1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Windows Vista Random blue screen crash, cdd.dll.

Discussion in 'Legacy Windows' started by onefistedboxer, 2007/09/12.

  1. 2007/09/12
    onefistedboxer

    onefistedboxer Inactive Thread Starter

    Joined:
    2007/09/12
    Messages:
    2
    Likes Received:
    0
    The crash in question appears as a sudden restart, and is described by Windows as a blue screen crash. It has appeared during games and upon their startup, but not when the pc is idle.

    My system is very new so i couldn't point to one change which has brought this on, but i can confirm that i have experienced no graphical errors and the PC's performance seems to be as fast as it should be.

    I have used the windows debugging tool to analyze the dump file, but i do not have the symbols (downloading now):
    Microsoft (R) Windows Debugger Version 6.7.0005.1
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini091207-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: *** Invalid ***
    ****************************************************************************
    * Symbol loading may be unreliable without a symbol search path. *
    * Use .symfix to have the debugger choose a symbol path. *
    * After setting your symbol path, use .reload to refresh symbol locations. *
    ****************************************************************************
    Executable search path is:
    *********************************************************************
    * Symbols can not be loaded because symbol path is not initialized. *
    * *
    * The Symbol Path can be set by: *
    * using the _NT_SYMBOL_PATH environment variable. *
    * using the -y <symbol_path> argument when starting the debugger. *
    * using .sympath and .sympath+ *
    *********************************************************************
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
    Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Kernel base = 0x82800000 PsLoadedModuleList = 0x82908ab0
    Debug session time: Wed Sep 12 18:33:03.035 2007 (GMT+1)
    System Uptime: 0 days 1:38:12.941
    *********************************************************************
    * Symbols can not be loaded because symbol path is not initialized. *
    * *
    * The Symbol Path can be set by: *
    * using the _NT_SYMBOL_PATH environment variable. *
    * using the -y <symbol_path> argument when starting the debugger. *
    * using .sympath and .sympath+ *
    *********************************************************************
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
    Loading Kernel Symbols
    ...........................................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000000A, {41c4, 2, 1, 828a0adb}

    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    *** WARNING: Unable to verify timestamp for cdd.dll
    *** ERROR: Module load completed but symbols could not be loaded for cdd.dll
    ***** Kernel symbols are WRONG. Please fix symbols to do analysis.

    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    Probably caused by : cdd.dll ( cdd+1f5c )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000041c4, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 828a0adb, address which referenced memory

    Debugging Details:
    ------------------

    ***** Kernel symbols are WRONG. Please fix symbols to do analysis.

    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************
    *************************************************************************
    *** ***
    *** ***
    *** Your debugger is not using the correct symbols ***
    *** ***
    *** In order for this command to work properly, your symbol path ***
    *** must point to .pdb files that have full type information. ***
    *** ***
    *** Certain .pdb files (such as the public OS symbols) do not ***
    *** contain the required information. Contact the group that ***
    *** provided you with these symbols if you need this command to ***
    *** work. ***
    *** ***
    *** Type referenced: nt!_KPRCB ***
    *** ***
    *************************************************************************

    MODULE_NAME: cdd

    FAULTING_MODULE: 82800000 nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 4689afa7

    WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
    unable to get nt!MmSpecialPoolEnd
    unable to get nt!MmPoolCodeStart
    unable to get nt!MmPoolCodeEnd
    000041c4

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt+a0adb
    828a0adb 890a mov dword ptr [edx],ecx

