1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Resolved BSOD happened recently, posting bsod log when I get it.

Discussion in 'Windows 7' started by Forsaken Knight, 2012/06/08.

  1. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    I recently had a bsod, and would like help trouble shooting, finding, and resolving the issue. It happen twice when I was in a game I regularly play.
     
  2. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0

  3. to hide this advert.

  4. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    did what was told. the pc froze, bsod, did a count up to 100, then restarted. the black screen giving the option of either start normal or do repair came up. I chose normal. Same bsod. back on the black screen again, I chose this time the repair option. I didn't choose the one that rolls you back to a previous recovery point. I let the thing play out till it said that it couldn't fix the issues and would I like to send a report to microsoft. I chose yes. I then clicked on the advanced options, kept going till the point of the lot in with password, since I never set up a password on this pc, and my mom bought this pc as is from the store when it was during a sale. The pc restarted, I hit F8 to go into safe mode. I then did the verifier again, and restarted the pc as instructed by the program after. I then went into normal mode. I then retried verifier in normal mode. The pc was able to restart, but not go back into normal mode. I then followed the same process I did before. Simply turning off my pc, disconnecting everything, and hitting the power button to remove any left power from the laptop pc, didn't get around the bsod, only the proceedure I did and described above. I was able to get back into normal mode again, and I closed my laptop cause I had to drive to some where quickly, (trying to get a job when you do not have a positive outlook on life is a challenge in and of itself). I just got back, opened up my pc, and was able to continue my session by clicking on my account icon.

    It looks like that verifier program does not work. Oh, I should also mention that one of the times that I had to restart my pc and try to enter normal mode, that one time, after doing the verifier, that a message in white text on the screen where your mouse cursor first initially appears says that one of the drives was not working properly or something to that affect. The pc then restarted and then I was able to get it to work after a little more of this headache.

    Besides the verifier cause something is interfering with it, what else should I do? safe mode works, and normal mode seems to work, but I do not feel fully secure. Therefore, I would like more help upon this matter.

    Please reply.
     
  5. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
  6. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    followed the second instructions in that hyperlink. I found one DMP here

    C:\Windows\Minidump

    . I tried opening it, but the system told me I don't have the permission for it. my account is, and was, the only one added onto this laptop, since it was bought.

    I'm not sure what to do at this point.
     
  7. 2012/06/08
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Take a deep breath, and carefully read the instructions from http://www.windowsbbs.com/general-discussions/33471-dump-data-collection-tool-instructions.html

    As I pointed out:
     
  8. 2012/06/08
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    There is no need to run the drive verifier just yet!
     
  9. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    the file I found before in the minidump folder is not of recent date. It is from 2010. that is the date that it was modified.

    How do I go looking for the most recent dump log?
     
  10. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    [​IMG]

    Uploaded with ImageShack.us

    this is what I got when I looked through my entire laptop pc.

    I'm not sure what to get, and at one location to look. Insight into what I should do will be greatly helpful.

    Please reply, thank you for your time, and I look forward to hearing a response from you soon.
     
  11. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    the following is from that picture. the large file dmp, the one in the megabytes. I did that one as per the instructions, as I could not find any other dmp files.
     
  12. 2012/06/08
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a08000 PsLoadedModuleList = 0xfffff800`02c45e50
    Debug session time: Tue May 18 17:57:54.103 2010 (UTC - 4:00)
    System Uptime: 0 days 0:42:16.945
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols

    Loading unloaded module list
    .....
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 7F, {8, 80050033, 406f8, fffff80002a40e58}

    *** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
    *** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
    Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000406f8
    Arg4: fffff80002a40e58

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_8

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: System

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from fffff80002a77b69 to fffff80002a78600

