1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Resolved blue screen

Discussion in 'Windows 7' started by melanieh, 2015/04/14.

  1. 2015/04/14
    melanieh

    melanieh Inactive Thread Starter

    Joined:
    2014/03/03
    Messages:
    73
    Likes Received:
    0
    Windows 7 Pro computer
    HP OmniPro 110PC

    I have a computer that randomly gets a blue screen. Once a week or two. (Attached is an image of it.)

    I also have attached the information from the mini dump file when I viewed it in bluescreen viewer.

    Attached the properties screen also of the dmp file from bluescreen viewer.

    Just wondering what we need to do at this point.
     

    Attached Files:

    Last edited: 2015/04/14
  2. 2015/04/14
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Arie,
    #2

  3. to hide this advert.

  4. 2015/04/15
    melanieh

    melanieh Inactive Thread Starter

    Joined:
    2014/03/03
    Messages:
    73
    Likes Received:
    0
    DUMP DATA

    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\041415-13743-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
    Machine Name:
    Kernel base = 0x82c14000 PsLoadedModuleList = 0x82d5e5b0
    Debug session time: Tue Apr 14 08:46:51.639 2015 (UTC - 5:00)
    System Uptime: 0 days 0:09:18.168
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000008E, {c0000005, 82ea2719, b9dc8ca8, 0}

    Probably caused by : memory_corruption

    Followup: memory_corruption
    ---------

    1: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003. This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG. This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG. This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82ea2719, The address that the exception occurred at
    Arg3: b9dc8ca8, Trap Frame
    Arg4: 00000000

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    nt!NtQueryInformationJobObject+0
    82ea2719 0000 add byte ptr [eax],al

    TRAP_FRAME: b9dc8ca8 -- (.trap 0xffffffffb9dc8ca8)
    .trap 0xffffffffb9dc8ca8
    ErrCode = 00000002
    eax=000000e8 ebx=82ea2719 ecx=84f6f310 edx=82ea2719 esi=070ff900 edi=00000000
    eip=82ea2719 esp=b9dc8d1c ebp=b9dc8d34 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nt!NtQueryInformationJobObject:
    82ea2719 0000 add byte ptr [eax],al ds:0023:000000e8=??
    .trap
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: CODE_CORRUPTION

    BUGCHECK_STR: 0x8E

    PROCESS_NAME: OSDManager.exe

    CURRENT_IRQL: 0

    LAST_CONTROL_TRANSFER: from 777570f4 to 82ea2719

    STACK_TEXT:
    b9dc8d34 777570f4 badb0d00 070ff8ec 00000000 nt!NtQueryInformationJobObject
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    b9dc8d38 badb0d00 070ff8ec 00000000 00000000 0x777570f4
    b9dc8d3c 070ff8ec 00000000 00000000 00000000 0xbadb0d00
    b9dc8d40 00000000 00000000 00000000 00000000 0x70ff8ec


    STACK_COMMAND: kb

    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    !chkimg -lo 50 -d !nt
    82ea2002-82ea2006 5 bytes - nt!PiRestartDevice+24

    [ 74 66 f7 86 d8:00 00 00 00 00 ]
    82ea200b - nt!PiRestartDevice+2d (+0x09)

    [ 60:00 ]
    82ea200e-82ea2011 4 bytes - nt!PiRestartDevice+30 (+0x03)

    [ 74 07 b8 01:00 00 00 00 ]
    82ea2014-82ea2036 35 bytes - nt!PiRestartDevice+36 (+0x06)

    [ c0 eb 58 05 ff fc ff ff:00 00 00 00 00 00 00 00 ]
    82ea203a-82ea2048 15 bytes - nt!PiRestartDevice+5c (+0x26)

    [ 83 7f 0c 10 75 ef a0 46:00 00 00 00 00 00 00 00 ]
    82ea204c-82ea206b 32 bytes - nt!PiRestartDevice+6e (+0x12)

    [ 88 45 fc 8b 4e 10 e8 3d:00 00 00 00 00 00 00 00 ]
    82ea206e-82ea2081 20 bytes - nt!PiRestartDevice+90 (+0x22)

    [ c0 5e c9 c3 3a 20 ea 82:00 00 00 00 00 00 00 00 ]
    82ea2083 - nt!PiRestartDevice+a5 (+0x15)

    [ 01:00 ]
    82ea2086 - nt!PiRestartDevice+a8 (+0x03)

    [ 02:00 ]
    82ea2089-82ea208d 5 bytes - nt!PiRestartDevice+ab (+0x03)

    [ 02 02 02 02 02:00 00 00 00 00 ]
    82ea208f-82ea20aa 28 bytes - nt!PiRestartDevice+b1 (+0x06)

    [ 03 03 03 03 01 03 90 90:00 00 00 00 00 00 00 00 ]
    82ea20ae-82ea20c0 19 bytes - nt!PnpRestartDeviceNode+14 (+0x1f)

    [ a8 10 75 42 68 40 bd d7:00 00 00 00 00 00 00 00 ]
    82ea20c3-82ea20c5 3 bytes - nt!PnpRestartDeviceNode+29 (+0x15)

    [ 8d 81 84:00 00 00 ]
    82ea20c9-82ea20ca 2 bytes - nt!PnpRestartDeviceNode+2f (+0x06)

    [ 66 ff:00 00 ]
    82ea20cc-82ea20cd 2 bytes - nt!PnpRestartDeviceNode+32 (+0x03)

    [ 0f b7:00 00 ]
    82ea20cf-82ea20d7 9 bytes - nt!PnpRestartDeviceNode+35 (+0x03)

    [ 66 85 c0 75 16 8d 41 40:00 00 00 00 00 00 00 00 ]
    82ea20d9-82ea20de 6 bytes - nt!PnpRestartDeviceNode+3f (+0x0a)

    [ 74 0f 66 83 b9 86:00 00 00 00 00 00 ]
    82ea20e3-82ea20eb 9 bytes - nt!PnpRestartDeviceNode+49 (+0x0a)

    [ 75 05 e8 2e 9a d9 ff b8:00 00 00 00 00 00 00 00 ]
    82ea20ee-82ea20f1 4 bytes - nt!PnpRestartDeviceNode+54 (+0x0b)

    [ c0 e9 34 01:00 00 00 00 ]
    82ea20f4-82ea20f6 3 bytes - nt!PnpRestartDeviceNode+5a (+0x06)

    [ 83 a6 dc:00 00 00 ]
    82ea20fa-82ea2104 11 bytes - nt!PnpRestartDeviceNode+60 (+0x06)

    [ fa 25 ff 7f ef ff 81 7e:00 00 00 00 00 00 00 00 ]
    82ea2107-82ea2109 3 bytes - nt!PnpRestartDeviceNode+6d (+0x0d)

    [ 89 86 d8:00 00 00 ]
    82ea210d-82ea210f 3 bytes - nt!PnpRestartDeviceNode+73 (+0x06)

    [ 0f 84 ca:00 00 00 ]
    82ea2113-82ea211c 10 bytes - nt!PnpRestartDeviceNode+79 (+0x06)