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: WRONG_SYMBOLS

    BUGCHECK_STR: 0xA

    LAST_CONTROL_TRANSFER: from 828a0901 to 828a0adb

    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    94469634 828a0901 00000000 ffffffff ffffffff nt+0xa0adb
    94469680 8286e07f 2e90cc8c fe138308 00000080 nt+0xa0901
    944696b4 82887ae7 00000001 fe138308 97486518 nt+0x6e07f
    944696f0 828596c4 00000001 fe138308 c03f84e0 nt+0x87ae7
    944697b0 82857f18 fe138308 97486518 00000000 nt+0x596c4
    94469820 82849084 00000001 fe138308 00000000 nt+0x57f18
    94469838 9c6e7073 badb0d00 00000000 94469bd0 nt+0x49084
    944698b4 9c71aae8 fe138308 0bf78320 000010e0 win32k+0xe7073
    944698d8 9c6e85f7 00000129 94daec51 94469c18 win32k+0x11aae8
    94469b18 9c685a10 feda4018 ff864620 94469b44 win32k+0xe85f7
    94469c80 9c685b49 00000001 ffbadb08 00000000 win32k+0x85a10
    94469cfc 82845f7a 790111c3 00000000 00000000 win32k+0x85b49
    94469d44 779a0f34 badb0d00 01ffe584 ff00f8b7 nt+0x45f7a
    94469d48 badb0d00 01ffe584 ff00f8b7 ff864af0 0x779a0f34
    94469d4c 01ffe584 ff00f8b7 ff864af0 9c411f5c 0xbadb0d00
    94469d50 ff00f8b7 ff864af0 9c411f5c 9c412004 0x1ffe584
    94469d54 ff864af0 9c411f5c 9c412004 9c412024 0xff00f8b7
    94469d58 9c411f5c 9c412004 9c412024 73727363 0xff864af0
    94469d5c 9c412004 9c412024 73727363 78652e73 cdd+0x1f5c
    94469d60 9c412024 73727363 78652e73 00000000 cdd+0x2004
    94469d64 73727363 78652e73 00000000 00000000 cdd+0x2024
    94469d68 78652e73 00000000 00000000 94db0023 0x73727363
    94469d6c 00000000 00000000 94db0023 94460023 0x78652e73


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    cdd+1f5c
    9c411f5c ?? ???

    SYMBOL_STACK_INDEX: 12

    FOLLOWUP_NAME: MachineOwner

    IMAGE_NAME: cdd.dll

    SYMBOL_NAME: cdd+1f5c

    BUCKET_ID: WRONG_SYMBOLS

    Followup: MachineOwner
    ---------

    The dump points to cdd.dll, which i understand is a system file, does this mean that the problem is hardware related, and how can i confirm/disprove this.
     
  2. 2007/09/12
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    onefistedboxer - Welcome to the Board :)

    Your dump log is incomplete and has a symbol problem. Please use our Dump Data Collection tool and post a fresh log .....

    http://www.windowsbbs.com/showthread.php?t=33471

    Footnote .....

    Unfortunately these logs require expert knowledge to analyze and there are only 2 members (who occasionally visit WindowsBBS.com) that have the depth of knowledge necessary. Other members can make observations and suggestions as to how you might proceed toward finding the cause ....
     

  3. to hide this advert.

  4. 2007/09/12
    onefistedboxer

    onefistedboxer Inactive Thread Starter

    Joined:
    2007/09/12
    Messages:
    2
    Likes Received:
    0
    Thanks for the quick reply!

    Heres the new log, would you like me to edit out the previous one to save space?

    Opened log file 'c:\debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.7.0005.1
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini091207-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6000.16514.x86fre.vista_gdr.070627-1500
    Kernel base = 0x82800000 PsLoadedModuleList = 0x82908ab0
    Debug session time: Wed Sep 12 18:33:03.035 2007 (GMT+1)
    System Uptime: 0 days 1:38:12.941
    Loading Kernel Symbols
    ...........................................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000000A, {41c4, 2, 1, 828a0adb}

    Probably caused by : win32k.sys ( win32k!memmove+33 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000041c4, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 828a0adb, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829275a0
    Unable to read MiSystemVaType memory at 82908680
    000041c4

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!MiCheckForControlAreaDeletion+3e
    828a0adb 890a mov dword ptr [edx],ecx

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: etqw.exe

    TRAP_FRAME: 94469838 -- (.trap 0xffffffff94469838)
    .trap 0xffffffff94469838
    ErrCode = 00000002
    eax=0bf79400 ebx=fe138308 ecx=00000438 edx=00000000 esi=0bf78320 edi=fe138308
    eip=9c6e7073 esp=944698ac ebp=944698b4 iopl=0 nv up ei pl nz na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
    win32k!memmove+0x33:
    9c6e7073 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] es:0023:fe138308=???????? ds:0023:0bf78320=????????
    .trap
    Resetting default scope