    STACK_TEXT:
    fffff800`040f0d28 fffff800`02a77b69 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : nt!KeBugCheckEx
    fffff800`040f0d30 fffff800`02a76032 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`040f0e70 fffff800`02a40e58 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`06b18b40 fffff880`0176fc5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    fffff880`06b19230 fffff880`0176d94f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
    fffff880`06b192a0 fffff880`0176f9b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
    fffff880`06b192f0 fffff880`0176f845 : fffffa80`059509a0 fffffa80`0520f950 fffff880`06b19518 fffff880`06b19c50 : NETIO!FilterMatch+0x95
    fffff880`06b19340 fffff880`01770ccb : 00000000`00000000 00000000`00000000 fffff880`06b19c50 fffff880`06b19500 : NETIO!IndexListClassify+0x69
    fffff880`06b193c0 fffff880`0183f4d0 : fffff880`06b19c50 fffff880`06b19898 fffff880`06b1a5d0 fffffa80`05da8450 : NETIO!KfdClassify+0xa4e
    fffff880`06b19730 fffff880`0183877e : fffff880`01947690 00000000`00000000 fffffa80`05cf40f0 00000000`00000000 : tcpip!WfpAleClassify+0x50
    fffff880`06b19770 fffff880`01837c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
    fffff880`06b19e80 fffff880`0183b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
    fffff880`06b1a150 fffff880`0183e6a4 : 00000000`00000000 fffff880`06b1a588 fffff880`06b1a590 00000000`00000001 : tcpip!WfpAleConnectAcceptIndicate+0x106
    fffff880`06b1a240 fffff880`01836f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
    fffff880`06b1a4b0 fffff880`01863bf6 : 00000000`00000000 fffffa80`042a0002 fffffa80`05ae8900 fffff880`03d562fb : tcpip!WfpProcessOutTransportStackIndication+0x329
    fffff880`06b1a680 fffff880`01868a7e : fffffa80`05ae34c0 fffff880`0176b804 fffff880`0196d9a0 fffffa80`05cf40f0 : tcpip!IppSendDatagramsCommon+0x526
    fffff880`06b1a950 fffff880`01835cf8 : fffffa80`05cf40f0 fffffa80`05da8450 fffffa80`05da8450 fffffa80`05ae34c0 : tcpip!IpNlpSendDatagrams+0x3e
    fffff880`06b1a990 fffff880`0183626d : fffffa80`02482480 fffffa80`027c5b00 fffff880`06b1b2e0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
    fffff880`06b1ad10 fffff880`01835ef5 : fffff880`06b1b240 00000000`000062fb 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
    fffff880`06b1b100 fffff800`02a87d4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    fffff880`06b1b130 fffff880`018364b8 : fffff880`01835ee0 fffff880`06b1b240 fffff880`06b1b402 fffffa80`053869a0 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`06b1b210 fffff880`01232f45 : fffffa80`0322ea10 fffffa80`03e2b040 fffffa80`0618c520 fffffa80`05caba3e : tcpip!UdpTlProviderSendMessages+0x78
    fffff880`06b1b290 fffff880`01232ff2 : 00000000`00000002 fffffa80`041916c0 fffffa80`026a08e0 fffffa80`05caba08 : tdx!TdxSendDatagramTransportAddress+0x2f5
    fffff880`06b1b370 fffff880`010611a8 : fffffa80`026a08e0 00000000`00000000 fffffa80`041916c0 fffffa80`026a08e0 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
    fffff880`06b1b3a0 fffff880`01061647 : fffff880`06b1b4e0 fffff880`03d0671a fffffa80`042b2dd0 00000000`00000000 : aswTdi+0x11a8
    fffff880`06b1b410 fffff880`03d06542 : 00000000`00000000 fffff880`06b1b500 fffffa80`04524b80 fffffa80`026a0780 : aswTdi+0x1647
    fffff880`06b1b450 fffff880`03d06f61 : fffffa80`05caba08 fffffa80`05caba08 fffffa80`05b79a00 fffff880`06b1b550 : netbt!TdiSendDatagram+0x187
    fffff880`06b1b4c0 fffff880`03d13329 : fffffa80`057df4c0 fffffa80`05cab850 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
    fffff880`06b1b550 fffff880`03d130e6 : 00000000`00000001 00000000`00000000 00000000`00000032 fffff880`03d3fb62 : netbt!UdpSendResponse+0x4e0
    fffff880`06b1b5d0 fffff880`03d07be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
    fffff880`06b1b700 fffff880`03d05b47 : 00000000`00000032 fffffa80`0494f90c 00000000`00000032 fffff880`06b1b902 : netbt!NameSrvHndlrNotOs+0xca
    fffff880`06b1b740 fffff880`010665d7 : fffffa80`05fbaef0 00000000`00000032 fffff880`0106b810 fffffa80`05fbaef0 : netbt!TdiRcvNameSrvHandler+0x367
    fffff880`06b1b7e0 fffff880`01231325 : fffffa80`05a862fb fffffa80`05a861e0 00000000`00000032 fffff880`01248400 : aswTdi+0x65d7
    fffff880`06b1b890 fffff880`018413c5 : fffffa80`05f031c0 00000000`00000000 fffffa80`05f031c0 fffffa80`05f031c0 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
    fffff880`06b1ba80 fffff880`018418d4 : fffffa80`00000000 fffffa80`05f031c0 00000000`00000000 fffffa80`0494f904 : tcpip!UdpDeliverDatagrams+0x155
    fffff880`06b1bc10 fffff880`0185d427 : fffffa80`03258840 fffff880`00000000 fffffa80`0516acb0 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
    fffff880`06b1bd00 fffff880`0185d499 : fffff880`06b1be80 fffff880`0196d9a0 fffff880`06b1be90 fffffa80`03257820 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`06b1bdc0 fffff880`0185d990 : fffff880`0196d9a0 fffffa80`02515f50 00000000`00000011 fffff880`06b1be80 : tcpip!IppProcessDeliverList+0x59
    fffff880`06b1be30 fffff880`0185c821 : 00000000`fffe200a fffffa80`03268138 fffff880`0196d9a0 00000000`044f9501 : tcpip!IppReceiveHeaderBatch+0x231