    [ 25 ff fa ff 83 33 ff 89:00 00 00 00 00 00 00 00 ]
    82ea2120-82ea2140 33 bytes - nt!PnpRestartDeviceNode+86 (+0x0d)

    [ 66 39 7e 1c 74 16 57 ff:00 00 00 00 00 00 00 00 ]
    82ea2143-82ea2146 4 bytes - nt!PnpRestartDeviceNode+a9 (+0x23)

    [ 66 ff 8f 86:00 00 00 00 ]
    82ea214a-82ea2154 11 bytes - nt!PnpRestartDeviceNode+b0 (+0x07)

    [ bb a0 bc d7 82 8b c3 f0:00 00 00 00 00 00 00 00 ]
    82ea2156-82ea2167 18 bytes - nt!PnpRestartDeviceNode+bc (+0x0c)

    [ 72 07 8b cb e8 17 48 e0:00 00 00 00 00 00 00 00 ]
    82ea216b-82ea2171 7 bytes - nt!PnpRestartDeviceNode+d1 (+0x15)

    [ 8b 07 85 c0 74 15 6a:00 00 00 00 00 00 00 ]
    82ea2173-82ea217a 8 bytes - nt!PnpRestartDeviceNode+d9 (+0x08)

    [ 50 e8 41 39 e9 ff 83 27:00 00 00 00 00 00 00 00 ]
    82ea217c-82ea217e 3 bytes - nt!PnpRestartDeviceNode+e2 (+0x09)

    [ 81 a6 d8:00 00 00 ]
    82ea2182-82ea218b 10 bytes - nt!PnpRestartDeviceNode+e8 (+0x06)

    [ ff fd ff ff 83 25 a4 bc:00 00 00 00 00 00 00 00 ]
    82ea218d-82ea21bd 49 bytes - nt!PnpRestartDeviceNode+f3 (+0x0b)

    [ 33 c9 41 8b c3 f0 0f c1:00 00 00 00 00 00 00 00 ]
    82ea21c0-82ea21c2 3 bytes - nt!PnpRestartDeviceNode+126 (+0x33)

    [ 8d 81 86:00 00 00 ]
    82ea21c6-82ea21c7 2 bytes - nt!PnpRestartDeviceNode+12c (+0x06)

    [ 66 ff:00 00 ]
    82ea21c9-82ea21ca 2 bytes - nt!PnpRestartDeviceNode+12f (+0x03)

    [ 0f b7:00 00 ]
    82ea21cc-82ea21d4 9 bytes - nt!PnpRestartDeviceNode+132 (+0x03)

    [ 66 85 c0 75 0c 8d 41 40:00 00 00 00 00 00 00 00 ]
    82ea21d6-82ea21e0 11 bytes - nt!PnpRestartDeviceNode+13c (+0x0a)

    [ 74 05 e8 3b 99 d9 ff 83:00 00 00 00 00 00 00 00 ]
    82ea21e3-82ea21e6 4 bytes - nt!PnpRestartDeviceNode+149 (+0x0d)

    [ ff 68 01 03:00 00 00 00 ]
    82ea21e9-82ea21fc 20 bytes - nt!PnpRestartDeviceNode+14f (+0x06)

    [ e8 ab 6c d8 ff 68 40 bd:00 00 00 00 00 00 00 00 ]
    82ea21ff-82ea2201 3 bytes - nt!PnpRestartDeviceNode+165 (+0x16)

    [ 8d 81 84:00 00 00 ]
    82ea2205-82ea2206 2 bytes - nt!PnpRestartDeviceNode+16b (+0x06)

    [ 66 ff:00 00 ]
    82ea2208-82ea2209 2 bytes - nt!PnpRestartDeviceNode+16e (+0x03)

    [ 0f b7:00 00 ]
    82ea220b-82ea2213 9 bytes - nt!PnpRestartDeviceNode+171 (+0x03)

    [ 66 85 c0 75 16 8d 41 40:00 00 00 00 00 00 00 00 ]
    82ea2215-82ea221a 6 bytes - nt!PnpRestartDeviceNode+17b (+0x0a)

    [ 74 0f 66 83 b9 86:00 00 00 00 00 00 ]
    82ea221f-82ea224d 47 bytes - nt!PnpRestartDeviceNode+185 (+0x0a)

    [ 75 05 e8 f2 98 d9 ff 33:00 00 00 00 00 00 00 00 ]
    82ea2250-82ea2278 41 bytes - nt!PiControlStartDevice+1f (+0x31)

    [ 66 3b c2 77 4c a8 01 75:00 00 00 00 00 00 00 00 ]
    82ea227a-82ea2280 7 bytes - nt!PiControlStartDevice+49 (+0x2a)

    [ 6a 10 8d 45 f8 e8 2b:00 00 00 00 00 00 00 ]
    82ea2284-82ea2286 3 bytes - nt!PiControlStartDevice+53 (+0x0a)

    [ 80 7d 14:00 00 00 ]
    82ea2288-82ea228e 7 bytes - nt!PiControlStartDevice+57 (+0x04)

    [ 8b f0 74 10 83 7d fc:00 00 00 00 00 00 00 ]
    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.

    3618 errors : !nt (82ea2002-82ea2fff)

    MODULE_NAME: memory_corruption

    IMAGE_NAME: memory_corruption

    FOLLOWUP_NAME: memory_corruption

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    MEMORY_CORRUPTOR: LARGE_4096

    FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096

    BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096

    Followup: memory_corruption
    ---------

    eax=000000e8 ebx=82ea2719 ecx=84f6f310 edx=82ea2719 esi=070ff900 edi=00000000
    eip=82ea2719 esp=b9dc8d1c ebp=b9dc8d34 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nt!NtQueryInformationJobObject:
    82ea2719 0000 add byte ptr [eax],al ds:0023:000000e8=??
    ChildEBP RetAddr Args to Child
    b9dc8d34 777570f4 badb0d00 070ff8ec 00000000 nt!NtQueryInformationJobObject
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    b9dc8d38 badb0d00 070ff8ec 00000000 00000000 0x777570f4
    b9dc8d3c 070ff8ec 00000000 00000000 00000000 0xbadb0d00
    b9dc8d40 00000000 00000000 00000000 00000000 0x70ff8ec
    start end module name
    80b9a000 80ba2000 kdcom kdcom.dll Mon Jul 13 20:08:58 2009 (4A5BDAAA)
    82c14000 83028000 nt ntkrpamp.exe Mon Feb 02 20:11:13 2015 (54D02E41)
    83028000 8305f000 hal halmacpi.dll Sat Nov 20 02:37:38 2010 (4CE788D2)
    83200000 8320e000 WDFLDR WDFLDR.SYS Wed Jul 25 21:36:38 2012 (5010AD36)
    8320e000 83221000 wanarp wanarp.sys Sat Nov 20 04:07:45 2010 (4CE79DF1)
    8322f000 832b4000 mcupdate mcupdate.dll Sat Nov 20 06:00:54 2010 (4CE7B876)
    832b4000 832c5000 PSHED PSHED.dll Mon Jul 13 20:09:36 2009 (4A5BDAD0)
    832c5000 832cd000 BOOTVID BOOTVID.dll Mon Jul 13 20:04:34 2009 (4A5BD9A2)
    832cd000 8330f000 CLFS CLFS.SYS Mon Jul 13 18:11:10 2009 (4A5BBF0E)
    8330f000 83376000 CI CI.dll Thu Jun 26 20:42:04 2014 (53ACCBEC)
    83376000 833f7000 Wdf01000 Wdf01000.sys Fri Jun 21 21:29:37 2013 (51C50C11)
    88605000 8864d000 ACPI ACPI.sys Sat Nov 20 02:37:52 2010 (4CE788E0)
    8864d000 88656000 WMILIB WMILIB.SYS Mon Jul 13 18:11:22 2009 (4A5BBF1A)
    88656000 8865e000 msisadrv msisadrv.sys Mon Jul 13 18:11:09 2009 (4A5BBF0D)
    8865e000 88688000 pci pci.sys Sat Nov 20 02:37:57 2010 (4CE788E5)
    88688000 88693000 vdrvroot vdrvroot.sys Mon Jul 13 18:46:19 2009 (4A5BC74B)
    88693000 886a4000 partmgr partmgr.sys Sat Mar 17 00:03:08 2012 (4F641B0C)
    886a4000 886b4000 volmgr volmgr.sys Sat Nov 20 02:38:06 2010 (4CE788EE)
    886b4000 886ff000 volmgrx volmgrx.sys Mon Jul 13 18:11:41 2009 (4A5BBF2D)
    886ff000 88715000 mountmgr mountmgr.sys Mon Feb 02 19:58:34 2015 (54D02B4A)
    88715000 8873e180 vmbus vmbus.sys Sat Nov 20 03:14:58 2010 (4CE79192)
    8873f000 88751000 winhv winhv.sys Sat Nov 20 02:38:15 2010 (4CE788F7)
    88751000 887ab000 afd afd.sys Fri May 30 01:36:06 2014 (538826D6)
    887ab000 887ca000 pacer pacer.sys Mon Jul 13 18:53:58 2009 (4A5BC916)
    887ca000 887db000 vwififlt vwififlt.sys Mon Jul 13 18:52:03 2009 (4A5BC8A3)
    887db000 887eb000 vpcnfltr vpcnfltr.sys Sat Nov 20 04:50:36 2010 (4CE7A7FC)
    887eb000 887f9000 netbios netbios.sys Mon Jul 13 18:53:54 2009 (4A5BC912)
    8880d000 8890e000 iaStor iaStor.sys Sat Nov 06 02:37:33 2010 (4CD505BD)
    8890e000 88917000 amdxata amdxata.sys Fri Mar 19 11:19:01 2010 (4BA3A3F5)
    88917000 8894b000 fltmgr fltmgr.sys Mon Jul 13 18:11:13 2009 (4A5BBF11)
    8894b000 8895c000 fileinfo fileinfo.sys Mon Jul 13 18:21:51 2009 (4A5BC18F)
    8895c000 88964000 rdprefmp rdprefmp.sys Mon Jul 13 19:01:41 2009 (4A5BCAE5)
    88964000 8896f000 Msfs Msfs.SYS Mon Jul 13 18:11:26 2009 (4A5BBF1E)
    8896f000 8897d000 Npfs Npfs.SYS Mon Jul 13 18:11:31 2009 (4A5BBF23)
    8897d000 88994000 tdx tdx.sys Sat Nov 20 02:39:17 2010 (4CE78935)
    88994000 889a0000 TDI TDI.SYS Sat Nov 20 02:39:18 2010 (4CE78936)
    889a0000 889acf00 aswTdi aswTdi.SYS Mon Jan 13 19:01:59 2014 (52D48C87)
    889ad000 889bd000 aswrdr2 aswrdr2.sys Mon Jan 13 19:02:14 2014 (52D48C96)
    889bd000 889ef000 netbt netbt.sys Sat Nov 20 02:39:22 2010 (4CE7893A)
    889ef000 889f6000 wfplwf wfplwf.sys Mon Jul 13 18:53:51 2009 (4A5BC90F)
    88a00000 88a08000 RDPCDD RDPCDD.sys Sat Nov 20 04:22:19 2010 (4CE7A15B)
    88a08000 88a10000 rdpencdd rdpencdd.sys Mon Jul 13 19:01:39 2009 (4A5BCAE3)
    88a13000 88b42000 Ntfs Ntfs.sys Fri Apr 12 06:31:55 2013 (5167F0AB)
    88b42000 88b6d000 msrpc msrpc.sys Mon Jul 13 18:11:59 2009 (4A5BBF3F)
    88b6d000 88b80000 ksecdd ksecdd.sys Thu Mar 05 22:02:34 2015 (54F926DA)
    88b80000 88bdd000 cng cng.sys Thu Jan 29 21:01:12 2015 (54CAF3F8)
    88bdd000 88beb000 pcw pcw.sys Mon Jul 13 18:11:10 2009 (4A5BBF0E)
    88beb000 88bf4000 aswKbd aswKbd.sys Mon Jan 13 19:02:22 2014 (52D48C9E)
    88bf4000 88bfd000 Fs_Rec Fs_Rec.sys Wed Feb 29 21:21:26 2012 (4F4EEB36)