    LAST_CONTROL_TRANSFER: from 82883cd9 to 828a0adb

    STACK_TEXT:
    94469600 82883cd9 82909020 852c2858 00072c59 nt!MiCheckForControlAreaDeletion+0x3e
    94469634 828a0901 00000000 ffffffff ffffffff nt!MiRestoreTransitionPte+0x10d
    94469648 828a0856 000001aa 85400c00 ffffffff nt!MiRemoveStandbyPage+0x88
    94469658 82862ba7 000001aa 8d7fed70 00000000 nt!MiRemoveLowestPriorityStandbyPage+0x24
    94469680 8286e07f 2e90cc8c fe138308 00000080 nt!MiRemovePageZeroPreferred+0xe5
    944696b4 82887ae7 00000001 fe138308 97486518 nt!MiResolveDemandZeroFault+0x256
    944696f0 828596c4 00000001 fe138308 c03f84e0 nt!MiResolveProtoPteFault+0x381
    944697b0 82857f18 fe138308 97486518 00000000 nt!MiDispatchFault+0x891
    94469820 82849084 00000001 fe138308 00000000 nt!MmAccessFault+0xe36
    94469820 9c6e7073 00000001 fe138308 00000000 nt!KiTrap0E+0xdc
    944698b4 9c71aae8 fe138308 0bf78320 000010e0 win32k!memmove+0x33
    944698d8 9c6e85f7 00000129 94daec51 94469c18 win32k!vSrcCopyS24D24Identity+0x56
    94469b18 9c685a10 feda4018 ff864620 94469b44 win32k!EngCopyBits+0x5b3
    94469c80 9c685b49 00000001 ffbadb08 00000000 win32k!GreSetDIBitsToDeviceInternal+0xa1d
    94469cfc 82845f7a 790111c3 00000000 00000000 win32k!NtGdiSetDIBitsToDeviceInternal+0xc4
    94469cfc 779a0f34 790111c3 00000000 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    01ffe640 00000000 00000000 00000000 00000000 0x779a0f34


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    win32k!memmove+33
    9c6e7073 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]

    SYMBOL_STACK_INDEX: a

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: win32k

    IMAGE_NAME: win32k.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 45d3cc1d