    fffff880`06b1bf10 fffff880`01936592 : fffffa80`05154f30 00000000`00000000 fffffa80`044f9501 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
    fffff880`06b1c110 fffff880`01609afa : fffffa80`025f4002 fffffa80`025f4010 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
    fffff880`06b1c150 fffff880`03d5e863 : fffffa80`0596b0f0 fffffa80`044f95e0 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
    fffff880`06b1c200 fffff880`03d5da86 : fffffa80`044f95e0 fffffa80`042a2b40 fffffa80`03f7e148 fffffa80`03f7e010 : vsdatant+0x15863
    fffff880`06b1c290 fffff880`03d57651 : fffffa80`044f95e0 fffffa80`044f95e0 fffff880`06b1ca00 fffffa80`044f96d8 : vsdatant+0x14a86
    fffff880`06b1c390 fffff880`0178657f : fffff880`06b1c9a8 fffff880`06b1cac0 fffffa80`02f8d3b0 fffffa80`0586df80 : vsdatant+0xe651
    fffff880`06b1c4c0 fffff880`017704db : fffffa80`052b0018 fffff880`06b1c9a8 fffffa80`05386898 fffffa80`02f8d3b0 : NETIO! ?? ::FNODOBFM::`string'+0x7267
    fffff880`06b1c5e0 fffff880`0190102b : fffff880`06b1cff8 fffff880`06b1c9a8 fffff880`06b1cff8 fffffa80`02f8d3b0 : NETIO!KfdClassify+0x24b
    fffff880`06b1c950 fffff880`01804d10 : 00000000`00000000 fffffa80`05cf40f0 fffffa80`053869a0 00000000`00000100 : tcpip!WFPDatagramDataShimV4+0x49b
    fffff880`06b1ccb0 fffff880`0187df2d : fffff880`06b1d108 fffff880`01827af4 00000000`00000000 fffffa80`02f8d3b0 : tcpip! ?? ::FNODOBFM::`string'+0x2b82f
    fffff880`06b1cf20 fffff880`01840080 : fffffa80`05cf40f0 00000000`00000000 00000000`00000002 00000000`0000000f : tcpip!ProcessAleForNonTcpIn+0x1ad
    fffff880`06b1d040 fffff880`0186e861 : fffffa80`00000011 fffffa80`05f00002 fffffa80`03268900 00000000`000062fb : tcpip!WfpProcessInTransportStackIndication+0xb10
    fffff880`06b1d3b0 fffff880`01840f93 : fffffa80`05f031c0 fffffa80`032588f0 00000000`00000000 fffffa80`03268000 : tcpip!InetInspectReceiveDatagram+0x121
    fffff880`06b1d450 fffff880`01841345 : fffffa80`05f031c0 00000000`00000000 00000000`00000202 fffff800`02a7d0fa : tcpip!UdpBeginMessageIndication+0x83
    fffff880`06b1d5a0 fffff880`018418d4 : fffffa80`00000000 fffffa80`05f031c0 00000000`00000000 fffffa80`0494f904 : tcpip!UdpDeliverDatagrams+0xd5
    fffff880`06b1d730 fffff880`0185d427 : fffffa80`03258840 00000000`00000000 fffffa80`0516acb0 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
    fffff880`06b1d820 fffff880`0185d499 : fffff880`06b1d9a0 fffff880`0196d9a0 fffff880`06b1d9b0 fffffa80`03257820 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`06b1d8e0 fffff880`0185d990 : fffff880`0196d9a0 fffffa80`02e80f50 00000000`00000011 fffff880`06b1d9a0 : tcpip!IppProcessDeliverList+0x59
    fffff880`06b1d950 fffff880`0185c821 : 00000000`fffe200a fffffa80`03268000 fffff880`0196d9a0 00000000`05168401 : tcpip!IppReceiveHeaderBatch+0x231
    fffff880`06b1da30 fffff880`0185b272 : fffffa80`05154f30 00000000`00000000 fffffa80`05168401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
    fffff880`06b1dc30 fffff880`018746ba : fffffa80`05168470 fffff880`06b1dd60 fffffa80`05168470 fffffa80`057e0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`06b1dd10 fffff800`02a87d4a : fffffa80`02f8d3b0 fffff880`06b19000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff880`06b1dd60 fffff880`018740e2 : fffff880`018745e0 fffff880`06b1de70 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`06b1de40 fffff880`017350eb : fffffa80`05169010 00000000`00000000 fffffa80`045e01a0 fffffa80`045e01a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`06b1deb0 fffff880`016fefc6 : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`06b1df20 fffff880`01681a24 : fffffa80`045e01a0 00000000`00000002 00000000`00000001 fffff880`02497643 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`06b1e3a0 fffff880`016819e9 : 00000000`00000002 fffff880`01678fbf 00000000`00000001 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff880`06b1e3e0 fffff880`01681980 : fffffa80`0494f8da fffffa80`050d4010 ffff0000`056b5102 fffff880`02493355 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`06b1e420 fffff880`03d6164d : fffffa80`05161960 00000000`00000000 00000000`00000001 fffffa80`02f8d3b0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`06b1e460 fffff880`016819e9 : fffffa80`05161960 fffffa80`02f8d3b0 fffffa80`00000000 00000000`00000001 : vsdatant+0x1864d
    fffff880`06b1e500 fffff880`01681980 : fffff880`024cd5c0 fffffa80`050d4010 fffffa80`0515e020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`06b1e540 fffff880`024967ee : fffffa80`050d4010 00000000`00000000 fffffa80`02f8d3b0 fffff880`024cd5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`06b1e580 fffff880`016819e9 : fffffa80`04850740 00000000`00000000 00000000`00000001 fffffa80`00000030 : nwifi!Pt6Receive+0x296
    fffff880`06b1e5e0 fffff880`01681980 : fffffa80`0484c028 fffff880`03c300c7 fffff880`03c31340 fffff880`024920de : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`06b1e620 fffff880`03c2c9c0 : fffff880`03c33110 00000000`00000000 00000000`00000001 fffffa80`0484ca78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`06b1e660 fffff880`016992b7 : fffffa80`045e01a0 fffffa80`02e80e20 fffffa80`02e80e20 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!CompareSecurityContexts+6a
    fffff880`0176fc5a 448b442470 mov r8d,dword ptr [rsp+70h]