    88c00000 88c0d000 watchdog watchdog.sys Mon Jul 13 18:24:10 2009 (4A5BC21A)
    88c0f000 88cc6000 ndis ndis.sys Sat Nov 20 02:39:19 2010 (4CE78937)
    88cc6000 88d04000 NETIO NETIO.SYS Tue Nov 26 04:01:51 2013 (5294718F)
    88d04000 88d2a000 ksecpkg ksecpkg.sys Thu Mar 05 22:17:27 2015 (54F92A57)
    88d2a000 88d43000 mup mup.sys Tue Jan 06 19:34:31 2015 (54AC8D27)
    88d43000 88d4b000 hwpolicy hwpolicy.sys Sat Nov 20 02:37:35 2010 (4CE788CF)
    88d4b000 88d7d000 fvevol fvevol.sys Sat Nov 20 02:40:22 2010 (4CE78976)
    88d7d000 88d84000 dlkmdldr dlkmdldr.sys Mon Jul 30 15:45:41 2012 (5016F275)
    88d84000 88d95000 disk disk.sys Mon Jul 13 18:11:28 2009 (4A5BBF20)
    88d95000 88dba000 CLASSPNP CLASSPNP.SYS Mon Jul 13 18:11:20 2009 (4A5BBF18)
    88dba000 88dc3c00 aswRvrt aswRvrt.sys Mon Jan 13 19:01:27 2014 (52D48C67)
    88dd1000 88ddd000 vga vga.sys Mon Jul 13 18:25:50 2009 (4A5BC27E)
    88ddd000 88dfe000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 18:25:49 2009 (4A5BC27D)
    88e00000 88e08000 spldr spldr.sys Mon May 11 11:13:47 2009 (4A084EBB)
    88e08000 88e35000 rdyboost rdyboost.sys Sat Nov 20 03:00:07 2010 (4CE78E17)
    88e36000 88f82000 tcpip tcpip.sys Fri Apr 04 20:10:29 2014 (533F5805)
    88f82000 88fb3000 fwpkclnt fwpkclnt.sys Fri Apr 04 20:08:43 2014 (533F579B)
    88fb3000 88fbb380 vmstorfl vmstorfl.sys Sat Nov 20 03:14:37 2010 (4CE7917D)
    88fbc000 88ffb000 volsnap volsnap.sys Sat Nov 20 02:38:13 2010 (4CE788F5)
    8d800000 8d846000 nwifi nwifi.sys Mon Jul 13 18:51:59 2009 (4A5BC89F)
    8d846000 8d859000 rspndr rspndr.sys Mon Jul 13 18:53:20 2009 (4A5BC8F0)
    8d859000 8d8de000 HTTP HTTP.sys Sat Nov 20 02:40:17 2010 (4CE78971)
    8d8de000 8d8f7000 bowser bowser.sys Tue Feb 22 22:47:32 2011 (4D649164)
    8d8f7000 8d909000 mpsdrv mpsdrv.sys Mon Jul 13 18:52:52 2009 (4A5BC8D4)
    8d913000 8d932000 cdrom cdrom.sys Sat Nov 20 02:38:09 2010 (4CE788F1)
    8d932000 8d9f2000 aswSnx aswSnx.SYS Mon Nov 24 06:45:48 2014 (5473287C)
    8d9f2000 8d9f9000 Null Null.SYS Mon Jul 13 18:11:12 2009 (4A5BBF10)
    8d9f9000 8da00000 Beep Beep.SYS Mon Jul 13 18:45:00 2009 (4A5BC6FC)
    8e400000 8e41a000 WudfPf WudfPf.sys Sat Nov 20 03:58:55 2010 (4CE79BDF)
    8e41a000 8e42a000 ndisuio ndisuio.sys Sat Nov 20 04:06:36 2010 (4CE79DAC)
    8e435000 8e447000 intelppm intelppm.sys Mon Jul 13 18:11:03 2009 (4A5BBF07)
    8e447000 8e4ff000 dxgkrnl dxgkrnl.sys Sun Jun 15 19:43:59 2014 (539E3DCF)
    8e4ff000 8e550000 Rt86win7 Rt86win7.sys Thu Nov 11 00:35:06 2010 (4CDB8E9A)
    8e550000 8e568000 raspppoe raspppoe.sys Mon Jul 13 18:54:53 2009 (4A5BC94D)
    8e568000 8e57f000 raspptp raspptp.sys Mon Jul 13 18:54:47 2009 (4A5BC947)
    8e57f000 8e596000 rassstp rassstp.sys Mon Jul 13 18:54:57 2009 (4A5BC951)
    8e596000 8e5a3000 mouclass mouclass.sys Mon Jul 13 18:11:15 2009 (4A5BBF13)
    8e5a3000 8e5b1000 umbus umbus.sys Sat Nov 20 04:00:23 2010 (4CE79C37)
    8e5b1000 8e5c9000 vpcusb vpcusb.sys Sat Nov 20 04:50:37 2010 (4CE7A7FD)
    8e5c9000 8e5d6000 usbrpm usbrpm.sys Sat Nov 20 04:52:01 2010 (4CE7A851)
    8e5d6000 8e5f8000 aswMonFlt aswMonFlt.sys Mon Jan 13 19:01:57 2014 (52D48C85)
    8ea11000 8ea57900 vpcvmm vpcvmm.sys Sat Nov 20 04:50:38 2010 (4CE7A7FE)
    8ea58000 8ea69000 termdd termdd.sys Sat Nov 20 04:21:10 2010 (4CE7A116)
    8ea69000 8ea8b000 SASKUTIL SASKUTIL.SYS Tue Jul 12 15:24:48 2011 (4E1CAD90)
    8ea8b000 8ea91000 SASDIFSV SASDIFSV.SYS Thu Jul 21 18:03:16 2011 (4E28B034)
    8ea91000 8ead2000 rdbss rdbss.sys Tue Jan 06 19:34:41 2015 (54AC8D31)
    8ead2000 8eadc000 nsiproxy nsiproxy.sys Mon Jul 13 18:12:08 2009 (4A5BBF48)
    8eadc000 8eae6000 mssmbios mssmbios.sys Mon Jul 13 18:19:25 2009 (4A5BC0FD)
    8eae6000 8eaf2000 discache discache.sys Mon Jul 13 18:24:04 2009 (4A5BC214)
    8eaf2000 8eb56000 csc csc.sys Sat Nov 20 02:44:32 2010 (4CE78A70)
    8eb56000 8eb6e000 dfsc dfsc.sys Tue Jan 06 19:34:24 2015 (54AC8D20)
    8eb6e000 8eb7c000 blbdrive blbdrive.sys Mon Jul 13 18:23:04 2009 (4A5BC1D8)
    8eb7c000 8ebd3600 aswSP aswSP.SYS Mon Jan 13 19:02:38 2014 (52D48CAE)
    8ebd4000 8ebf5000 tunnel tunnel.sys Sat Nov 20 04:06:40 2010 (4CE79DB0)
    8fc0a000 90529000 igdkmd32 igdkmd32.sys Sat Oct 16 00:24:51 2010 (4CB93723)
    90529000 90584000 dlkmd dlkmd.sys Mon Jul 30 15:47:48 2012 (5016F2F4)
    90584000 905bd000 dxgmms1 dxgmms1.sys Sun Jun 15 19:42:07 2014 (539E3D5F)
    905bd000 905dc000 HDAudBus HDAudBus.sys Sat Nov 20 03:59:28 2010 (4CE79C00)