    SYMBOL_NAME: win32k!memmove+33

    FAILURE_BUCKET_ID: 0xA_W_win32k!memmove+33

    BUCKET_ID: 0xA_W_win32k!memmove+33

    Followup: MachineOwner
    ---------

    eax=87215c94 ebx=852c2858 ecx=8721433c edx=000041c4 esi=92d2f158 edi=00000fff
    eip=828a0adb esp=94469600 ebp=94469634 iopl=0 nv up ei pl nz na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
    nt!MiCheckForControlAreaDeletion+0x3e:
    828a0adb 890a mov dword ptr [edx],ecx ds:0023:000041c4=????????
    ChildEBP RetAddr Args to Child
    94469600 82883cd9 82909020 852c2858 00072c59 nt!MiCheckForControlAreaDeletion+0x3e (FPO: [0,1,0])
    94469634 828a0901 00000000 ffffffff ffffffff nt!MiRestoreTransitionPte+0x10d
    94469648 828a0856 000001aa 85400c00 ffffffff nt!MiRemoveStandbyPage+0x88 (FPO: [0,1,2])
    94469658 82862ba7 000001aa 8d7fed70 00000000 nt!MiRemoveLowestPriorityStandbyPage+0x24 (FPO: [0,1,2])
    94469680 8286e07f 2e90cc8c fe138308 00000080 nt!MiRemovePageZeroPreferred+0xe5
    944696b4 82887ae7 00000001 fe138308 97486518 nt!MiResolveDemandZeroFault+0x256
    944696f0 828596c4 00000001 fe138308 c03f84e0 nt!MiResolveProtoPteFault+0x381
    944697b0 82857f18 fe138308 97486518 00000000 nt!MiDispatchFault+0x891
    94469820 82849084 00000001 fe138308 00000000 nt!MmAccessFault+0xe36
    94469820 9c6e7073 00000001 fe138308 00000000 nt!KiTrap0E+0xdc (FPO: [0,0] TrapFrame @ 94469838)
    944698b4 9c71aae8 fe138308 0bf78320 000010e0 win32k!memmove+0x33
    944698d8 9c6e85f7 00000129 94daec51 94469c18 win32k!vSrcCopyS24D24Identity+0x56 (FPO: [Non-Fpo])
    94469b18 9c685a10 feda4018 ff864620 94469b44 win32k!EngCopyBits+0x5b3 (FPO: [Non-Fpo])
    94469c80 9c685b49 00000001 ffbadb08 00000000 win32k!GreSetDIBitsToDeviceInternal+0xa1d (FPO: [Non-Fpo])
    94469cfc 82845f7a 790111c3 00000000 00000000 win32k!NtGdiSetDIBitsToDeviceInternal+0xc4 (FPO: [Non-Fpo])
    94469cfc 779a0f34 790111c3 00000000 00000000 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 94469d44)
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    01ffe640 00000000 00000000 00000000 00000000 0x779a0f34
    start end module name
    80402000 80403480 speedfan speedfan.sys Sun Sep 24 14:28:47 2006 (4516880F)
    80404000 80412000 PCIIDEX PCIIDEX.SYS Thu Nov 02 08:51:34 2006 (4549B196)
    80412000 80419000 intelide intelide.sys Thu Nov 02 08:51:35 2006 (4549B197)
    80419000 80429000 mountmgr mountmgr.sys Thu Nov 02 08:51:06 2006 (4549B17A)
    80429000 80438000 volmgr volmgr.sys Thu Nov 02 08:51:44 2006 (4549B1A0)
    80438000 8045d000 pci pci.sys Thu Nov 02 08:35:13 2006 (4549ADC1)
    8045d000 80465000 msisadrv msisadrv.sys Thu Nov 02 08:35:08 2006 (4549ADBC)
    80465000 8046e000 WMILIB WMILIB.SYS Thu Nov 02 08:54:53 2006 (4549B25D)
    8046e000 804b1000 acpi acpi.sys Thu Nov 02 08:35:03 2006 (4549ADB7)
    804b1000 804be000 WDFLDR WDFLDR.SYS Thu Nov 02 08:54:05 2006 (4549B22D)
    804be000 80539000 Wdf01000 Wdf01000.sys Thu Nov 02 08:54:18 2006 (4549B23A)
    80539000 8061a000 CI CI.dll Thu Nov 02 09:42:45 2006 (4549BD95)
    8061a000 80655000 CLFS CLFS.SYS Thu Nov 02 08:30:52 2006 (4549ACBC)