    SYMBOL_STACK_INDEX: 4

    SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

    FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

    BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

    Followup: MachineOwner
    ---------

    rax=fffff800040f0e30 rbx=fffffa8003276068 rcx=000000000000007f
    rdx=0000000000000008 rsi=0000000000000001 rdi=0000000000000000
    rip=fffff80002a78600 rsp=fffff800040f0d28 rbp=fffff800040f0ef0
    r8=0000000080050033 r9=00000000000406f8 r10=fffff80002a40e58
    r11=fffff88006b19298 r12=0000000000000000 r13=fffff88006b192a8
    r14=fffff88006b192a0 r15=fffff88006b194c0
    iopl=0 nv up ei ng nz na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000286
    nt!KeBugCheckEx:
    fffff800`02a78600 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff800`040f0d30=000000000000007f
    Child-SP RetAddr : Args to Child : Call Site
    fffff800`040f0d28 fffff800`02a77b69 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : nt!KeBugCheckEx
    fffff800`040f0d30 fffff800`02a76032 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`040f0e70 fffff800`02a40e58 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff800`040f0e70)
    fffff880`06b18b40 fffff880`0176fc5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    fffff880`06b19230 fffff880`0176d94f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
    fffff880`06b192a0 fffff880`0176f9b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
    fffff880`06b192f0 fffff880`0176f845 : fffffa80`059509a0 fffffa80`0520f950 fffff880`06b19518 fffff880`06b19c50 : NETIO!FilterMatch+0x95
    fffff880`06b19340 fffff880`01770ccb : 00000000`00000000 00000000`00000000 fffff880`06b19c50 fffff880`06b19500 : NETIO!IndexListClassify+0x69
    fffff880`06b193c0 fffff880`0183f4d0 : fffff880`06b19c50 fffff880`06b19898 fffff880`06b1a5d0 fffffa80`05da8450 : NETIO!KfdClassify+0xa4e
    fffff880`06b19730 fffff880`0183877e : fffff880`01947690 00000000`00000000 fffffa80`05cf40f0 00000000`00000000 : tcpip!WfpAleClassify+0x50
    fffff880`06b19770 fffff880`01837c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
    fffff880`06b19e80 fffff880`0183b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
    fffff880`06b1a150 fffff880`0183e6a4 : 00000000`00000000 fffff880`06b1a588 fffff880`06b1a590 00000000`00000001 : tcpip!WfpAleConnectAcceptIndicate+0x106
    fffff880`06b1a240 fffff880`01836f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
    fffff880`06b1a4b0 fffff880`01863bf6 : 00000000`00000000 fffffa80`042a0002 fffffa80`05ae8900 fffff880`03d562fb : tcpip!WfpProcessOutTransportStackIndication+0x329
    fffff880`06b1a680 fffff880`01868a7e : fffffa80`05ae34c0 fffff880`0176b804 fffff880`0196d9a0 fffffa80`05cf40f0 : tcpip!IppSendDatagramsCommon+0x526
    fffff880`06b1a950 fffff880`01835cf8 : fffffa80`05cf40f0 fffffa80`05da8450 fffffa80`05da8450 fffffa80`05ae34c0 : tcpip!IpNlpSendDatagrams+0x3e
    fffff880`06b1a990 fffff880`0183626d : fffffa80`02482480 fffffa80`027c5b00 fffff880`06b1b2e0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
    fffff880`06b1ad10 fffff880`01835ef5 : fffff880`06b1b240 00000000`000062fb 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
    fffff880`06b1b100 fffff800`02a87d4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    fffff880`06b1b130 fffff880`018364b8 : fffff880`01835ee0 fffff880`06b1b240 fffff880`06b1b402 fffffa80`053869a0 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`06b1b210 fffff880`01232f45 : fffffa80`0322ea10 fffffa80`03e2b040 fffffa80`0618c520 fffffa80`05caba3e : tcpip!UdpTlProviderSendMessages+0x78
    fffff880`06b1b290 fffff880`01232ff2 : 00000000`00000002 fffffa80`041916c0 fffffa80`026a08e0 fffffa80`05caba08 : tdx!TdxSendDatagramTransportAddress+0x2f5
    fffff880`06b1b370 fffff880`010611a8 : fffffa80`026a08e0 00000000`00000000 fffffa80`041916c0 fffffa80`026a08e0 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
    fffff880`06b1b3a0 fffff880`01061647 : fffff880`06b1b4e0 fffff880`03d0671a fffffa80`042b2dd0 00000000`00000000 : aswTdi+0x11a8
    fffff880`06b1b410 fffff880`03d06542 : 00000000`00000000 fffff880`06b1b500 fffffa80`04524b80 fffffa80`026a0780 : aswTdi+0x1647
    fffff880`06b1b450 fffff880`03d06f61 : fffffa80`05caba08 fffffa80`05caba08 fffffa80`05b79a00 fffff880`06b1b550 : netbt!TdiSendDatagram+0x187
    fffff880`06b1b4c0 fffff880`03d13329 : fffffa80`057df4c0 fffffa80`05cab850 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
    fffff880`06b1b550 fffff880`03d130e6 : 00000000`00000001 00000000`00000000 00000000`00000032 fffff880`03d3fb62 : netbt!UdpSendResponse+0x4e0
    fffff880`06b1b5d0 fffff880`03d07be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
    fffff880`06b1b700 fffff880`03d05b47 : 00000000`00000032 fffffa80`0494f90c 00000000`00000032 fffff880`06b1b902 : netbt!NameSrvHndlrNotOs+0xca
    fffff880`06b1b740 fffff880`010665d7 : fffffa80`05fbaef0 00000000`00000032 fffff880`0106b810 fffffa80`05fbaef0 : netbt!TdiRcvNameSrvHandler+0x367
    fffff880`06b1b7e0 fffff880`01231325 : fffffa80`05a862fb fffffa80`05a861e0 00000000`00000032 fffff880`01248400 : aswTdi+0x65d7
    fffff880`06b1b890 fffff880`018413c5 : fffffa80`05f031c0 00000000`00000000 fffffa80`05f031c0 fffffa80`05f031c0 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
    fffff880`06b1ba80 fffff880`018418d4 : fffffa80`00000000 fffffa80`05f031c0 00000000`00000000 fffffa80`0494f904 : tcpip!UdpDeliverDatagrams+0x155
    fffff880`06b1bc10 fffff880`0185d427 : fffffa80`03258840 fffff880`00000000 fffffa80`0516acb0 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
    fffff880`06b1bd00 fffff880`0185d499 : fffff880`06b1be80 fffff880`0196d9a0 fffff880`06b1be90 fffffa80`03257820 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`06b1bdc0 fffff880`0185d990 : fffff880`0196d9a0 fffffa80`02515f50 00000000`00000011 fffff880`06b1be80 : tcpip!IppProcessDeliverList+0x59
    fffff880`06b1be30 fffff880`0185c821 : 00000000`fffe200a fffffa80`03268138 fffff880`0196d9a0 00000000`044f9501 : tcpip!IppReceiveHeaderBatch+0x231
    fffff880`06b1bf10 fffff880`01936592 : fffffa80`05154f30 00000000`00000000 fffffa80`044f9501 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