    905dc000 905fe000 ndiswan ndiswan.sys Sat Nov 20 04:07:48 2010 (4CE79DF4)
    94800000 94818000 rasl2tp rasl2tp.sys Mon Jul 13 18:54:33 2009 (4A5BC939)
    94818000 94823000 ndistapi ndistapi.sys Mon Jul 13 18:54:24 2009 (4A5BC930)
    94823000 9482d000 rdpbus rdpbus.sys Mon Jul 13 19:02:40 2009 (4A5BCB20)
    9482d000 9482e780 USBD USBD.SYS Tue Nov 26 19:13:33 2013 (5295473D)
    94833000 94918000 netr28 netr28.sys Thu Nov 04 07:58:13 2010 (4CD2ADE5)
    94918000 94922000 vwifibus vwifibus.sys Mon Jul 13 18:52:02 2009 (4A5BC8A2)
    94922000 9492d000 usbuhci usbuhci.sys Tue Nov 26 19:13:36 2013 (52954740)
    9492d000 94978000 USBPORT USBPORT.SYS Tue Nov 26 19:13:45 2013 (52954749)
    94978000 94987000 usbehci usbehci.sys Tue Nov 26 19:13:41 2013 (52954745)
    94987000 9498f000 OSDACPI OSDACPI.SYS Tue Jun 09 07:29:40 2009 (4A2E55B4)
    9498f000 94998000 wmiacpi wmiacpi.sys Mon Jul 13 18:19:16 2009 (4A5BC0F4)
    94998000 949a5000 CompositeBus CompositeBus.sys Sat Nov 20 03:50:21 2010 (4CE799DD)
    949a5000 949aa200 clwvd clwvd.sys Tue Jul 27 20:19:46 2010 (4C4F85B2)
    949ab000 949df000 ks ks.sys Sat Nov 20 03:50:17 2010 (4CE799D9)
    949df000 949f1000 AgileVpn AgileVpn.sys Mon Jul 13 18:55:00 2009 (4A5BC954)
    949f1000 949fe000 kbdclass kbdclass.sys Mon Jul 13 18:11:15 2009 (4A5BBF13)
    949fe000 949ff380 swenum swenum.sys Mon Jul 13 18:45:08 2009 (4A5BC704)
    95800000 95810000 lltdio lltdio.sys Mon Jul 13 18:53:18 2009 (4A5BC8EE)
    95814000 9584a000 vpchbus vpchbus.sys Sat Nov 20 04:50:40 2010 (4CE7A800)
    9584a000 9588e000 usbhub usbhub.sys Tue Nov 26 19:14:23 2013 (5295476F)
    9588e000 9589f000 NDProxy NDProxy.SYS Sat Nov 20 04:07:39 2010 (4CE79DEB)
    9589f000 959a0000 dump_iaStor dump_iaStor.sys Sat Nov 06 02:37:33 2010 (4CD505BD)
    959a0000 959b7000 usbccgp usbccgp.sys Tue Nov 26 19:13:44 2013 (52954748)
    959b7000 959dad80 usbvideo usbvideo.sys Fri Jul 12 05:08:19 2013 (51DFD593)
    959db000 959f6000 luafv luafv.sys Mon Jul 13 18:15:44 2009 (4A5BC020)
    97400000 97416000 ftser2k ftser2k.sys Wed Jun 27 08:04:11 2007 (4682604B)
    97416000 97420000 serenum serenum.sys Mon Jul 13 18:45:27 2009 (4A5BC717)
    9742a000 97734640 RTKVHDA RTKVHDA.sys Tue Sep 21 03:01:46 2010 (4C98666A)
    97735000 97764000 portcls portcls.sys Thu Oct 03 20:17:06 2013 (524E1712)
    97764000 9777d000 drmk drmk.sys Thu Oct 03 20:47:02 2013 (524E1E16)
    9777d000 97787000 Dxapi Dxapi.sys Mon Jul 13 18:25:25 2009 (4A5BC265)
    97787000 97794000 crashdmp crashdmp.sys Mon Jul 13 18:45:50 2009 (4A5BC72E)
    97794000 977a5000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 18:12:47 2009 (4A5BBF6F)
    977a5000 977b0000 monitor monitor.sys Mon Jul 13 18:25:58 2009 (4A5BC286)
    977b0000 977bb000 hidusb hidusb.sys Sat Nov 20 03:59:38 2010 (4CE79C0A)
    977bb000 977ce000 HIDCLASS HIDCLASS.SYS Tue Jul 02 22:36:24 2013 (51D39C38)
    977ce000 977d4480 HIDPARSE HIDPARSE.SYS Tue Jul 02 22:36:22 2013 (51D39C36)
    977d5000 977e1000 kbdhid kbdhid.sys Sat Nov 20 03:50:10 2010 (4CE799D2)
    977e1000 977eca80 ftdibus ftdibus.sys Wed Jun 27 08:05:49 2007 (468260AD)
    977ed000 977f8000 mouhid mouhid.sys Mon Jul 13 18:45:08 2009 (4A5BC704)
    977f8000 977fd080 aswFsBlk aswFsBlk.SYS Mon Jan 13 19:01:51 2014 (52D48C7F)
    97ad0000 97d29000 win32k win32k.sys Wed Feb 25 21:11:09 2015 (54EE8ECD)
    97d40000 97d49000 TSDDD TSDDD.dll Mon Jul 13 19:01:40 2009 (4A5BCAE4)
    97d70000 97d8e000 cdd cdd.dll Sun Jun 15 20:40:28 2014 (539E4B0C)
    97d90000 97dde000 ATMFD ATMFD.DLL Thu Feb 19 21:09:14 2015 (54E6A55A)
    abe3d000 abe60000 mrxsmb mrxsmb.sys Tue Jan 06 19:34:39 2015 (54AC8D2F)
    abe60000 abe9c000 mrxsmb10 mrxsmb10.sys Tue Jan 06 19:35:06 2015 (54AC8D4A)
    abe9c000 abeb8000 mrxsmb20 mrxsmb20.sys Tue Jan 06 19:34:42 2015 (54AC8D32)
    abed0000 abedb000 usbprint usbprint.sys Mon Jul 13 19:17:06 2009 (4A5BCE82)
    abedb000 abf73000 peauth peauth.sys Mon Feb 02 20:58:08 2015 (54D03940)
    abf73000 abf74500 regi regi.sys Mon Apr 16 10:19:05 2007 (462393E9)
    abf75000 abf7f000 secdrv secdrv.SYS Wed Sep 13 08:18:32 2006 (45080528)
    abf7f000 abfa0000 srvnet srvnet.sys Thu Apr 28 21:46:08 2011 (4DBA2670)
    abfa0000 abfad000 tcpipreg tcpipreg.sys Sat Nov 20 04:07:13 2010 (4CE79DD1)
    abfad000 abffd000 srv2 srv2.sys Thu Apr 28 21:46:13 2011 (4DBA2675)
    b6c34000 b6c86000 srv srv.sys Thu Apr 28 21:46:30 2011 (4DBA2686)
    b6c86000 b6cf0000 spsys spsys.sys Mon May 11 11:37:10 2009 (4A085436)