    80655000 8065d000 BOOTVID BOOTVID.dll Thu Nov 02 09:39:29 2006 (4549BCD1)
    8065d000 80666000 PSHED PSHED.dll Thu Nov 02 09:42:51 2006 (4549BD9B)
    80666000 806c6000 mcupdate mcupdate.dll Tue Apr 24 04:40:05 2007 (462D7C15)
    806c6000 806ce000 kdcom kdcom.dll Thu Nov 02 09:42:20 2006 (4549BD7C)
    806ce000 806ce680 giveio giveio.sys Thu Apr 04 03:33:25 1996 (316334F5)
    82800000 82b95000 nt ntkrnlmp.exe Thu Jun 28 02:01:03 2007 (4683084F)
    82b95000 82bc9000 hal halmacpi.dll Thu Nov 02 08:30:18 2006 (4549AC9A)
    83002000 8300b000 crcdisk crcdisk.sys Thu Nov 02 08:52:27 2006 (4549B1CB)
    8300b000 8301c000 disk disk.sys Thu Nov 02 08:51:40 2006 (4549B19C)
    8301c000 83041000 ecache ecache.sys Thu Nov 02 08:52:42 2006 (4549B1DA)
    83041000 83050000 mup mup.sys Thu Nov 02 08:31:04 2006 (4549ACC8)
    83050000 8305f000 partmgr partmgr.sys Thu Nov 02 08:51:47 2006 (4549B1A3)
    8305f000 83067000 spldr spldr.sys Wed Oct 25 23:40:44 2006 (453FE7EC)
    83067000 8309d000 volsnap volsnap.sys Thu Nov 02 08:52:11 2006 (4549B1BB)
    8309d000 83107000 ksecdd ksecdd.sys Thu Nov 02 08:43:45 2006 (4549AFC1)
    83107000 83140000 NETIO NETIO.SYS Thu Nov 02 08:58:01 2006 (4549B319)
    83140000 83141000 msrpc msrpc.sys unavailable (00000000)
    8316b000 8326f000 ndis ndis.sys Thu Nov 02 08:57:33 2006 (4549B2FD)
    8326f000 83277b60 PxHelp20 PxHelp20.sys Wed Aug 09 18:27:31 2006 (44DA1B03)
    83278000 83288000 fileinfo fileinfo.sys Thu Nov 02 08:36:47 2006 (4549AE1F)
    83288000 832b9000 fltmgr fltmgr.sys Thu Nov 02 08:30:58 2006 (4549ACC2)
    832b9000 832c2000 msahci msahci.sys Thu Nov 02 08:51:36 2006 (4549B198)
    832c2000 832e0000 ataport ataport.SYS Thu Nov 02 08:51:34 2006 (4549B196)
    832e0000 832e8000 atapi atapi.sys Thu Nov 02 08:51:34 2006 (4549B196)
    832e8000 833af000 iaStor iaStor.sys Thu Jul 12 23:59:22 2007 (4696B24A)
    833af000 833f9000 volmgrx volmgrx.sys Thu Nov 02 08:51:54 2006 (4549B1AA)
    833f9000 83400000 pciide pciide.sys Thu Nov 02 08:51:35 2006 (4549B197)
    83504000 83513000 termdd termdd.sys Thu Nov 02 09:02:00 2006 (4549B408)
    836d7000 836f8000 CLASSPNP CLASSPNP.SYS Thu Nov 02 08:51:34 2006 (4549B196)
    836f8000 83800000 Ntfs Ntfs.sys Thu Nov 02 08:31:39 2006 (4549ACEB)
    89441000 89453000 HDAudBus HDAudBus.sys Sat Mar 24 18:54:34 2007 (460573EA)
    8951c000 8952b000 monitor monitor.sys Thu Nov 02 08:54:05 2006 (4549B22D)
    895fd000 8960c000 raspppoe raspppoe.sys Thu Nov 02 08:58:12 2006 (4549B324)
    8bc17000 8bc4a000 yk60x86 yk60x86.sys Mon Oct 02 08:05:41 2006 (4520BA45)
    8bc4a000 8bce7000 dxgkrnl dxgkrnl.sys Tue Jul 03 02:01:10 2007 (46899FD6)
    8bd18000 8bd30000 cdrom cdrom.sys Thu Nov 02 08:51:44 2006 (4549B1A0)
    8bd30000 8bd5a000 ks ks.sys Thu Nov 02 08:51:18 2006 (4549B186)
    8bd5a000 8bd97000 USBPORT USBPORT.SYS Thu Nov 02 08:55:09 2006 (4549B26D)
    8bdce000 8bdd9000 TDI TDI.SYS Thu Nov 02 08:58:46 2006 (4549B346)
    8bdd9000 8bde4000 ndistapi ndistapi.sys Wed Jul 04 02:28:09 2007 (468AF7A9)
    8bde4000 8bdef000 kbdclass kbdclass.sys Thu Nov 02 08:51:09 2006 (4549B17D)
    8bdef000 8bdfa000 mouclass mouclass.sys Thu Nov 02 08:51:09 2006 (4549B17D)