    fffff880`06b1c110 fffff880`01609afa : fffffa80`025f4002 fffffa80`025f4010 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
    fffff880`06b1c150 fffff880`03d5e863 : fffffa80`0596b0f0 fffffa80`044f95e0 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
    fffff880`06b1c200 fffff880`03d5da86 : fffffa80`044f95e0 fffffa80`042a2b40 fffffa80`03f7e148 fffffa80`03f7e010 : vsdatant+0x15863
    fffff880`06b1c290 fffff880`03d57651 : fffffa80`044f95e0 fffffa80`044f95e0 fffff880`06b1ca00 fffffa80`044f96d8 : vsdatant+0x14a86
    fffff880`06b1c390 fffff880`0178657f : fffff880`06b1c9a8 fffff880`06b1cac0 fffffa80`02f8d3b0 fffffa80`0586df80 : vsdatant+0xe651
    fffff880`06b1c4c0 fffff880`017704db : fffffa80`052b0018 fffff880`06b1c9a8 fffffa80`05386898 fffffa80`02f8d3b0 : NETIO! ?? ::FNODOBFM::`string'+0x7267
    fffff880`06b1c5e0 fffff880`0190102b : fffff880`06b1cff8 fffff880`06b1c9a8 fffff880`06b1cff8 fffffa80`02f8d3b0 : NETIO!KfdClassify+0x24b
    fffff880`06b1c950 fffff880`01804d10 : 00000000`00000000 fffffa80`05cf40f0 fffffa80`053869a0 00000000`00000100 : tcpip!WFPDatagramDataShimV4+0x49b
    fffff880`06b1ccb0 fffff880`0187df2d : fffff880`06b1d108 fffff880`01827af4 00000000`00000000 fffffa80`02f8d3b0 : tcpip! ?? ::FNODOBFM::`string'+0x2b82f
    fffff880`06b1cf20 fffff880`01840080 : fffffa80`05cf40f0 00000000`00000000 00000000`00000002 00000000`0000000f : tcpip!ProcessAleForNonTcpIn+0x1ad
    fffff880`06b1d040 fffff880`0186e861 : fffffa80`00000011 fffffa80`05f00002 fffffa80`03268900 00000000`000062fb : tcpip!WfpProcessInTransportStackIndication+0xb10
    fffff880`06b1d3b0 fffff880`01840f93 : fffffa80`05f031c0 fffffa80`032588f0 00000000`00000000 fffffa80`03268000 : tcpip!InetInspectReceiveDatagram+0x121
    fffff880`06b1d450 fffff880`01841345 : fffffa80`05f031c0 00000000`00000000 00000000`00000202 fffff800`02a7d0fa : tcpip!UdpBeginMessageIndication+0x83
    fffff880`06b1d5a0 fffff880`018418d4 : fffffa80`00000000 fffffa80`05f031c0 00000000`00000000 fffffa80`0494f904 : tcpip!UdpDeliverDatagrams+0xd5
    fffff880`06b1d730 fffff880`0185d427 : fffffa80`03258840 00000000`00000000 fffffa80`0516acb0 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
    fffff880`06b1d820 fffff880`0185d499 : fffff880`06b1d9a0 fffff880`0196d9a0 fffff880`06b1d9b0 fffffa80`03257820 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`06b1d8e0 fffff880`0185d990 : fffff880`0196d9a0 fffffa80`02e80f50 00000000`00000011 fffff880`06b1d9a0 : tcpip!IppProcessDeliverList+0x59
    fffff880`06b1d950 fffff880`0185c821 : 00000000`fffe200a fffffa80`03268000 fffff880`0196d9a0 00000000`05168401 : tcpip!IppReceiveHeaderBatch+0x231
    fffff880`06b1da30 fffff880`0185b272 : fffffa80`05154f30 00000000`00000000 fffffa80`05168401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
    fffff880`06b1dc30 fffff880`018746ba : fffffa80`05168470 fffff880`06b1dd60 fffffa80`05168470 fffffa80`057e0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`06b1dd10 fffff800`02a87d4a : fffffa80`02f8d3b0 fffff880`06b19000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff880`06b1dd60 fffff880`018740e2 : fffff880`018745e0 fffff880`06b1de70 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`06b1de40 fffff880`017350eb : fffffa80`05169010 00000000`00000000 fffffa80`045e01a0 fffffa80`045e01a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`06b1deb0 fffff880`016fefc6 : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`06b1df20 fffff880`01681a24 : fffffa80`045e01a0 00000000`00000002 00000000`00000001 fffff880`02497643 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`06b1e3a0 fffff880`016819e9 : 00000000`00000002 fffff880`01678fbf 00000000`00000001 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff880`06b1e3e0 fffff880`01681980 : fffffa80`0494f8da fffffa80`050d4010 ffff0000`056b5102 fffff880`02493355 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`06b1e420 fffff880`03d6164d : fffffa80`05161960 00000000`00000000 00000000`00000001 fffffa80`02f8d3b0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`06b1e460 fffff880`016819e9 : fffffa80`05161960 fffffa80`02f8d3b0 fffffa80`00000000 00000000`00000001 : vsdatant+0x1864d
    fffff880`06b1e500 fffff880`01681980 : fffff880`024cd5c0 fffffa80`050d4010 fffffa80`0515e020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`06b1e540 fffff880`024967ee : fffffa80`050d4010 00000000`00000000 fffffa80`02f8d3b0 fffff880`024cd5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`06b1e580 fffff880`016819e9 : fffffa80`04850740 00000000`00000000 00000000`00000001 fffffa80`00000030 : nwifi!Pt6Receive+0x296
    fffff880`06b1e5e0 fffff880`01681980 : fffffa80`0484c028 fffff880`03c300c7 fffff880`03c31340 fffff880`024920de : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`06b1e620 fffff880`03c2c9c0 : fffff880`03c33110 00000000`00000000 00000000`00000001 fffffa80`0484ca78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`06b1e660 fffff880`016992b7 : fffffa80`045e01a0 fffffa80`02e80e20 fffffa80`02e80e20 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158
    *** ERROR: Module load completed but symbols could not be loaded for bcmwl664.sys
    fffff880`06b1e6c0 fffff880`050f5c28 : fffffa80`04516000 fffffa80`02e80e20 fffffa80`047dbe60 00000000`00000000 : ndis! ?? ::FNODOBFM::`string'+0xccef
    fffff880`06b1e710 fffff880`05119c80 : fffffa80`02e80e00 00000000`00000000 fffffa80`00000000 fffffa80`032ab000 : bcmwl664+0x22c28
    fffff880`06b1e7e0 fffff880`05119478 : 0000099e`00000000 ffffffcc`02a70001 00000000`00000800 fffffa80`05cc5010 : bcmwl664+0x46c80
    fffff880`06b1e880 fffff880`051187c3 : 00000000`00000001 fffffa80`05cc5010 fffffa80`046c3010 00000000`00000001 : bcmwl664+0x46478
    fffff880`06b1e980 fffff880`0514674c : 00000000`00000000 fffffa80`0495af80 00000000`00000000 fffff800`02a7f752 : bcmwl664+0x457c3
    fffff880`06b1eb10 fffff880`051469a5 : fffffa80`00000002 fffffa80`04518780 00000000`00000027 fffffa80`05f2c148 : bcmwl664+0x7374c
    fffff880`06b1eb70 fffff880`050e5048 : fffffa80`04516000 fffffa80`04516000 00000000`c4020403 fffffa80`04804b50 : bcmwl664+0x739a5