    Unloaded modules:
    abeb8000 abed0000 parport.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 00018000
    88dc4000 88dd1000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 0000D000
    8d801000 8d902000 dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 00101000
    8d902000 8d913000 dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 00011000
    Closing open log file c:debuglog.txt
     
  5. 2015/04/15
    melanieh

    melanieh Inactive Thread Starter

    Joined:
    2014/03/03
    Messages:
    73
    Likes Received:
    0
    Driver Verifier -
    I did set it up to run. Windows gave the options to Start Normally or Launch Startup Repair.
    I tried Start Normally, didn't work.
    I tried Startup Repair, twice, it attempted repairs but couldn't repair.
    Finally used the System Restore Point.

    Here is the dump after all of that:
    ____________________________________
    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\041515-20358-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
    Machine Name:
    Kernel base = 0x82c54000 PsLoadedModuleList = 0x82d9e5b0
    Debug session time: Wed Apr 15 09:35:42.741 2015 (UTC - 5:00)
    System Uptime: 0 days 0:00:07.130
    Loading Kernel Symbols
    ...............................................................
    ..............
    Loading User Symbols
    Unable to load image SASKUTIL.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for SASKUTIL.SYS
    *** ERROR: Module load completed but symbols could not be loaded for SASKUTIL.SYS
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000007E, {c0000005, 8c207503, 807868cc, 807864b0}

    Probably caused by : memory_corruption

    Followup: memory_corruption
    ---------

    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003. This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG. This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG. This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8c207503, The address that the exception occurred at
    Arg3: 807868cc, Exception Record Address
    Arg4: 807864b0, Context Record Address

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    SASKUTIL+7503
    8c207503 8b0c88 mov ecx,dword ptr [eax+ecx*4]

    EXCEPTION_RECORD: 807868cc -- (.exr 0xffffffff807868cc)
    .exr 0xffffffff807868cc
    ExceptionAddress: 8c207503 (SASKUTIL+0x00007503)
    ExceptionCode: c0000005 (Access violation)
    ExceptionFlags: 00000000
    NumberParameters: 2
    Parameter[0]: 00000000
    Parameter[1]: 34fa7d28
    Attempt to read from address 34fa7d28

    CONTEXT: 807864b0 -- (.cxr 0xffffffff807864b0)
    .cxr 0xffffffff807864b0
    eax=82cd252c ebx=00000000 ecx=ec8b55ff edx=82dbeb00 esi=8a95b5f8 edi=8b894000
    eip=8c207503 esp=80786994 ebp=80786994 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
    SASKUTIL+0x7503:
    8c207503 8b0c88 mov ecx,dword ptr [eax+ecx*4] ds:0023:34fa7d28=????????
    .cxr
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: CODE_CORRUPTION

    PROCESS_NAME: System

    CURRENT_IRQL: 0

    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    EXCEPTION_PARAMETER1: 00000000

    EXCEPTION_PARAMETER2: 34fa7d28

    READ_ADDRESS: Unable to read MiSystemVaType memory at 82d9df00
    34fa7d28

    FOLLOWUP_IP:
    SASKUTIL+7503
    8c207503 8b0c88 mov ecx,dword ptr [eax+ecx*4]

    BUGCHECK_STR: 0x7E

    LAST_CONTROL_TRANSFER: from 8c201fcc to 8c207503

    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    80786994 8c201fcc 002a0028 8c20f044 00000000 SASKUTIL+0x7503
    807869b8 82e18202 8a95b5f8 8b894000 00000000 SASKUTIL+0x1fcc
    80786b9c 8300750e 00000001 00000000 80786bd4 nt!IopLoadDriver+0x7ed
    80786be8 830071b1 00000007 8080a5c8 00000000 nt!IopInitializeSystemDrivers+0x163
    80786c6c 8300b1fa 0080a5c8 84d6ac10 84d6a8a0 nt!IoInitSystem+0x6de
    80786d48 82de14d9 80786d90 82e5e00f 8080a5c8 nt!Phase1InitializationDiscard+0xcf7
    80786d50 82e5e00f 8080a5c8 ab0bd728 00000000 nt!Phase1Initialization+0xd
    80786d90 82d04699 82de14cc 8080a5c8 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    !chkimg -lo 50 -d !nt
    82cd2550-82cd2553 4 bytes - nt!KiServiceTable+24

    [ 0e b2 f5 82:ae 78 63 8c ]
    82cd25d8-82cd25db 4 bytes - nt!KiServiceTable+ac (+0x88)

    [ 9e 4f e5 82:8c 83 63 8c ]
    82cd262c-82cd2633 8 bytes - nt!KiServiceTable+100 (+0x54)

    [ 6c 6a e9 82 1c 0f f6 82:1e 43 64 8c 6a 43 64 8c ]
    82cd2638-82cd263b 4 bytes - nt!KiServiceTable+10c (+0x0c)

    [ ee 0b eb 82:04 45 64 8c ]
    82cd2654-82cd2657 4 bytes - nt!KiServiceTable+128 (+0x1c)

    [ 6a 64 e6 82:8c 42 64 8c ]
    82cd267c-82cd2683 8 bytes - nt!KiServiceTable+150 (+0x28)

    [ 5b 92 e7 82 3e ba e5 82:ae 43 64 8c d4 42 64 8c ]
    82cd2688-82cd2693 12 bytes - nt!KiServiceTable+15c (+0x0c)

    [ 12 28 f3 82 6d 66 ec 82:8a 88 63 8c a6 8a 63 8c ]
    82cd26ac-82cd26af 4 bytes - nt!KiServiceTable+180 (+0x24)

    [ 5a 41 f0 82:42 91 63 8c ]
    82cd26bc-82cd26bf 4 bytes - nt!KiServiceTable+190 (+0x10)

    [ 3f b2 f5 82:14 79 63 8c ]
    82cd26e8-82cd26eb 4 bytes - nt!KiServiceTable+1bc (+0x2c)

    [ 7d 78 e8 82:be c8 63 8c ]
    82cd2798-82cd279b 4 bytes - nt!KiServiceTable+26c (+0xb0)

    [ 94 ba e1 82:fc 74 63 8c ]
    82cd27d0-82cd27d3 4 bytes - nt!KiServiceTable+2a4 (+0x38)

    [ 10 b4 f5 82:7a 79 63 8c ]
    82cd27dc-82cd27e3 8 bytes - nt!KiServiceTable+2b0 (+0x0c)

    [ 8f fe e4 82 b1 ef e4 82:b4 cc 63 8c d2 9b 63 8c ]
    82cd27f0-82cd27f7 8 bytes - nt!KiServiceTable+2c4 (+0x14)

    [ 66 5e e6 82 1d 10 f6 82:48 43 64 8c 8c 43 64 8c ]
    82cd27fc-82cd27ff 4 bytes - nt!KiServiceTable+2d0 (+0x0c)

    [ 21 d8 f0 82:28 45 64 8c ]
    82cd2818-82cd281b 4 bytes - nt!KiServiceTable+2ec (+0x1c)

    [ 09 76 eb 82:b2 42 64 8c ]
    82cd2824-82cd2827 4 bytes - nt!KiServiceTable+2f8 (+0x0c)

    [ b1 7c e6 82:b8 c1 63 8c ]
    82cd2834-82cd283b 8 bytes - nt!KiServiceTable+308 (+0x10)

    [ ab fb eb 82 ae b0 e3 82:3c 44 64 8c fc 42 64 8c ]
    82cd2844-82cd2847 4 bytes - nt!KiServiceTable+318 (+0x10)

    [ ae 42 eb 82:a0 c5 63 8c ]
    82cd2850-82cd2853 4 bytes - nt!KiServiceTable+324 (+0x0c)

    [ c3 0c f6 82:e2 44 64 8c ]
    82cd290c-82cd290f 4 bytes - nt!KiServiceTable+3e0 (+0xbc)

    [ 87 6f e5 82:9e 9a 63 8c ]
    82cd2964-82cd2967 4 bytes - nt!KiServiceTable+438 (+0x58)

    [ df de e4 82:ac 97 63 8c ]
    82cd2a14-82cd2a1f 12 bytes - nt!KiServiceTable+4e8 (+0xb0)

    [ 21 bb f5 82 0d c0 f5 82:e0 79 63 8c 46 7a 63 8c ]
    82cd2aa4-82cd2aab 8 bytes - nt!KiServiceTable+578 (+0x90)

