Go Back   Tech Support Forum > Microsoft Support > BSOD, App Crashes And Hangs

User Tag List

BSOD ntoskrnl.exe

This is a discussion on BSOD ntoskrnl.exe within the BSOD, App Crashes And Hangs forums, part of the Tech Support Forum category. BSOD ntoskrnl.exe Hi all, I have been getting BSOD every once in a while and after starting laptop. HP pavilion


Closed Thread
 
Thread Tools Search this Thread
Old 12-12-2012, 09:06 AM   #1
Registered Member
 
Join Date: Dec 2012
Posts: 28
OS: Windows 7 64-bit



BSOD ntoskrnl.exe

Hi all,

I have been getting BSOD every once in a while and after starting laptop.
HP pavilion dv6 Notebook pc Home premium Windows 7
amd phenom(tm) II p960 quad -core processor 1.80 ghz
6.00 gb (5.74 gb usable)
64 bit.

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7601.2.1.0.768.3
Locale ID: 1033


Additional information about the problem:
BCCode: 50
BCP1: FFFFF800C0000010
BCP2: 0000000000000008
BCP3: FFFFF800C0000010
BCP4: 0000000000000005
OS Version: 6_1_7601
Service Pack: 1_0
Product: 768_1




Read our privacy statement online:
https://go.microsoft.com/


If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\


https://sdrv.ms/RphzbZ
Those are dump files that have occured over time!

Who Crashed report:

Crash Dump Analysis


Crash dump directory: C:\Windows\Minidump

Crash dumps are enabled on your computer.

On Mon 12/10/2012 3:47:00 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\121012-59997-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7EFC0)
Bugcheck code: 0x50 (0xFFFFFFFFFFFFFFA9, 0x0, 0xFFFFF80002EBECE8, 0x0)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Mon 12/10/2012 3:47:00 PM GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: ntkrnlmp.exe (nt!KeBugCheckEx+0x0)
Bugcheck code: 0x50 (0xFFFFFFFFFFFFFFA9, 0x0, 0xFFFFF80002EBECE8, 0x0)
Error: PAGE_FAULT_IN_NONPAGED_AREA
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Wed 11/21/2012 4:05:19 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\112112-73414-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7EFC0)
Bugcheck code: 0x50 (0xFFFFFFFFFFFFFFE8, 0x0, 0xFFFFF800031A3851, 0x0)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Fri 11/2/2012 2:51:54 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\110212-20560-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7EFC0)
Bugcheck code: 0x50 (0xFFFFF800C0000010, 0x8, 0xFFFFF800C0000010, 0x5)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Tue 10/9/2012 2:41:26 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\100912-26504-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFF800C0000010, 0x8, 0xFFFFF800C0000010, 0x5)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Tue 8/21/2012 2:35:37 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\082112-18548-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFF800C0000010, 0x8, 0xFFFFF800C0000010, 0x5)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Tue 8/21/2012 2:27:55 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\082112-17752-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFFFFFFFFFFFA9, 0x0, 0xFFFFF80002CCFE88, 0x0)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Wed 8/15/2012 3:07:31 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\081512-17955-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFFFFFFFFFFFA9, 0x0, 0xFFFFF80002C73E88, 0x0)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Thu 8/9/2012 2:53:15 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\080912-17971-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFFFFFFFFFFFA9, 0x0, 0xFFFFF80002CC5E88, 0x0)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Tue 8/7/2012 3:01:56 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\080712-20607-01.dmp
This was probably caused by the following module: fastfat.sys (fastfat+0x1D82)
Bugcheck code: 0x23 (0xE0107, 0xFFFFF88008558FC8, 0xFFFFF88008558820, 0xFFFFF8800453908D)
Error: FAT_FILE_SYSTEM
file path: C:\Windows\system32\drivers\fastfat.sys
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: Fast FAT File System Driver
Bug check description: This indicates that a problem occurred in the FAT file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system that cannot be identified at this time.



On Thu 7/26/2012 2:45:36 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\072612-18735-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFFA80C0000010, 0x0, 0xFFFFF80002C8DA7A, 0x5)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Thu 7/26/2012 2:43:15 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\072612-19094-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFF8AC0C4B1570, 0x0, 0xFFFFF80002DABE63, 0x5)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Thu 7/26/2012 2:33:35 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\072612-24804-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x7F1C0)
Bugcheck code: 0x50 (0xFFFFF800C0000010, 0x8, 0xFFFFF800C0000010, 0x5)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoftฎ Windowsฎ Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



Conclusion

13 crash dumps have been found and analyzed. No offending third party drivers have been found. Consider configuring your system to produce a full memory dump for better analysis.


Read the topic general suggestions for troubleshooting system crashes for more information.

Note that it's not always possible to state with certainty whether a reported driver is actually responsible for crashing your system or that the root cause is in another module. Nonetheless it's suggested you look for updates for the products that these drivers belong to and regularly visit Windows update or enable automatic updates for Windows. In case a piece of malfunctioning hardware is causing trouble, a search with Google on the bug check errors together with the model name and brand of your computer may help you investigate this further.




Thanks
immigranta is offline  
Sponsored Links
Advertisement
 
Old 12-12-2012, 05:23 PM   #2
TSF - Enthusiast
 
Join Date: Jan 2008
Location: Florida
Posts: 15,298
OS: Win7,Win XP,PC LinuxOS

My System


Hello,

Take a look at the following link and enable Driver verifier. Also follow the BSOD posting instructions and include the requested reports.