    8be05000 8be10000 hidir hidir.sys Thu Nov 02 08:55:01 2006 (4549B265)
    8be10000 8be1b000 tcpipreg tcpipreg.sys Thu Nov 02 08:57:46 2006 (4549B30A)
    8be59000 8be7a000 VIDEOPRT VIDEOPRT.SYS Thu Nov 02 08:54:07 2006 (4549B22F)
    8be7a000 8be94000 serial serial.sys Thu Nov 02 08:51:29 2006 (4549B191)
    8be94000 8bf38900 3xHybrid 3xHybrid.sys Fri Apr 20 06:34:48 2007 (462850F8)
    8bf51000 8bf67000 cdfs cdfs.sys Thu Nov 02 08:30:50 2006 (4549ACBA)
    8bf67000 8bfb4000 RTL8187 RTL8187.sys Wed Jul 18 08:56:13 2007 (469DC79D)
    8bfb4000 8bfca000 usbcir usbcir.sys Thu Nov 02 08:55:08 2006 (4549B26C)
    8bfca000 8bfe8e80 SaiHFFB5 SaiHFFB5.sys Tue May 01 11:56:13 2007 (46371CCD)
    8bfe9000 8c000000 usbccgp usbccgp.sys Thu Nov 02 08:55:11 2006 (4549B26F)
    8c420000 8c437000 rasl2tp rasl2tp.sys Thu Nov 02 08:58:13 2006 (4549B325)
    8c448000 8c47c000 usbhub usbhub.sys Thu Nov 02 08:55:20 2006 (4549B278)
    8c4f4000 8c501000 umbus umbus.sys Thu Nov 02 08:55:24 2006 (4549B27C)
    8c501000 8c50e000 crashdmp crashdmp.sys Thu Nov 02 08:51:36 2006 (4549B198)
    8c55d000 8c59c000 HdAudio HdAudio.sys Thu Nov 02 01:43:11 2006 (45494D2F)
    8c59c000 8c5af000 raspptp raspptp.sys Thu Nov 02 08:58:14 2006 (4549B326)
    8c5af000 8c5d2000 ndiswan ndiswan.sys Thu Nov 02 08:58:13 2006 (4549B325)
    8c5d2000 8c612000 storport storport.sys Thu Nov 02 08:51:45 2006 (4549B1A1)
    8c622000 8c647000 drmk drmk.sys Thu Nov 02 09:20:49 2006 (4549B871)
    8c647000 8c674000 portcls portcls.sys Thu Nov 02 08:55:02 2006 (4549B266)
    8c688000 8c69b000 wanarp wanarp.sys Wed Jul 04 02:28:16 2007 (468AF7B0)
    8c69b000 8c6b1000 pacer pacer.sys Wed Jul 04 02:27:33 2007 (468AF785)
    8c6b1000 8c6f8000 afd afd.sys Thu Nov 02 08:58:41 2006 (4549B341)
    8c6f8000 8c70c000 smb smb.sys Thu Nov 02 08:57:10 2006 (4549B2E6)
    8c70c000 8c721000 tdx tdx.sys Thu Nov 02 08:57:34 2006 (4549B2FE)
    8c721000 8c73a000 fwpkclnt fwpkclnt.sys Thu Nov 02 08:57:26 2006 (4549B2F6)
    8c7d9000 8c7f0000 dfsc dfsc.sys Thu Nov 02 08:31:04 2006 (4549ACC8)
    8ce53000 8ce66000 rspndr rspndr.sys Thu Nov 02 08:56:48 2006 (4549B2D0)
    8d075000 8d089000 mpsdrv mpsdrv.sys Thu Jun 07 03:55:55 2007 (466773BB)
    8d089000 8d0c4000 rdbss rdbss.sys Thu Nov 02 08:31:24 2006 (4549ACDC)
    8d0c4000 8d0f6000 netbt netbt.sys Thu Nov 02 08:57:18 2006 (4549B2EE)
    8d0f6000 8d1c7000 tcpip tcpip.sys Thu Nov 02 08:58:31 2006 (4549B337)
    8d2b0000 8d2cb000 luafv luafv.sys Thu Nov 02 08:33:07 2006 (4549AD43)
    8d30b000 8d3d2000 dump_iastor dump_iastor.sys Thu Jul 12 23:59:22 2007 (4696B24A)
    8d519000 8d6f3e40 RTKVHDA RTKVHDA.sys Wed Aug 22 11:44:12 2007 (46CC137C)
    9407b000 94083000 RDPCDD RDPCDD.sys Thu Nov 02 09:02:01 2006 (4549B409)
    94083000 9408b000 rdpencdd rdpencdd.sys Thu Nov 02 09:02:01 2006 (4549B409)
    9408b000 94093000 mouhid mouhid.sys Thu Nov 02 08:51:12 2006 (4549B180)
    94093000 9409a200 LMouFilt LMouFilt.Sys Thu Apr 12 00:28:23 2007 (461D6F17)
    944b9000 944bb0a0 CDAC15BA CDAC15BA.SYS Fri Jul 27 17:54:52 2001 (3B619CDC)
    94795000 94798000 BdaSup BdaSup.SYS Thu Nov 02 08:55:15 2006 (4549B273)
