
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41201, fffff68000173b78, f5f00000a8108867, fffffa8004059310}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+13bf2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff68000173b78
Arg3: f5f00000a8108867
Arg4: fffffa8004059310

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41201

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  SC2.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002adb1ee to fffff80002a7af00

STACK_TEXT:  
fffff880`03cec9b8 fffff800`02adb1ee : 00000000`0000001a 00000000`00041201 fffff680`00173b78 f5f00000`a8108867 : nt!KeBugCheckEx
fffff880`03cec9c0 fffff800`02a4940e : fffffa80`05d76e10 fffff800`02d933b7 fffffa80`04993500 f5f00000`a8108867 : nt! ?? ::FNODOBFM::`string'+0x13bf2
fffff880`03ceca00 fffff800`02a490aa : fffffa80`04059310 fffffa80`04b3f060 fffffa80`04b3f060 00000000`2e76f000 : nt!MiQueryAddressState+0x2ae
fffff880`03ceca50 fffff800`02d5f798 : fffffa80`00000004 00000000`2e770000 fffffa80`04059310 fffffa80`04993500 : nt!MiQueryAddressSpan+0xaa
fffff880`03cecac0 fffff800`02a7a153 : ffffffff`ffffffff fffffa80`04b44060 fffff880`03cecbc8 00000000`0008e298 : nt!NtQueryVirtualMemory+0x386
fffff880`03cecbb0 00000000`775a00ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775a00ea


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+13bf2
fffff800`02adb1ee cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+13bf2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bf2

BUCKET_ID:  X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bf2

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00e8e000 fffff880`00ee5000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cc0000 fffff880`02d4a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`037c4000 fffff880`037da000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03720000 fffff880`03735000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fef000 fffff880`00ff8000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`018a3000 fffff880`018ab000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`01945000 fffff880`0194c000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`036e9000 fffff880`036fa000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`064d1000 fffff880`064ef000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006c0000 fffff960`006e7000   cdd      cdd.dll      unavailable (00000000)
fffff880`018e1000 fffff880`0190b000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01873000 fffff880`018a3000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cf2000 fffff880`00d50000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01125000 fffff880`01198000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`037b4000 fffff880`037c4000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`065a3000 fffff880`065ac000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`05f72000 fffff880`05f80000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03648000 fffff880`036cb000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`036cb000 fffff880`036e9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0121b000 fffff880`01231000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05f3e000 fffff880`05f60000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05f8c000 fffff880`05f95000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05f80000 fffff880`05f8c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05f95000 fffff880`05fa8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05f66000 fffff880`05f72000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e73000 fffff880`03f67000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`03f67000 fffff880`03fad000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010b3000 fffff880`010c7000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00e35000 fffff880`00e81000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0104c000 fffff880`01086000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01198000 fffff880`011e2000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02fde000 fffff800`03027000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03fbe000 fffff880`03fe2000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05fb6000 fffff880`05fcf000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05fcf000 fffff880`05fd7080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05fa8000 fffff880`05fb6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`06409000 fffff880`064d1000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015eb000 fffff880`015f4000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03fe2000 fffff880`04000000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`053e7000 fffff880`053f6000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bd3000 fffff800`00bdd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04071000 fffff880`040b4000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013d9000 fffff880`013f3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01596000 fffff880`015c1000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`05f60000 fffff880`05f65200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04135000 fffff880`0414a000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c1b000 fffff880`05c3e000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cd1000 fffff880`00cde000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05fe7000 fffff880`05ff5000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`02dee000 fffff880`02dfd000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05fda000 fffff880`05fe7000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd5000 fffff880`00fef000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0190b000 fffff880`0193c000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`06831000 fffff880`06841000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`064ef000 fffff880`06507000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06507000 fffff880`06533000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`06533000 fffff880`06580000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`06580000 fffff880`065a3000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`019aa000 fffff880`019b5000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00eee000 fffff880`00ef8000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010c7000 fffff880`01125000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015d9000 fffff880`015eb000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01444000 fffff880`01536000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03600000 fffff880`0360c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0360c000 fffff880`0363b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04120000 fffff880`04135000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d79000 fffff880`02d88000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`01800000 fffff880`01845000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01536000 fffff880`01596000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`06841000 fffff880`06856000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`019b5000 fffff880`019c6000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a01000 fffff800`02fde000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01236000 fffff880`013d9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0193c000 fffff880`01945000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`053e5000 fffff880`053e6180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`0480b000 fffff880`053e4a80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`02d53000 fffff880`02d79000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03797000 fffff880`037b4000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f38000 fffff880`00f4d000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ef8000 fffff880`00f2b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fbe000 fffff880`00fc5000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc5000 fffff880`00fd5000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06889000 fffff880`0692f000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05f01000 fffff880`05f3e000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cde000 fffff880`00cf2000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`037da000 fffff880`037fe000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`02c77000 fffff880`02c92000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02c92000 fffff880`02cb3000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02dd4000 fffff880`02dee000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04800000 fffff880`0480b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0198f000 fffff880`01998000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01998000 fffff880`019a1000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019a1000 fffff880`019aa000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0414a000 fffff880`04162000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e00000 fffff880`03e66000   Rt64win7 Rt64win7.sys Tue Nov 30 01:01:28 2010 (4CF49338)
fffff880`05c71000 fffff880`05f00280   RTKVHD64 RTKVHD64.sys Wed Dec 29 22:52:42 2010 (4D1C020A)
fffff880`0692f000 fffff880`0693a000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0378b000 fffff880`03797000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d88000 fffff880`02da5000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015d1000 fffff880`015d9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`04162000 fffff880`041f8000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06979000 fffff880`069e0000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0693a000 fffff880`06967000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03e71000 fffff880`03e72480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Thu Apr 08 22:45:54 2010 (4BBE94E2)
fffff880`06967000 fffff880`06979000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019e4000 fffff880`019f1000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`019c6000 fffff880`019e4000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dc0000 fffff880`02dd4000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`036fa000 fffff880`03720000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`040b4000 fffff880`040c6000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05fd8000 fffff880`05fd9f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fad000 fffff880`03fbe000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`040c6000 fffff880`04120000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e66000 fffff880`03e71000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03735000 fffff880`0378b000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05c00000 fffff880`05c1b000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00f2b000 fffff880`00f38000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0194c000 fffff880`0195a000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0195a000 fffff880`0197f000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015c1000 fffff880`015d1000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f4d000 fffff880`00f62000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f62000 fffff880`00fbe000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02da5000 fffff880`02dc0000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0197f000 fffff880`0198f000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d50000 fffff880`00df4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00cc0000 fffff880`00ccf000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d4a000 fffff880`02d53000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`0032f000   win32k   win32k.sys   unavailable (00000000)
fffff880`053f6000 fffff880`053ff000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ee5000 fffff880`00eee000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05c3e000 fffff880`05c5f000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`06800000 fffff880`06831000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`04000000 fffff880`04071000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`018ab000 fffff880`018b9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018b9000 fffff880`018c5000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018c5000 fffff880`018ce000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018ce000 fffff880`018e1000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
The sticks are not from the same pair, are they?


Run memtest with both sticks in and then test per each one of them separately.
 
Joined
Jan 9, 2011
Messages
9
Reaction score
0
Ok l remove my second memory, it was faulty , that stops BSOD , thank you so much :)
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top