https://www.techsupportforum.com/foru...ed-473665.html

Code:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`02e51000 PsLoadedModuleList = 0xfffff800`03095670
Debug session time: Wed Nov 21 11:05:19.464 2012 (UTC - 5:00)
System Uptime: 0 days 2:37:44.462
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+51 )
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800031a3851, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
MM_INTERNAL_CODE:  0
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
BUGCHECK_STR:  0x50
PROCESS_NAME:  System
CURRENT_IRQL:  0
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`02e52000 PsLoadedModuleList = 0xfffff800`03096670
Debug session time: Fri Nov  2 09:51:54.523 2012 (UTC - 5:00)
System Uptime: 0 days 0:14:48.505
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+437c1 )
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
MM_INTERNAL_CODE:  5
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
BUGCHECK_STR:  0x50
PROCESS_NAME:  TrueCrypt.exe
CURRENT_IRQL:  1
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03090670
Debug session time: Tue Oct  9 09:41:26.466 2012 (UTC - 5:00)
System Uptime: 0 days 0:03:16.448
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
MM_INTERNAL_CODE:  5
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
BUGCHECK_STR:  0x50
PROCESS_NAME:  TrueCrypt.exe
CURRENT_IRQL:  1

จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02c5e000 PsLoadedModuleList = 0xfffff800`02ea2670
Debug session time: Tue Aug 21 09:27:55.612 2012 (UTC - 5:00)
System Uptime: 0 days 0:02:27.594
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ccfe88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
MM_INTERNAL_CODE:  0
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
BUGCHECK_STR:  0x50
PROCESS_NAME:  TrueCrypt.exe
CURRENT_IRQL:  1

จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02c04000 PsLoadedModuleList = 0xfffff800`02e48670
Debug session time: Tue Aug  7 10:01:56.320 2012 (UTC - 5:00)
System Uptime: 0 days 0:32:59.317
BugCheck 23, {e0107, fffff88008558fc8, fffff88008558820, fffff8800453908d}
Probably caused by : fastfat.SYS ( fastfat!FatFlushFat+f1 )
FAT_FILE_SYSTEM (23)
    If you see FatExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000000e0107
Arg2: fffff88008558fc8
Arg3: fffff88008558820
Arg4: fffff8800453908d
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  TrueCrypt.exe
CURRENT_IRQL:  0
makinu1der2 is offline  
Old 12-12-2012, 06:12 PM   #3
Registered Member
 
Join Date: Oct 2012
Location: Minneapolis, MN
Posts: 321
OS: laptop: Debian; desktop: Win 10 pro,



amdiox64.sys Thu Feb 18 09:17:53 2010 (4B7D5A21)
AMD IO Driver
https://www.carrona.org/drivers/driver.php?id=amdiox64.sys

AtiPcie64.sys Wed Mar 10 08:33:45 2010 (4B97ADC9)
AMD PCIE Filter Driver[br]Found in my ATI video drivers (I have an Intel chipset)
https://www.carrona.org/drivers/driver.php?id=AtiPcie64.sys

amdxata.sys Fri Mar 19 11:18:18 2010 (4BA3A3CA)
AMD storage controller driver - usually from the Windows 7 DVD
https://www.carrona.org/drivers/driver.php?id=amdxata.sys

usbfilter.sys Thu Apr 29 05:43:06 2010 (4BD962BA)
AMD USB Filter Driver (likely part of the chipset drivers)
https://www.carrona.org/drivers/driver.php?id=usbfilter.sys

AtiHdmi.sys Thu May 6 04:20:39 2010 (4BE289E7)
ATI High Definition Audio Function Driver
https://www.carrona.org/drivers/driver.php?id=AtiHdmi.sys

clwvd.sys Tue Jul 27 20:13:47 2010 (4C4F844B)
CyberLink WebCam Virtual Driver
https://www.carrona.org/drivers/driver.php?id=clwvd.sys

bcmwl664.sys Wed Sep 1 19:14:13 2010 (4C7EEC55)
Broadcom 802.11g Network Adapter - Dell Wireless 1390 WLAN Mini-Card
https://www.carrona.org/drivers/driver.php?id=bcmwl664.sys

Rt64win7.sys Mon Oct 18 22:53:58 2010 (4CBD1656)
Realtek RTL8168D/8111D Family PCI-E Gigabit Ethernet NIC
https://www.carrona.org/drivers/driver.php?id=Rt64win7.sys

stwrt64.sys Wed Dec 1 20:51:14 2010 (4CF709A2)
SigmaTel High Definition Audio Codec
https://www.carrona.org/drivers/driver.php?id=stwrt64.sys

epfwwfpr.sys Wed Dec 8 23:26:09 2010 (4D006871)
ESET Antivirus/Firewall - check for a free upgrade to the latest version
https://www.carrona.org/drivers/driver.php?id=epfwwfpr.sys

eamonm.sys Wed Dec 8 23:29:20 2010 (4D006930)
ESET Amon driver
https://www.carrona.org/drivers/driver.php?id=eamonm.sys

ehdrv.sys Wed Dec 8 23:29:58 2010 (4D006956)
ESET
https://www.carrona.org/drivers/driver.php?id=ehdrv.sys

RtsPStor.sys Thu Mar 24 03:04:09 2011 (4D8AFAF9)
Realtek PCIE CardReader Driver
https://www.carrona.org/drivers/driver.php?id=RtsPStor.sys

hpdskflt.sys Fri May 13 13:47:02 2011 (4DCD7CA6)
HP Mobile Data Protection System Disk Filter
https://www.carrona.org/drivers/driver.php?id=hpdskflt.sys

Accelerometer.sys Fri May 13 13:47:02 2011 (4DCD7CA6)
HP Mobile Data Protection System Accelerometer
https://www.carrona.org/drivers/driver.php?id=Accelerometer.sys

atikmpag.sys Wed Sep 28 04:34:53 2011 (4E82EA3D)
ATI Video driver (remove the Catalyst Control Center and only install the Display Driver)
https://www.carrona.org/drivers/driver.php?id=atikmpag.sys

atikmdag.sys Wed Sep 28 05:04:42 2011 (4E82F13A)
ATI Video driver (remove the Catalyst Control Center and only install the Display Driver)
https://www.carrona.org/drivers/driver.php?id=atikmdag.sys