    fffff880`06b1ebe0 fffff880`050f7cdf : fffffa80`04804be0 fffffa80`04516000 fffff800`02c1d5a0 fffffa80`04804be0 : bcmwl664+0x12048
    fffff880`06b1ec10 fffff800`02d75827 : fffffa80`045e0050 fffffa80`05f2c040 fffffa80`04804c20 fffffa80`05f2c040 : bcmwl664+0x24cdf
    fffff880`06b1ec40 fffff800`02a85861 : fffff800`02c1d500 fffff800`02d75804 fffffa80`05f2c040 fffffa80`02579010 : nt!IopProcessWorkItem+0x23
    fffff880`06b1ec70 fffff800`02d1da86 : fffff880`06c74650 fffffa80`05f2c040 00000000`00000080 fffffa80`023e9040 : nt!ExpWorkerThread+0x111
    fffff880`06b1ed00 fffff800`02a56b06 : fffff800`02bf2e80 fffffa80`05f2c040 fffffa80`02760040 fffff880`01265a90 : nt!PspSystemThreadStartup+0x5a
    fffff880`06b1ed40 00000000`00000000 : fffff880`06b1f000 fffff880`06b19000 fffff880`06b1e9b0 00000000`00000000 : nt!KxStartSystemThread+0x16
    start end module name
    fffff800`00ba1000 fffff800`00bab000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff800`02a08000 fffff800`02fe4000 nt ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
    fffff800`02fe4000 fffff800`0302d000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`00c65000 fffff880`00ca9000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`00ca9000 fffff880`00cbd000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`00cbd000 fffff880`00d1b000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d1b000 fffff880`00ddb000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`00e34000 fffff880`00ed8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ed8000 fffff880`00ee7000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00ee7000 fffff880`00f3e000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`00f3e000 fffff880`00f47000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00f47000 fffff880`00f51000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`00f51000 fffff880`00f84000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00f84000 fffff880`00f91000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`00f91000 fffff880`00fa6000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00fa6000 fffff880`00faf000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00faf000 fffff880`00fbb000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`00fbb000 fffff880`00fd0000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00fd0000 fffff880`00fea000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01000000 fffff880`0104c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0104c000 fffff880`01060000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01060000 fffff880`01070000 aswTdi aswTdi.SYS Wed Apr 14 12:35:50 2010 (4BC5EEE6)
    fffff880`01090000 fffff880`011ac000 iaStor iaStor.sys Tue Oct 13 14:15:56 2009 (4AD4C3DC)
    fffff880`011ac000 fffff880`011b5000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`011b5000 fffff880`011df000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`011df000 fffff880`011ea000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`01200000 fffff880`01230000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`01230000 fffff880`0124e000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`01254000 fffff880`013f7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01400000 fffff880`0143a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`0143a000 fffff880`01474000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01483000 fffff880`014e1000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`014e1000 fffff880`014fb000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`014fb000 fffff880`0156e000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`0156e000 fffff880`0157f000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0157f000 fffff880`01589000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01589000 fffff880`015d5000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`015d5000 fffff880`015eb000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`015eb000 fffff880`01600000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`01600000 fffff880`0164a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`0164a000 fffff880`01652000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01652000 fffff880`01664000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01664000 fffff880`0166d000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`01677000 fffff880`01769000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`01769000 fffff880`017c9000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`017c9000 fffff880`017f4000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`01802000 fffff880`019ff000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`02400000 fffff880`02418000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02418000 fffff880`02445000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0248d000 fffff880`024e0000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`024e0000 fffff880`024f3000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`024f3000 fffff880`0250b000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0250b000 fffff880`02516000 ISWKL ISWKL.sys Wed Oct 14 09:12:56 2009 (4AD5CE58)
    fffff880`02516000 fffff880`025de000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`025de000 fffff880`025fc000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff880`03a13000 fffff880`03a3d000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03a3d000 fffff880`03a46000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03a46000 fffff880`03a4d000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03a4d000 fffff880`03a5b000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`03a5b000 fffff880`03a80000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`03a80000 fffff880`03a90000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`03a90000 fffff880`03a99000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03a99000 fffff880`03aa2000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03aa2000 fffff880`03aab000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`03aab000 fffff880`03ab6000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`03ab6000 fffff880`03ac7000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03ac7000 fffff880`03ad4000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`03ad4000 fffff880`03bf0000 dump_iaStor dump_iaStor.sys Tue Oct 13 14:15:56 2009 (4AD4C3DC)