    [ 28 45 ea 82 4a 7e f7 82:96 75 63 8c 6c 77 63 8c ]
    82cd2acc-82cd2acf 4 bytes - nt!KiServiceTable+5a0 (+0x28)

    [ 43 94 f5 82:fa 76 63 8c ]
    82cd2ae4-82cd2aef 12 bytes - nt!KiServiceTable+5b8 (+0x18)

    [ 13 45 f3 82 44 b4 ee 82:0c 93 63 8c 6e 94 63 8c ]
    82cd2af4-82cd2afb 8 bytes - nt!KiServiceTable+5c8 (+0x10)

    [ 46 0f eb 82 8a e8 ec 82:fa 8d 63 8c 9c 8f 63 8c ]
    82cd2b34-82cd2b37 4 bytes - nt!KiServiceTable+608 (+0x40)

    [ 63 e5 f4 82:ac 7a 63 8c ]
    82cd2b68-82cd2b6b 4 bytes - nt!KiServiceTable+63c (+0x34)

    [ 43 5c eb 82:e8 83 63 8c ]
    168 errors : !nt (82cd2550-82cd2b6b)

    MODULE_NAME: memory_corruption

    IMAGE_NAME: memory_corruption

    FOLLOWUP_NAME: memory_corruption

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    MEMORY_CORRUPTOR: LARGE

    STACK_COMMAND: .cxr 0xffffffff807864b0 ; kb

    FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

    BUCKET_ID: MEMORY_CORRUPTION_LARGE

    Followup: memory_corruption
    ---------

    eax=82cd252c ebx=00000000 ecx=ec8b55ff edx=82dbeb00 esi=8a95b5f8 edi=8b894000
    eip=8c207503 esp=80786994 ebp=80786994 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
    SASKUTIL+0x7503:
    8c207503 8b0c88 mov ecx,dword ptr [eax+ecx*4] ds:0023:34fa7d28=????????
    ChildEBP RetAddr Args to Child
    WARNING: Stack unwind information not available. Following frames may be wrong.
    80786994 8c201fcc 002a0028 8c20f044 00000000 SASKUTIL+0x7503
    807869b8 82e18202 8a95b5f8 8b894000 00000000 SASKUTIL+0x1fcc
    80786b9c 8300750e 00000001 00000000 80786bd4 nt!IopLoadDriver+0x7ed
    80786be8 830071b1 00000007 8080a5c8 00000000 nt!IopInitializeSystemDrivers+0x163
    80786c6c 8300b1fa 0080a5c8 84d6ac10 84d6a8a0 nt!IoInitSystem+0x6de
    80786d48 82de14d9 80786d90 82e5e00f 8080a5c8 nt!Phase1InitializationDiscard+0xcf7
    80786d50 82e5e00f 8080a5c8 ab0bd728 00000000 nt!Phase1Initialization+0xd
    80786d90 82d04699 82de14cc 8080a5c8 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    start end module name
    80b98000 80ba0000 kdcom kdcom.dll Mon Jul 13 20:08:58 2009 (4A5BDAAA)
    82c1d000 82c54000 hal halmacpi.dll Sat Nov 20 02:37:38 2010 (4CE788D2)
    82c54000 83068000 nt ntkrpamp.exe Mon Feb 02 20:11:13 2015 (54D02E41)
    83221000 832a6000 mcupdate mcupdate.dll Sat Nov 20 06:00:54 2010 (4CE7B876)
    832a6000 832b7000 PSHED PSHED.dll Mon Jul 13 20:09:36 2009 (4A5BDAD0)
    832b7000 832bf000 BOOTVID BOOTVID.dll Mon Jul 13 20:04:34 2009 (4A5BD9A2)
    832bf000 83301000 CLFS CLFS.SYS Mon Jul 13 18:11:10 2009 (4A5BBF0E)
    83301000 83368000 CI CI.dll Thu Jun 26 20:42:04 2014 (53ACCBEC)
    83368000 833e9000 Wdf01000 Wdf01000.sys Fri Jun 21 21:29:37 2013 (51C50C11)
    833e9000 833f7000 WDFLDR WDFLDR.SYS Wed Jul 25 21:36:38 2012 (5010AD36)
    84e19000 84e61000 ACPI ACPI.sys Sat Nov 20 02:37:52 2010 (4CE788E0)
    84e61000 84e6a000 WMILIB WMILIB.SYS Mon Jul 13 18:11:22 2009 (4A5BBF1A)
    84e6a000 84e72000 msisadrv msisadrv.sys Mon Jul 13 18:11:09 2009 (4A5BBF0D)
    84e72000 84e9c000 pci pci.sys Sat Nov 20 02:37:57 2010 (4CE788E5)
    84e9c000 84ea7000 vdrvroot vdrvroot.sys Mon Jul 13 18:46:19 2009 (4A5BC74B)
    84ea7000 84eb8000 partmgr partmgr.sys Sat Mar 17 00:03:08 2012 (4F641B0C)
    84eb8000 84ec8000 volmgr volmgr.sys Sat Nov 20 02:38:06 2010 (4CE788EE)
    84ec8000 84f13000 volmgrx volmgrx.sys Mon Jul 13 18:11:41 2009 (4A5BBF2D)
    84f13000 84f29000 mountmgr mountmgr.sys Mon Feb 02 19:58:34 2015 (54D02B4A)
    84f29000 84f52180 vmbus vmbus.sys Sat Nov 20 03:14:58 2010 (4CE79192)
    84f53000 84f65000 winhv winhv.sys Sat Nov 20 02:38:15 2010 (4CE788F7)
    8501e000 8511f000 iaStor iaStor.sys Sat Nov 06 02:37:33 2010 (4CD505BD)
    8511f000 85128000 amdxata amdxata.sys Fri Mar 19 11:19:01 2010 (4BA3A3F5)
    85128000 8515c000 fltmgr fltmgr.sys Mon Jul 13 18:11:13 2009 (4A5BBF11)
    8515c000 8516d000 fileinfo fileinfo.sys Mon Jul 13 18:21:51 2009 (4A5BC18F)
    8516d000 851b3900 vpcvmm vpcvmm.sys Sat Nov 20 04:50:38 2010 (4CE7A7FE)
    85200000 85209000 aswKbd aswKbd.sys Mon Jan 13 19:02:22 2014 (52D48C9E)
    85209000 85212000 Fs_Rec Fs_Rec.sys Wed Feb 29 21:21:26 2012 (4F4EEB36)
    85226000 85355000 Ntfs Ntfs.sys Fri Apr 12 06:31:55 2013 (5167F0AB)
    85355000 85380000 msrpc msrpc.sys Mon Jul 13 18:11:59 2009 (4A5BBF3F)
    85380000 85393000 ksecdd ksecdd.sys Thu Mar 05 22:02:34 2015 (54F926DA)
    85393000 853f0000 cng cng.sys Thu Jan 29 21:01:12 2015 (54CAF3F8)
    853f0000 853fe000 pcw pcw.sys Mon Jul 13 18:11:10 2009 (4A5BBF0E)
    85404000 854bb000 ndis ndis.sys Sat Nov 20 02:39:19 2010 (4CE78937)
    854bb000 854f9000 NETIO NETIO.SYS Tue Nov 26 04:01:51 2013 (5294718F)
    854f9000 8551f000 ksecpkg ksecpkg.sys Thu Mar 05 22:17:27 2015 (54F92A57)
    8551f000 8554c000 rdyboost rdyboost.sys Sat Nov 20 03:00:07 2010 (4CE78E17)
    8554c000 8557e000 fvevol fvevol.sys Sat Nov 20 02:40:22 2010 (4CE78976)