SynTP.sys Thu Oct 13 21:34:52 2011 (4E979FCC)
Synaptic Touch Pad Driver
https://www.carrona.org/drivers/driver.php?id=SynTP.sys

truecrypt.sys Tue Feb 7 03:09:36 2012 (4F30EA50)
TrueCrypt driver
https://www.carrona.org/drivers/driver.php?id=truecrypt.sys

eudskacs.sys Wed Apr 18 22:50:01 2012 (4F8F8B69)
Easus Total Backup
https://www.carrona.org/drivers/driver.php?id=eudskacs.sys

eubakup.sys Wed Apr 18 22:50:05 2012 (4F8F8B6D)
EASEUS Todo Backup; CHENGDU YIWO Tech
https://www.carrona.org/drivers/driver.php?id=eubakup.sys

EUBKMON.sys Wed Apr 18 22:50:26 2012 (4F8F8B82)
EaseUS Todo Backup driver
https://www.carrona.org/drivers/driver.php?id=EUBKMON.sys

EuFdDisk.sys Wed Apr 18 22:50:31 2012 (4F8F8B87)
EaseUS Todo Backup driver
https://www.carrona.org/drivers/driver.php?id=EuFdDisk.sys

the following is for reference
Code:
Debug session time: Mon Dec 10 09:47:00.605 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\121012-59997-01.dmp]
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
System Uptime: 0 days 0:04:39.197
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002ebece8, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ebece8, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Wed Nov 21 10:05:19.464 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\112112-73414-01.dmp]
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
System Uptime: 0 days 2:37:44.462
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+51 )
BugCheck 50, {ffffffffffffffe8, 0, fffff800031a3851, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800031a3851, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0x50_nt!ObpQueryNameString+51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Fri Nov  2 08:51:54.523 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\110212-20560-01.dmp]
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
System Uptime: 0 days 0:14:48.505
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+437c1 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+437c1
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Oct  9 08:41:26.466 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\100912-26504-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:03:16.448
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+43d51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Aug 21 08:35:37.409 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\082112-18548-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:06:41.326
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+43d51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Aug 21 08:27:55.612 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\082112-17752-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:02:27.594
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002ccfe88, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ccfe88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Wed Aug 15 09:07:31.663 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\081512-17955-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:18:16.880
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002c73e88, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c73e88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Aug  9 08:53:15.475 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\080912-17971-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:07:43.098
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002cc5e88, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002cc5e88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Aug  7 09:01:56.320 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\080712-20607-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:32:59.317
Probably caused by : fastfat.SYS ( fastfat!FatFlushFat+f1 )
BugCheck 23, {e0107, fffff88008558fc8, fffff88008558820, fffff8800453908d}
BugCheck Info: FAT_FILE_SYSTEM (23)
Bugcheck code 00000023
Arguments: 
Arg1: 00000000000e0107
Arg2: fffff88008558fc8
Arg3: fffff88008558820
Arg4: fffff8800453908d
PROCESS_NAME:  TrueCrypt.exe
BUGCHECK_STR:  0x23
FAILURE_BUCKET_ID:  X64_0x23_fastfat!FatFlushFat+f1
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Jul 26 08:45:36.399 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\072612-18735-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:01:26.022
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+402 )
BugCheck 50, {fffffa80c0000010, 0, fffff80002c8da7a, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffffa80c0000010, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c8da7a, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+402
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Jul 26 08:43:15.717 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\072612-19094-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:07:34.340
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+d3 )
BugCheck 50, {fffff8ac0c4b1570, 0, fffff80002dabe63, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff8ac0c4b1570, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002dabe63, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!ExFreePoolWithTag+d3
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Jul 26 08:33:35.096 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\072612-24804-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:04:05.078
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+43d51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Code:
		***   3rd PARTY DRIVER LIST   *** 




Accelerometer.sys           Fri May 13 13:47:02 2011 (4DCD7CA6)
AtiHdmi.sys                 Thu May  6 04:20:39 2010 (4BE289E7)
AtiPcie64.sys               Wed Mar 10 08:33:45 2010 (4B97ADC9)
EUBKMON.sys                 Wed Apr 18 22:50:26 2012 (4F8F8B82)
EuFdDisk.sys                Wed Apr 18 22:50:31 2012 (4F8F8B87)
Rt64win7.sys                Mon Oct 18 22:53:58 2010 (4CBD1656)
RtsPStor.sys                Thu Mar 24 03:04:09 2011 (4D8AFAF9)
SynTP.sys                   Thu Oct 13 21:34:52 2011 (4E979FCC)
amdiox64.sys                Thu Feb 18 09:17:53 2010 (4B7D5A21)
amdxata.sys                 Fri Mar 19 11:18:18 2010 (4BA3A3CA)
atikmdag.sys                Wed Sep 28 05:04:42 2011 (4E82F13A)
atikmpag.sys                Wed Sep 28 04:34:53 2011 (4E82EA3D)
bcmwl664.sys                Wed Sep  1 19:14:13 2010 (4C7EEC55)
clwvd.sys                   Tue Jul 27 20:13:47 2010 (4C4F844B)
eamonm.sys                  Wed Dec  8 23:29:20 2010 (4D006930)
ehdrv.sys                   Wed Dec  8 23:29:58 2010 (4D006956)
epfwwfpr.sys                Wed Dec  8 23:26:09 2010 (4D006871)
eubakup.sys                 Wed Apr 18 22:50:05 2012 (4F8F8B6D)
eudskacs.sys                Wed Apr 18 22:50:01 2012 (4F8F8B69)
hpdskflt.sys                Fri May 13 13:47:02 2011 (4DCD7CA6)
stwrt64.sys                 Wed Dec  1 20:51:14 2010 (4CF709A2)
truecrypt.sys               Tue Feb  7 03:09:36 2012 (4F30EA50)
usbfilter.sys               Thu Apr 29 05:43:06 2010 (4BD962BA)