    fffff880`03c00000 fffff880`03c26000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`03c26000 fffff880`03c3c000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03c3c000 fffff880`03c4b000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03c4b000 fffff880`03c66000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`03c70000 fffff880`03cfa000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03cfa000 fffff880`03d04000 aswRdr aswRdr.SYS Wed Apr 14 12:31:40 2010 (4BC5EDEC)
    fffff880`03d04000 fffff880`03d49000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`03d49000 fffff880`03dda000 vsdatant vsdatant.sys Sun Nov 22 18:37:44 2009 (4B09CB48)
    fffff880`03dda000 fffff880`03de3000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03de3000 fffff880`03df7000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`03e00000 fffff880`03e3d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`03e3d000 fffff880`03e5f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`03e5f000 fffff880`03e6d000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03e76000 fffff880`03ec7000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03ec7000 fffff880`03ed3000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff880`03ed3000 fffff880`03ede000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`03ede000 fffff880`03eed000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`03eed000 fffff880`03f0b000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03f0b000 fffff880`03f1c000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03f1c000 fffff880`03f3f000 aswSP aswSP.SYS Wed Apr 14 12:35:30 2010 (4BC5EED2)
    fffff880`03f3f000 fffff880`03f62000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`03f65000 fffff880`03f7b000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`03f7b000 fffff880`03fd5000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03fd5000 fffff880`03ff0000 aswMonFlt aswMonFlt.sys Wed Apr 14 12:31:25 2010 (4BC5EDDD)
    fffff880`03ff0000 fffff880`03ff9000 aswFsBlk aswFsBlk.SYS Wed Apr 14 12:31:02 2010 (4BC5EDC6)
    fffff880`04000000 fffff880`04011000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04011000 fffff880`04035000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04035000 fffff880`04041000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04041000 fffff880`04053000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`04054000 fffff880`04148000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04148000 fffff880`0418e000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0418e000 fffff880`0419b000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`0419b000 fffff880`041f1000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`041f1000 fffff880`041ff000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04400000 fffff880`0440c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04413000 fffff880`045f1d00 RTKVHD64 RTKVHD64.sys Tue Jul 28 09:00:05 2009 (4A6EF655)
    fffff880`045f2000 fffff880`045f7200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`04808000 fffff880`04f0f400 igdkmd64 igdkmd64.sys Wed Sep 02 14:54:15 2009 (4A9EBF57)
    fffff880`04f10000 fffff880`04f3f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04f3f000 fffff880`04f5a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04f5a000 fffff880`04f7b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04f7b000 fffff880`04f95000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04f95000 fffff880`04fd8000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`04fd8000 fffff880`04fed000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`04fed000 fffff880`05000000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05000000 fffff880`05049000 SynTP SynTP.sys Thu Jun 18 22:33:58 2009 (4A3AF916)
    fffff880`05049000 fffff880`0504af00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`0504b000 fffff880`0505a000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0505a000 fffff880`05062000 UBHelper UBHelper.sys Mon Apr 27 04:48:19 2009 (49F57153)
    fffff880`05062000 fffff880`0506a000 NTIDrvr NTIDrvr.sys Tue Mar 24 23:09:39 2009 (49C9A073)
    fffff880`0506a000 fffff880`05077000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff880`05077000 fffff880`05080000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`05080000 fffff880`05090000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05090000 fffff880`050a6000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`050a6000 fffff880`050ca000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`050ca000 fffff880`050cb480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`050d3000 fffff880`053ae000 bcmwl664 bcmwl664.sys Fri Aug 21 20:17:40 2009 (4A8F3924)
    fffff880`053ae000 fffff880`053bb000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`053bb000 fffff880`053bf500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`053c0000 fffff880`053de000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`053de000 fffff880`053ea000 DKbFltr DKbFltr.sys Wed Mar 25 23:15:42 2009 (49CAF35E)
    fffff880`053ea000 fffff880`053f9000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06200000 fffff880`0622d000 srvnet srvnet.sys Tue Dec 08 03:32:26 2009 (4B1E0F1A)
    fffff880`0622d000 fffff880`0623f000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0623f000 fffff880`062a8000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`062b3000 fffff880`06301000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`06301000 fffff880`06324000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`06324000 fffff880`063ca000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`063ca000 fffff880`063d5000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`066ce000 fffff880`06766000 srv srv.sys Tue Dec 08 03:32:55 2009 (4B1E0F37)
    fffff960`00030000 fffff960`0033f000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff960`004d0000 fffff960`004da000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff960`00610000 fffff960`00637000 cdd cdd.dll Mon Jul 13 21:25:40 2009 (4A5BDE94)