    94806000 94831000 nwifi nwifi.sys Thu Nov 02 08:55:41 2006 (4549B28D)
    94845000 9485e000 bowser bowser.sys Thu Nov 02 08:31:11 2006 (4549ACCF)
    9485e000 94879000 srvnet srvnet.sys Thu Nov 02 08:31:43 2006 (4549ACEF)
    948ea000 948fc000 mrxsmb20 mrxsmb20.sys Thu Nov 02 08:31:16 2006 (4549ACD4)
    94969000 94988000 mrxdav mrxdav.sys Thu Nov 02 08:31:24 2006 (4549ACDC)
    949ec000 949f8000 ATITool ATITool.sys Fri Nov 10 13:08:51 2006 (455479E3)
    94ab2000 94ac0000 circlass circlass.sys Thu Nov 02 08:55:08 2006 (4549B26C)
    94ac0000 94ace000 intelppm intelppm.sys Thu Nov 02 08:30:18 2006 (4549AC9A)
    94ace000 94adc000 usbehci usbehci.sys Thu Nov 02 08:55:04 2006 (4549B268)
    94adc000 94ae9080 1394BUS 1394BUS.SYS Thu Nov 02 08:55:12 2006 (4549B270)
    94c66000 94c84000 mrxsmb mrxsmb.sys Thu Nov 02 08:31:20 2006 (4549ACD8)
    94c84000 94cea000 HTTP HTTP.sys Thu Nov 02 08:57:06 2006 (4549B2E2)
    94cea000 94d78000 spsys spsys.sys Wed Oct 25 23:43:28 2006 (453FE890)
    94dbc000 94dc9000 watchdog watchdog.sys Thu Nov 02 08:37:44 2006 (4549AE58)
    94e6c000 94e90000 srv2 srv2.sys Thu Nov 02 08:31:46 2006 (4549ACF2)
    94fc4000 94fce000 serenum serenum.sys Thu Nov 02 08:51:25 2006 (4549B18D)
    9506a000 950a3000 mrxsmb10 mrxsmb10.sys Thu Nov 02 08:31:25 2006 (4549ACDD)
    95104000 95150000 srv srv.sys Thu Nov 02 08:31:55 2006 (4549ACFB)
    95171000 95172000 Msfs Msfs.SYS unavailable (00000000)
    95192000 9519d000 tunnel tunnel.sys Thu Jun 07 03:57:03 2007 (466773FF)
    9519d000 951a8000 usbuhci usbuhci.sys Thu Nov 02 08:55:04 2006 (4549B268)
    95270000 95271000 Fs_Rec Fs_Rec.SYS unavailable (00000000)
    95282000 9528b000 rasacd rasacd.sys Thu Nov 02 08:58:13 2006 (4549B325)
    9528b000 95294000 hidusb hidusb.sys Thu Nov 02 08:55:01 2006 (4549B265)
    952af000 952b8000 asyncmac asyncmac.sys Thu Nov 02 08:58:10 2006 (4549B322)
    952b8000 952c1000 kbdhid kbdhid.sys Thu Nov 02 08:51:12 2006 (4549B180)
    952d3000 952dc000 tunmp tunmp.sys Thu Jun 07 03:56:53 2007 (466773F5)
    952f7000 95300000 rtlprot rtlprot.sys Fri Dec 01 05:53:30 2006 (456FC35A)
    95330000 95340000 NDProxy NDProxy.SYS Wed Jul 04 02:28:13 2007 (468AF7AD)
    95350000 95360000 HIDCLASS HIDCLASS.SYS Thu Nov 02 08:55:00 2006 (4549B264)
    953b0000 953bf280 ohci1394 ohci1394.sys Thu Nov 02 08:55:16 2006 (4549B274)
    953f0000 95400000 lltdio lltdio.sys Thu Nov 02 08:56:48 2006 (4549B2D0)
    956f0000 956f1700 USBD USBD.SYS Thu Nov 02 08:55:00 2006 (4549B264)
    95d39000 95d41000 ASACPI ASACPI.sys Wed Oct 18 06:44:46 2006 (4535BF4E)
    95ea2000 95f80000 peauth peauth.sys Mon Oct 23 09:55:32 2006 (453C8384)
    9618f000 961b6f00 secdrv secdrv.SYS Tue Aug 31 14:42:55 2004 (4134805F)
    96545000 9654c000 GEARAspiWDM GEARAspiWDM.sys Mon Aug 07 18:11:27 2006 (44D7743F)
    96581000 96582580 MSPQM MSPQM.sys Thu Nov 02 08:51:14 2006 (4549B182)
    9697b000 9697e900 atitray atitray.sys Fri May 04 21:16:09 2007 (463B9489)
    9699b000 9699ef80 SaiIFFB5 SaiIFFB5.sys Tue May 01 11:56:23 2007 (46371CD7)
    97bd5000 97c00000 msiscsi msiscsi.sys Thu Nov 02 08:52:40 2006 (4549B1D8)