https://www.carrona.org/drivers/driver.php?id=Accelerometer.sys
https://www.carrona.org/drivers/driver.php?id=AtiHdmi.sys
https://www.carrona.org/drivers/driver.php?id=AtiPcie64.sys
https://www.carrona.org/drivers/driver.php?id=EUBKMON.sys
https://www.carrona.org/drivers/driver.php?id=EuFdDisk.sys
https://www.carrona.org/drivers/driver.php?id=Rt64win7.sys
https://www.carrona.org/drivers/driver.php?id=RtsPStor.sys
https://www.carrona.org/drivers/driver.php?id=SynTP.sys
https://www.carrona.org/drivers/driver.php?id=amdiox64.sys
https://www.carrona.org/drivers/driver.php?id=amdxata.sys
https://www.carrona.org/drivers/driver.php?id=atikmdag.sys
https://www.carrona.org/drivers/driver.php?id=atikmpag.sys
https://www.carrona.org/drivers/driver.php?id=bcmwl664.sys
https://www.carrona.org/drivers/driver.php?id=clwvd.sys
https://www.carrona.org/drivers/driver.php?id=eamonm.sys
https://www.carrona.org/drivers/driver.php?id=ehdrv.sys
https://www.carrona.org/drivers/driver.php?id=epfwwfpr.sys
https://www.carrona.org/drivers/driver.php?id=eubakup.sys
https://www.carrona.org/drivers/driver.php?id=eudskacs.sys
https://www.carrona.org/drivers/driver.php?id=hpdskflt.sys
https://www.carrona.org/drivers/driver.php?id=stwrt64.sys
https://www.carrona.org/drivers/driver.php?id=truecrypt.sys
https://www.carrona.org/drivers/driver.php?id=usbfilter.sys
maybe hardware problem? none of the drivers appear to be bad.
joek0617 is offline  
Sponsored Links
Advertisement
 
Old 12-12-2012, 06:14 PM   #4
Registered Member
 
Join Date: Oct 2012
Location: Minneapolis, MN
Posts: 321
OS: laptop: Debian; desktop: Win 10 pro,



Memtest86+ - Advanced Memory Diagnostic Tool
run that. also, remove truecrypt for the time being, if you can.
joek0617 is offline  
Old 12-13-2012, 05:31 AM   #5
TSF Enthusiast
 
Join Date: Jul 2012
Location: Colorado
Posts: 3,036
OS: Windows 7 Home Premium x64

My System


It is very difficult to find patterns with just the .dmp files. As suggested by makinu1der2, please follow the https://www.techsupportforum.com/foru...ta-452654.html to provide us with more information.



-----
writhziden is offline  
Old 12-13-2012, 12:32 PM   #6
Registered Member
 
Join Date: Dec 2012
Posts: 28
OS: Windows 7 64-bit



Hi guys,

I ran the app that gathers more info. i attached the zip folder to this message.

Let me know what you think.


Thanks
Attached Files
File Type: zip Windows7_Vista_jcgriff2.zip (2.86 MB, 81 views)
immigranta is offline  
Old 12-13-2012, 09:05 PM   #7
TSF Enthusiast
 
Join Date: Jul 2012
Location: Colorado
Posts: 3,036
OS: Windows 7 Home Premium x64

My System


I see nothing abnormal with your system beyond the TrueCrypt related crashes. Remove TrueCrypt as suggested by joek0617.

I also see ESET involved in the crashes. You can try running with TrueCrypt installed and ESET replaced with Microsoft Security Essentials to see if ESET is the cause. Then do vice versa, ESET installed and TrueCrypt removed. There may be a conflict with the two programs.
How do I uninstall or reinstall ESET Smart Security/ESET NOD32 Antivirus in Windows 7/Vista/XP? (5.x) - ESET Knowledgebase

Uninstall or change a program

Microsoft Security Essentials - Microsoft Windows

Nice work joek0617!



-----
writhziden is offline  
Old 12-14-2012, 06:32 AM   #8
Registered Member
 
Join Date: Dec 2012
Posts: 28
OS: Windows 7 64-bit



Thanks guys for your quick response.
I do need Trucrypt but if it is the reason i will have to think something else.
ESET can also be swapped with MSE.
The thing is that is happens so rarely that i wonder how it is possible. I mean if there is a problem shouldn't it happening all the time?

Lastly, where exactly saw those crashes so i can take a peak and learn something new.

Thanks again.
immigranta is offline  
Old 12-14-2012, 08:42 AM   #9
TSF Enthusiast
 
Join Date: Jul 2012
Location: Colorado
Posts: 3,036
OS: Windows 7 Home Premium x64

My System


Here is how I do it: How I Debug Crashes.

As to why it does not happen a lot, it may just be that only specific tasks cause both ESET and TrueCrypt to utilize system resources that result in a conflict. Those specific tasks may not coincide very often, so the crashes do not happen very often.