    Unloaded modules:
    fffff880`06766000 fffff880`067d7000 spsys.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 00071000
    fffff880`015eb000 fffff880`015f9000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 0000E000
    fffff880`03ad6000 fffff880`03bf2000 dump_iaStor.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 0011C000
    fffff880`03a00000 fffff880`03a13000 dump_dumpfve.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 00013000
    fffff880`03f3f000 fffff880`03f65000 tunnel.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ImageSize: 00026000
    Closing open log file c:debuglog.txt
     
  13. 2012/06/09
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Sorry, but a 2 year old dump is useless.

    As I have said before:
    I have no intention of repeating instructions that are available to follow.

    A good guess would be heat or memory. But if you can't repeat the error, just put it down to chance.
     
  14. 2012/06/09
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    I went to,

    http://support.microsoft.com/default.aspx?scid=kb;EN-US;314103

    , and looked at the section, "MORE INFORMATION ", and under the, "Memory "Dumps" ", I followed the instructions to find the area, though I had to back track a bit, I found the secion under, "Control Panel\System and Security\System ", for Windows 7 OS users. I then click on the left side of the window, "Advanced System Settings ". This lead me to the "System Properties ", and then clicked on "Advanced" and the "Settings..." under the "Startup and Recovery" area under this tab. I then see that the recent bsod should have overwritten that memory dump that I recently posted. I do not know why it didn't do a report the last couple of times, but the following is a screen shot of that sub window.

    [​IMG]

    Uploaded with ImageShack.us

    I'm not sure why it did not make a dump file.

    I followed the instructions, yet I can't seem to find a current memory.dmp file.

    What should I do at this point?

    Oh, and that first hyperlinke I put in this reply, is from that "Dump Data collection tool and instructions" thread. It is toward the bottom of the first of the two posts.
     
  15. 2012/06/09
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    is there a way that I may check the stability of the memory of my laptop pc then?
     
  16. 2012/06/09
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
  17. 2012/06/18
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    i'm sry for not replying sooner. I was busy with my dad's birthday and fathers day along with my job hunting premise as of late. Since the issue didn't risen again since the time I specified that the bsod occurred, I kind of just brushed it off. I have some spare cd's, and already downloaded that file you specified from that microsoft site. I will make the cd later on this week and do the test within that hyperlinked thread as instructed.

    Thank you guys thus far for helping me out. I look forward to further assistance with my technical issues in regards to my pc laptop.
     
  18. 2012/06/29
    Forsaken Knight

    Forsaken Knight Well-Known Member Thread Starter

    Joined:
    2007/12/01
    Messages:
    512
    Likes Received:
    0
    Okay, I downloaded and put that file on a cd. I ran the cd while it was in my pc, but my pc started up windows instead of go into the cd first. I then restarted my laptop pc and pressed F2 to get into the bios. I was prompted by a password. I do not recall the password at all. Not even a little bit. So, I had to restart my laptop pc and take out the cd.

    I do not know how to reset a bios password or find out what the bios password is/was.

    During last week, I left my laptop pc on all night, while my gaming controller was plugged in and turned on. When I got up, I turned on the game I regularly play, and everything was fine. That is, until I tried moving the digital directional stick (left stick), on my controller. The controller lights were routinely going on and then off. Not long after, bsod occured. I turned on my pc after restarting it again, I tested the controller again, and it wasn't working properly. Before my pc could bsod again, I disconnected the usb pc gaming controller and things seemed fine. To make sure, I did a "proper" restart.

    I "think" the bsod was caused by a defective pc gaming controller. I have not had a bsod since I unplugged my pc gaming controller from my laptop. I don't know why, but just maybe wear and tear from years of us caused the controller to be defective.

    I don't know how to get passed the password of my bios to continue with that procedure. In addition, since no bsod occured since I took off my usb laptop pc gaming controller, I think I found the root cause as to my bsod issues. I could be wrong on this, but if anyone knows how to recover, or reset, a bios password, then I guess this specific incident and issue is "okay" for now.

    I'll put resolved on this thread. If anyone wants to continue assisting me in this matter, please post here. I have put threads in resolve status before, but I do not know how to un-resolve a thread.
     
  19. 2012/06/29
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
    Regrettably we cannot help you with lost or forgotten passwords ...

    Posting Rule #6 ...
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.