    980b4000 98800000 atikmdag atikmdag.sys Wed Aug 22 03:08:27 2007 (46CB9A9B)
    9c1bb000 9c1c9000 Npfs Npfs.SYS Thu Nov 02 08:30:57 2006 (4549ACC1)
    9c1c9000 9c1d7000 netbios netbios.sys Thu Nov 02 08:57:26 2006 (4549B2F6)
    9c39a000 9c39b000 Null Null.SYS unavailable (00000000)
    9c3a1000 9c3a8000 Beep Beep.SYS Thu Nov 02 08:51:03 2006 (4549B177)
    9c3a8000 9c3ae380 HIDPARSE HIDPARSE.SYS Thu Nov 02 08:55:00 2006 (4549B264)
    9c3af000 9c3b5d00 LHidFilt LHidFilt.Sys Thu Apr 12 00:28:19 2007 (461D6F13)
    9c400000 9c409000 TSDDD TSDDD.dll Thu Nov 02 09:02:02 2006 (4549B40A)
    9c410000 9c41e000 cdd cdd.dll Tue Jul 03 03:08:39 2007 (4689AFA7)
    9c420000 9c46c000 ATMFD ATMFD.DLL Thu Nov 02 08:38:18 2006 (4549AE7A)
    9c600000 9c7ff000 win32k win32k.sys Thu Feb 15 02:57:33 2007 (45D3CC1D)
    9d1da000 9d1e6000 vga vga.sys Thu Nov 02 08:53:56 2006 (4549B224)
    9d8fe000 9d908000 mssmbios mssmbios.sys Thu Nov 02 08:35:13 2006 (4549ADC1)
    9d908000 9d912000 nsiproxy nsiproxy.sys Thu Nov 02 08:57:30 2006 (4549B2FA)
    9d91c000 9d926000 Dxapi Dxapi.sys Thu Nov 02 08:38:17 2006 (4549AE79)
    9d926000 9d930000 ndisuio ndisuio.sys Thu Nov 02 08:57:22 2006 (4549B2F2)
    9dde8000 9ddea000 MicNgSrm MicNgSrm.sys Fri Sep 08 12:25:05 2006 (45015311)
    9ddf2000 9ddf3380 swenum swenum.sys Thu Nov 02 08:51:15 2006 (4549B183)
    9ddfe000 9ddff440 AsIO AsIO.sys Wed Dec 21 08:55:21 2005 (43A91879)

    Unloaded modules:
    96cf3000 96dba000 hiber_iastor
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8965c000 89664000 drmkaud.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8d2a0000 8d2cb000 atinavt2.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8946b000 89478000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8bf39000 8c000000 dump_iastor.
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    95279000 95282000 kbdhid.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8be67000 8be7a000 i8042prt.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:\debuglog.txt
     
  5. 2007/09/14
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    It would seem that neither of the two members who have experience of analysing these logs have visited the Board since your thread was posted.

    From me ....

    BugCheck 1000000A is far too general to come to any conclusions - the crash occurred while etqw.exe was running, but that is not necessarily a guide to the root cause.

    If the crash only occurrs when playing games you might look at the forums specific to those games - etqw.exe seems to be specific to some games.

    Please post any further logs from crashes that have occurred since your last post.
     
  6. 2007/09/16
    cpc2004

    cpc2004 Inactive

    Joined:
    2005/07/08
    Messages:
    366
    Likes Received:
    0
    From the stack trace, the problem is related to faulty memory. The faulty ram may be ram, L cache memory of CPU or video memroy. For hardware problem, you have to provide 5 to 6 debug logs to confirm it is hardware problem. You had better run memtest to stress test the ram.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.