TrueCrypt can be seen as the process running during the majority of crashes within joek0617's analysis.
Code:
Debug session time: Mon Dec 10 09:47:00.605 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\121012-59997-01.dmp]
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
System Uptime: 0 days 0:04:39.197
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002ebece8, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ebece8, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Wed Nov 21 10:05:19.464 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\112112-73414-01.dmp]
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
System Uptime: 0 days 2:37:44.462
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+51 )
BugCheck 50, {ffffffffffffffe8, 0, fffff800031a3851, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800031a3851, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0x50_nt!ObpQueryNameString+51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Fri Nov  2 08:51:54.523 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\110212-20560-01.dmp]
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
System Uptime: 0 days 0:14:48.505
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+437c1 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+437c1
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Oct  9 08:41:26.466 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\100912-26504-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:03:16.448
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+43d51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Aug 21 08:35:37.409 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\082112-18548-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:06:41.326
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+43d51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Aug 21 08:27:55.612 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\082112-17752-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:02:27.594
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002ccfe88, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ccfe88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Wed Aug 15 09:07:31.663 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\081512-17955-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:18:16.880
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002c73e88, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c73e88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Aug  9 08:53:15.475 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\080912-17971-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:07:43.098
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
BugCheck 50, {ffffffffffffffa9, 0, fffff80002cc5e88, 0}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: ffffffffffffffa9, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002cc5e88, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!KiApcInterrupt+d8
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Tue Aug  7 09:01:56.320 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\080712-20607-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:32:59.317
Probably caused by : fastfat.SYS ( fastfat!FatFlushFat+f1 )
BugCheck 23, {e0107, fffff88008558fc8, fffff88008558820, fffff8800453908d}
BugCheck Info: FAT_FILE_SYSTEM (23)
Bugcheck code 00000023
Arguments: 
Arg1: 00000000000e0107
Arg2: fffff88008558fc8
Arg3: fffff88008558820
Arg4: fffff8800453908d
PROCESS_NAME:  TrueCrypt.exe
BUGCHECK_STR:  0x23
FAILURE_BUCKET_ID:  X64_0x23_fastfat!FatFlushFat+f1
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Jul 26 08:45:36.399 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\072612-18735-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:01:26.022
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+402 )
BugCheck 50, {fffffa80c0000010, 0, fffff80002c8da7a, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffffa80c0000010, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c8da7a, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+402
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Jul 26 08:43:15.717 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\072612-19094-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:07:34.340
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+d3 )
BugCheck 50, {fffff8ac0c4b1570, 0, fffff80002dabe63, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff8ac0c4b1570, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002dabe63, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_nt!ExFreePoolWithTag+d3
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
Debug session time: Thu Jul 26 08:33:35.096 2012 (UTC - 6:00)
Loading Dump File [C:\Users\Owner\Downloads\other minidumps\072612-24804-01.dmp]
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
System Uptime: 0 days 0:04:05.078
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
BugCheck Info: PAGE_FAULT_IN_NONPAGED_AREA (50)
Bugcheck code 00000050
Arguments: 
Arg1: fffff800c0000010, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800c0000010, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)
BUGCHECK_STR:  0x50
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  TrueCrypt.exe
FAILURE_BUCKET_ID:  X64_0x50_BAD_IP_nt!_??_::FNODOBFM::_string_+43d51
BiosVersion = F.04
BiosReleaseDate = 03/10/2011
SystemManufacturer = Hewlett-Packard
SystemProductName = HP Pavilion dv6 Notebook PC
จจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจจ``
The niemiro output is what points to ESET as being involved:
Code:
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\121012-59997-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02e4d000 PsLoadedModuleList = 0xfffff800`03091670
Debug session time: Mon Dec 10 08:47:00.605 2012 (UTC - 7:00)
System Uptime: 0 days 0:04:39.197