    8557e000 8558f000 disk disk.sys Mon Jul 13 18:11:28 2009 (4A5BBF20)
    8558f000 855b4000 CLASSPNP CLASSPNP.SYS Mon Jul 13 18:11:20 2009 (4A5BBF18)
    855b4000 855bdc00 aswRvrt aswRvrt.sys Mon Jan 13 19:01:27 2014 (52D48C67)
    855be000 855cb000 crashdmp crashdmp.sys Mon Jul 13 18:45:50 2009 (4A5BC72E)
    85600000 85608000 hwpolicy hwpolicy.sys Sat Nov 20 02:37:35 2010 (4CE788CF)
    85608000 8560f000 dlkmdldr dlkmdldr.sys Mon Jul 30 15:45:41 2012 (5016F275)
    85613000 8575f000 tcpip tcpip.sys Fri Apr 04 20:10:29 2014 (533F5805)
    8575f000 85790000 fwpkclnt fwpkclnt.sys Fri Apr 04 20:08:43 2014 (533F579B)
    85790000 85798380 vmstorfl vmstorfl.sys Sat Nov 20 03:14:37 2010 (4CE7917D)
    85799000 857d8000 volsnap volsnap.sys Sat Nov 20 02:38:13 2010 (4CE788F5)
    857d8000 857e0000 spldr spldr.sys Mon May 11 11:13:47 2009 (4A084EBB)
    857e0000 857f9000 mup mup.sys Tue Jan 06 19:34:31 2015 (54AC8D27)
    8c200000 8c222000 SASKUTIL SASKUTIL.SYS Tue Jul 12 15:24:48 2011 (4E1CAD90)
    8c22c000 8c32d000 dump_iaStor dump_iaStor.sys Sat Nov 06 02:37:33 2010 (4CD505BD)
    8c32d000 8c33e000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 18:12:47 2009 (4A5BBF6F)
    8c33e000 8c35d000 cdrom cdrom.sys Sat Nov 20 02:38:09 2010 (4CE788F1)
    8c35d000 8c38f000 netbt netbt.sys Sat Nov 20 02:39:22 2010 (4CE7893A)
    8c38f000 8c3a0000 vwififlt vwififlt.sys Mon Jul 13 18:52:03 2009 (4A5BC8A3)
    8c3a0000 8c3b0000 vpcnfltr vpcnfltr.sys Sat Nov 20 04:50:36 2010 (4CE7A7FC)
    8c3b0000 8c3be000 netbios netbios.sys Mon Jul 13 18:53:54 2009 (4A5BC912)
    8c3be000 8c3d1000 wanarp wanarp.sys Sat Nov 20 04:07:45 2010 (4CE79DF1)
    8c3d1000 8c3e2000 termdd termdd.sys Sat Nov 20 04:21:10 2010 (4CE7A116)
    8c600000 8c61f000 pacer pacer.sys Mon Jul 13 18:53:58 2009 (4A5BC916)
    8c61f000 8c6df000 aswSnx aswSnx.SYS Mon Nov 24 06:45:48 2014 (5473287C)
    8c6df000 8c6e6000 Null Null.SYS Mon Jul 13 18:11:12 2009 (4A5BBF10)
    8c6e6000 8c6ed000 Beep Beep.SYS Mon Jul 13 18:45:00 2009 (4A5BC6FC)
    8c6ed000 8c6f9000 vga vga.sys Mon Jul 13 18:25:50 2009 (4A5BC27E)
    8c6f9000 8c71a000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 18:25:49 2009 (4A5BC27D)
    8c71a000 8c727000 watchdog watchdog.sys Mon Jul 13 18:24:10 2009 (4A5BC21A)
    8c727000 8c72f000 RDPCDD RDPCDD.sys Sat Nov 20 04:22:19 2010 (4CE7A15B)
    8c72f000 8c737000 rdpencdd rdpencdd.sys Mon Jul 13 19:01:39 2009 (4A5BCAE3)
    8c737000 8c73f000 rdprefmp rdprefmp.sys Mon Jul 13 19:01:41 2009 (4A5BCAE5)
    8c73f000 8c74a000 Msfs Msfs.SYS Mon Jul 13 18:11:26 2009 (4A5BBF1E)
    8c74a000 8c758000 Npfs Npfs.SYS Mon Jul 13 18:11:31 2009 (4A5BBF23)
    8c758000 8c76f000 tdx tdx.sys Sat Nov 20 02:39:17 2010 (4CE78935)
    8c76f000 8c77b000 TDI TDI.SYS Sat Nov 20 02:39:18 2010 (4CE78936)
    8c77b000 8c787f00 aswTdi aswTdi.SYS Mon Jan 13 19:01:59 2014 (52D48C87)
    8c788000 8c7e2000 afd afd.sys Fri May 30 01:36:06 2014 (538826D6)
    8c7e2000 8c7f2000 aswrdr2 aswrdr2.sys Mon Jan 13 19:02:14 2014 (52D48C96)
    8c7f2000 8c7f9000 wfplwf wfplwf.sys Mon Jul 13 18:53:51 2009 (4A5BC90F)
    Closing open log file c:debuglog.txt
     
  6. 2015/04/17
    melanieh

    melanieh Inactive Thread Starter

    Joined:
    2014/03/03
    Messages:
    73
    Likes Received:
    0
    Any ideas on what I should do at this point forward?
     
  7. 2015/04/17
    Evan Omo

    Evan Omo Computer Support Technician Staff

    Joined:
    2006/09/10
    Messages:
    7,901
    Likes Received:
    510
    Hi melanieh.

    Lets start by checking your memory. Run Memtest86+ and see if you have any faulty RAM modules. Read this guide for using Memtest86+, Guide to using Memtest86+.

    Please note:

    To work around the above, test the installed RAM in various configurations. If you have a single module, swap it around the slots. If you have a pair of modules, run each one singly, swapping between slots; and then run them in pairs swapping between pairs of slots. If you have 2 sets of matched modules do not get them mixed up.

    If your memory checks out then run Check Disk on the hard drive to repair any file system errors.

    To do this click Start< Computer. Right click on your hard drive and click on Properties. Then once the hard drive properties dialog box opens, click on the Tools Tab. Under where it says Error-checking click on the Check Now button. Ensure that both the Automatically fix file system errors and the Scan for and attempt recovery of bad sectors checkboxes are both checked. After that is done click on the Start button. Check Disk will ask you to schedule the disk check when you restart your computer. Click on yes to do this and then restart your computer to allow check disk to run.

    Then you should test your hard drive using SeaTools for Windows. Run all the basic tests and see what comes up.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.