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffa9, 0, fffff80002ebece8, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
1: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`07ccbe58  fffff800`02e73eec nt! ?? ::FNODOBFM::`string'+0x4514f
fffff880`07ccbe88  fffff800`02ed161a nt!KiDeferredReadyThread+0x31a
fffff880`07ccbfb8  fffff800`02eca0ee nt!KiPageFault+0x16e
fffff880`07ccc018  fffff800`02e4d000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`07ccc0c8  fffff800`02ebea37 nt!KiDeliverApc+0x1c7
fffff880`07ccc0d8  fffff880`02a4a148Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
fffff880`07ccc0f8  fffff800`0319f4c3 nt!CmpGetValueData+0x73
fffff880`07ccc128  fffff800`02ebece8 nt!KiApcInterrupt+0xd8
fffff880`07ccc1b8  fffff800`02ff7fbd nt!ExFreePoolWithTag+0x22d
fffff880`07ccc268  fffff800`03271296 nt!CmpCallCallBacks+0x4f6
fffff880`07ccc2b8  fffff800`03197fed nt!HvpGetCellPaged+0x5d
fffff880`07ccc338  fffff800`0317dccf nt!CmEnumerateKey+0x11f
fffff880`07ccc358  fffff800`02ff7fbd nt!ExFreePoolWithTag+0x22d
fffff880`07ccc368  fffff880`0142b236Unable to load image \SystemRoot\system32\DRIVERS\ehdrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`07ccc468  fffff800`0317e143 nt!NtEnumerateKey+0x261
fffff880`07ccc4a8  fffff800`02ff71de nt!ExAllocatePoolWithTag+0xfe
fffff880`07ccc548  fffff800`02ecb253 nt!KiSystemServiceCopyEnd+0x13
fffff880`07ccc5a8  fffff800`02ecb253 nt!KiSystemServiceCopyEnd+0x13
fffff880`07ccc608  fffff880`010cf92f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`07ccc638  fffff800`02ff7fbd nt!ExFreePoolWithTag+0x22d
fffff880`07ccc6b8  fffff800`02ec7810 nt!KiServiceLinkage
fffff880`07ccc6e8  fffff880`010e8f34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`07ccc748  fffff880`010d4978 fltmgr!FltpRegAltitudeValueName
fffff880`07ccc788  fffff800`02ec7810 nt!KiServiceLinkage
fffff880`07ccc7b8  fffff880`010e9cec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`07ccc828  fffff880`010c672e fltmgr!FltObjectReference+0xe
fffff880`07ccc858  fffff880`010e7dbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`07ccc8c8  fffff880`010e33f0 fltmgr!FltpCreate+0x3e0
fffff880`07ccc978  fffff800`031c5b35 nt!IopParseDevice+0x5a5
fffff880`07ccc9c8  fffff800`031bf094 nt!ObpCloseHandle+0x94
fffff880`07ccca78  fffff800`031c17da nt!SeQueryInformationToken+0x4a
fffff880`07ccca90  fffff800`031c8180 nt! ?? ::NNGAKEGL::`string'
fffff880`07cccaa8  fffff800`031c3008 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`07cccae0  fffff800`031cfb70 nt!ObpParseSymbolicLink
fffff880`07cccaf0  fffff800`031c5590 nt!IopParseDevice
fffff880`07cccb00  fffff800`02e4d000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`07cccb08  fffff800`031c23d8 nt!ObpLookupObjectName+0x588
fffff880`07cccbf8  fffff800`031c35f6 nt!ObOpenObjectByName+0x306
fffff880`07cccc58  fffff800`02eed923 nt!RtlpOwnerAcesPresent+0xc3
fffff880`07ccccc8  fffff800`031c4efc nt!IopCreateFile+0x2bc
fffff880`07ccccd0  fffff800`03075b20 nt!ObTypeIndexTable
fffff880`07cccd08  fffff800`031c3008 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`07cccd68  fffff800`031cfb54 nt!NtCreateFile+0x78
fffff880`07cccdf8  fffff800`02ecb253 nt!KiSystemServiceCopyEnd+0x13
fffff880`07ccce08  fffff800`031b1e37 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\112112-73414-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02e51000 PsLoadedModuleList = 0xfffff800`03095670
Debug session time: Wed Nov 21 09:05:19.464 2012 (UTC - 7:00)
System Uptime: 0 days 2:37:44.462
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffe8, 0, fffff800031a3851, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+51 )
2: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`031ca618  fffff800`02e77eec nt! ?? ::FNODOBFM::`string'+0x4514f
fffff880`031ca658  fffff800`031c2e66 nt!ExDestroyHandle+0x66
fffff880`031ca6e8  fffff800`02ed561a nt!KiDeferredReadyThread+0x31a
fffff880`031ca6f0  fffff800`03042e80 nt!KiInitialPCR+0x180
fffff880`031ca778  fffff800`02ece0ee nt!KiPageFault+0x16e
fffff880`031ca858  fffff800`02ee5038 nt!IopCompleteRequest+0xd28
fffff880`031ca898  fffff800`03057580 nt!NonPagedPoolDescriptor
fffff880`031ca8a8  fffff800`02eefd6d nt!ExpAllocateBigPool+0xcd
fffff880`031ca8e8  fffff800`031a3851 nt!ObpQueryNameString+0x51
fffff880`031ca968  fffff800`03057580 nt!NonPagedPoolDescriptor
fffff880`031ca998  fffff800`02ffb90e nt!ExAllocatePoolWithTag+0x82e
fffff880`031caa08  fffff800`031ab476 nt!ObQueryNameString+0xe
fffff880`031cab18  fffff800`03274cdf nt!CmpCallbackFillObjectContext+0xcf
fffff880`031cab38  fffff880`015cc236*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`031cab68  fffff800`03275230 nt!CmpCallCallBacks+0x490
fffff880`031cabc8  fffff800`03275296 nt!CmpCallCallBacks+0x4f6
fffff880`031cac38  fffff800`03211b5e nt! ?? ::NNGAKEGL::`string'+0x367df
fffff880`031cace8  fffff800`031c2ccd nt!ObpDecrementHandleCount+0x6d
fffff880`031cad08  fffff800`02ed91d4 nt!ObfDereferenceObject+0xd4
fffff880`031cad38  fffff800`031c2e66 nt!ExDestroyHandle+0x66
fffff880`031cad68  fffff800`031c2ae4 nt!ObpCloseHandleTableEntry+0xc4
fffff880`031cadc8  fffff800`031c30f6 nt!ExMapHandleToPointer+0x26
fffff880`031cadf8  fffff800`031c3094 nt!ObpCloseHandle+0x94
fffff880`031cae48  fffff800`02ecf253 nt!KiSystemServiceCopyEnd+0x13
fffff880`031cae68  fffff800`02ffbfbd nt!ExFreePoolWithTag+0x22d
fffff880`031caee8  fffff800`02ecb810 nt!KiServiceLinkage
fffff880`031caf18  fffff880`0108df34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`031caf38  fffff800`02ffbfbd nt!ExFreePoolWithTag+0x22d
fffff880`031cafb8  fffff800`02ecb810 nt!KiServiceLinkage
fffff880`031cafe8  fffff880`0108eddb fltmgr!FltpEnumerateRegistryInstances+0x18b
fffff880`031cb058  fffff880`0106b72e fltmgr!FltObjectReference+0xe
fffff880`031cb088  fffff880`0108cdbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`031cb0f8  fffff880`010883f0 fltmgr!FltpCreate+0x3e0
fffff880`031cb1a8  fffff800`031c9b35 nt!IopParseDevice+0x5a5
fffff880`031cb2a8  fffff800`031c57da nt!SeQueryInformationToken+0x4a
fffff880`031cb2c0  fffff800`031cc180 nt! ?? ::NNGAKEGL::`string'
fffff880`031cb2c8  fffff800`031c4d38 nt!ObpIncrementHandleCountEx+0x278
fffff880`031cb2d8  fffff800`031c7008 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`031cb310  fffff800`031d3b70 nt!ObpParseSymbolicLink
fffff880`031cb320  fffff800`031c9590 nt!IopParseDevice
fffff880`031cb330  fffff800`02e51000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`031cb338  fffff800`031c63d8 nt!ObpLookupObjectName+0x588
fffff880`031cb428  fffff800`031c75f6 nt!ObOpenObjectByName+0x306
fffff880`031cb488  fffff800`02ee0f21 nt!IopAllocateIrpPrivate+0x141
fffff880`031cb4f8  fffff800`031c8efc nt!IopCreateFile+0x2bc
fffff880`031cb518  fffff800`031d361a nt!IopCloseFile+0x14a
fffff880`031cb598  fffff800`031d3b54 nt!NtCreateFile+0x78
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\110212-20560-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02e52000 PsLoadedModuleList = 0xfffff800`03096670
Debug session time: Fri Nov  2 07:51:54.523 2012 (UTC - 7:00)
System Uptime: 0 days 0:14:48.505
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+437c1 )
1: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`04678e48  fffff800`02e778af nt! ?? ::FNODOBFM::`string'+0x437c1
fffff880`04678e78  fffff800`02ed661a nt!KiDeferredReadyThread+0x31a
fffff880`04678fa8  fffff800`02ecf0ee nt!KiPageFault+0x16e
fffff880`04679008  fffff800`02e52000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`046790b8  fffff800`02ec3a37 nt!KiDeliverApc+0x1c7
fffff880`046790d8  fffff880`028cf148Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
fffff880`04679178  fffff800`0304d000 nt!CmpRegistryLock
fffff880`04679268  fffff800`03276296 nt!CmpCallCallBacks+0x4f6
fffff880`046792a8  fffff800`02ed6eb6 nt!ExAcquireResourceSharedLite+0x16
fffff880`04679338  fffff800`03182c6c nt!CmEnumerateKey+0xbc
fffff880`04679358  fffff800`02ffcfbd nt!ExFreePoolWithTag+0x22d
fffff880`04679368  fffff880`018b3236Unable to load image \SystemRoot\system32\DRIVERS\ehdrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`04679468  fffff800`03183143 nt!NtEnumerateKey+0x261
fffff880`046794a8  fffff800`02ffc1de nt!ExAllocatePoolWithTag+0xfe
fffff880`04679548  fffff800`02ed0253 nt!KiSystemServiceCopyEnd+0x13
fffff880`046795a8  fffff800`02ed0253 nt!KiSystemServiceCopyEnd+0x13
fffff880`04679608  fffff880`010a292f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`04679638  fffff800`02ffcfbd nt!ExFreePoolWithTag+0x22d
fffff880`046796b8  fffff800`02ecc810 nt!KiServiceLinkage
fffff880`046796e8  fffff880`010bbf34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`04679748  fffff880`010a7978 fltmgr!FltpRegAltitudeValueName
fffff880`04679788  fffff800`02ecc810 nt!KiServiceLinkage
fffff880`046797b8  fffff880`010bccec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`04679828  fffff880`0109972e fltmgr!FltObjectReference+0xe
fffff880`04679858  fffff880`010badbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`046798c8  fffff880`010b63f0 fltmgr!FltpCreate+0x3e0
fffff880`04679978  fffff800`031cab35 nt!IopParseDevice+0x5a5
fffff880`046799c8  fffff800`031c4094 nt!ObpCloseHandle+0x94
fffff880`04679a78  fffff800`031c67da nt!SeQueryInformationToken+0x4a
fffff880`04679a90  fffff800`031cd180 nt! ?? ::NNGAKEGL::`string'
fffff880`04679aa8  fffff800`031c8008 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`04679ae0  fffff800`031d4b70 nt!ObpParseSymbolicLink
fffff880`04679af0  fffff800`031ca590 nt!IopParseDevice
fffff880`04679b00  fffff800`02e52000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`04679b08  fffff800`031c73d8 nt!ObpLookupObjectName+0x588
fffff880`04679bf8  fffff800`031c85f6 nt!ObOpenObjectByName+0x306
fffff880`04679c58  fffff800`02ef2923 nt!RtlpOwnerAcesPresent+0xc3
fffff880`04679cc8  fffff800`031c9efc nt!IopCreateFile+0x2bc
fffff880`04679cd0  fffff800`0307ab20 nt!ObTypeIndexTable
fffff880`04679d08  fffff800`031c8008 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`04679d68  fffff800`031d4b54 nt!NtCreateFile+0x78
fffff880`04679df8  fffff800`02ed0253 nt!KiSystemServiceCopyEnd+0x13
fffff880`04679e08  fffff800`031b6e37 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\100912-26504-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03090670
Debug session time: Tue Oct  9 07:41:26.466 2012 (UTC - 7:00)
System Uptime: 0 days 0:03:16.448
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
2: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`0ab8ce48  fffff800`02e71f0f nt! ?? ::FNODOBFM::`string'+0x43d51
fffff880`0ab8ceb8  fffff800`031be1a6 nt!ExMapHandleToPointer+0x26
fffff880`0ab8cec8  fffff800`02e0ab7f hal!HalSendSoftwareInterrupt+0x48
fffff880`0ab8cf60  fffff800`03068288 nt!ExWorkerQueue+0x8
fffff880`0ab8cfa8  fffff800`02ec92ee nt!KiPageFault+0x16e
fffff880`0ab8cfe0  fffff800`03068298 nt!ExWorkerQueue+0x18
fffff880`0ab8d008  fffff800`02e4c000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`0ab8d0a8  fffff800`02ec6a10 nt!KiServiceLinkage
fffff880`0ab8d0f8  fffff800`0319e553 nt!CmpGetValueData+0x73
fffff880`0ab8d1b8  fffff800`02ebde87 nt!KiApcInterrupt+0xd7
fffff880`0ab8d2a8  fffff800`02ff6350 nt!ExAllocatePoolWithTag+0x270
fffff880`0ab8d328  fffff800`031967e4 nt!CmKeyBodyRemapToVirtualForEnum+0x54
fffff880`0ab8d358  fffff800`02ff6fbd nt!ExFreePoolWithTag+0x22d
fffff880`0ab8d368  fffff880`018f5236Unable to load image \SystemRoot\system32\DRIVERS\ehdrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`0ab8d398  fffff800`0327009e nt!CmpCallCallBacks+0x29e
fffff880`0ab8d468  fffff800`0317d16f nt!NtEnumerateKey+0x22d
fffff880`0ab8d4a8  fffff800`02ff61de nt!ExAllocatePoolWithTag+0xfe
fffff880`0ab8d548  fffff800`02eca453 nt!KiSystemServiceCopyEnd+0x13
fffff880`0ab8d5a8  fffff800`02eca453 nt!KiSystemServiceCopyEnd+0x13
fffff880`0ab8d608  fffff880`0108b92f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`0ab8d638  fffff800`02ff6fbd nt!ExFreePoolWithTag+0x22d
fffff880`0ab8d6b8  fffff800`02ec6a10 nt!KiServiceLinkage
fffff880`0ab8d6e8  fffff880`010a4f34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`0ab8d748  fffff880`01090978 fltmgr!FltpRegAltitudeValueName
fffff880`0ab8d788  fffff800`02ec6a10 nt!KiServiceLinkage
fffff880`0ab8d7b8  fffff880`010a5cec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`0ab8d828  fffff880`0108272e fltmgr!FltObjectReference+0xe
fffff880`0ab8d858  fffff880`010a3dbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`0ab8d8c8  fffff880`0109f3f0 fltmgr!FltpCreate+0x3e0
fffff880`0ab8d978  fffff800`031c4be5 nt!IopParseDevice+0x5a5
fffff880`0ab8d9c8  fffff800`031be144 nt!ObpCloseHandle+0x94
fffff880`0ab8da78  fffff800`031c088a nt!SeQueryInformationToken+0x4a
fffff880`0ab8da90  fffff800`031c7230 nt! ?? ::NNGAKEGL::`string'
fffff880`0ab8daa8  fffff800`031c20b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`0ab8dae0  fffff800`031cec20 nt!ObpParseSymbolicLink
fffff880`0ab8daf0  fffff800`031c4640 nt!IopParseDevice
fffff880`0ab8db00  fffff800`02e4c000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`0ab8db08  fffff800`031c1488 nt!ObpLookupObjectName+0x588
fffff880`0ab8dbf8  fffff800`031c26a6 nt!ObOpenObjectByName+0x306
fffff880`0ab8dc58  fffff800`02eecc63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`0ab8dcc8  fffff800`031c3fac nt!IopCreateFile+0x2bc
fffff880`0ab8dcd0  fffff800`03074b20 nt!ObTypeIndexTable
fffff880`0ab8dd08  fffff800`031c20b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`0ab8dd68  fffff800`031cec04 nt!NtCreateFile+0x78
fffff880`0ab8ddf8  fffff800`02eca453 nt!KiSystemServiceCopyEnd+0x13
fffff880`0ab8de08  fffff800`031b0ed7 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\082112-18548-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c5e000 PsLoadedModuleList = 0xfffff800`02ea2670
Debug session time: Tue Aug 21 07:35:37.409 2012 (UTC - 7:00)
System Uptime: 0 days 0:06:41.326
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
1: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`09e10e48  fffff800`02c83f0f nt! ?? ::FNODOBFM::`string'+0x43d51
fffff880`09e10eb8  fffff800`02fd01a6 nt!ExMapHandleToPointer+0x26
fffff880`09e10ec8  fffff800`02c1cb7f hal!HalSendSoftwareInterrupt+0x48
fffff880`09e10f60  fffff800`02e7a288 nt!ExWorkerQueue+0x8
fffff880`09e10fa8  fffff800`02cdb2ee nt!KiPageFault+0x16e
fffff880`09e10fe0  fffff800`02e7a298 nt!ExWorkerQueue+0x18
fffff880`09e11008  fffff800`02c5e000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09e110a8  fffff800`02cd8a10 nt!KiServiceLinkage
fffff880`09e110f8  fffff800`02fb0553 nt!CmpGetValueData+0x73
fffff880`09e111b8  fffff800`02ccfe87 nt!KiApcInterrupt+0xd7
fffff880`09e112a8  fffff800`02e08350 nt!ExAllocatePoolWithTag+0x270
fffff880`09e11328  fffff800`02fa8803 nt!CmKeyBodyRemapToVirtualForEnum+0x73
fffff880`09e11358  fffff800`02e08fbd nt!ExFreePoolWithTag+0x22d
fffff880`09e11368  fffff880`01455236*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`09e11398  fffff800`0308209e nt!CmpCallCallBacks+0x29e
fffff880`09e11468  fffff800`02f8f16f nt!NtEnumerateKey+0x22d
fffff880`09e114a8  fffff800`02e081de nt!ExAllocatePoolWithTag+0xfe
fffff880`09e11548  fffff800`02cdc453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09e115a8  fffff800`02cdc453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09e11608  fffff880`0108092f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`09e11638  fffff800`02e08fbd nt!ExFreePoolWithTag+0x22d
fffff880`09e116b8  fffff800`02cd8a10 nt!KiServiceLinkage
fffff880`09e116e8  fffff880`01099f34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`09e11748  fffff880`01085978 fltmgr!FltpRegAltitudeValueName
fffff880`09e11788  fffff800`02cd8a10 nt!KiServiceLinkage
fffff880`09e117b8  fffff880`0109acec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`09e11828  fffff880`0107772e fltmgr!FltObjectReference+0xe
fffff880`09e11858  fffff880`01098dbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`09e118c8  fffff880`010943f0 fltmgr!FltpCreate+0x3e0
fffff880`09e11978  fffff800`02fd6be5 nt!IopParseDevice+0x5a5
fffff880`09e119c8  fffff800`02fd0144 nt!ObpCloseHandle+0x94
fffff880`09e11a78  fffff800`02fd288a nt!SeQueryInformationToken+0x4a
fffff880`09e11a90  fffff800`02fd9230 nt! ?? ::NNGAKEGL::`string'
fffff880`09e11aa8  fffff800`02fd40b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09e11ae0  fffff800`02fe0c20 nt!ObpParseSymbolicLink
fffff880`09e11af0  fffff800`02fd6640 nt!IopParseDevice
fffff880`09e11b00  fffff800`02c5e000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09e11b08  fffff800`02fd3488 nt!ObpLookupObjectName+0x588
fffff880`09e11bf8  fffff800`02fd46a6 nt!ObOpenObjectByName+0x306
fffff880`09e11c58  fffff800`02cfec63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`09e11cc8  fffff800`02fd5fac nt!IopCreateFile+0x2bc
fffff880`09e11cd0  fffff800`02e86b20 nt!ObTypeIndexTable
fffff880`09e11d08  fffff800`02fd40b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09e11d68  fffff800`02fe0c04 nt!NtCreateFile+0x78
fffff880`09e11df8  fffff800`02cdc453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09e11e08  fffff800`02fc2ed7 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\082112-17752-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c5e000 PsLoadedModuleList = 0xfffff800`02ea2670
Debug session time: Tue Aug 21 07:27:55.612 2012 (UTC - 7:00)
System Uptime: 0 days 0:02:27.594
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffa9, 0, fffff80002ccfe88, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
3: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`09c4be58  fffff800`02c8554c nt! ?? ::FNODOBFM::`string'+0x456df
fffff880`09c4be88  fffff800`02ce281a nt!KiDeferredReadyThread+0x31a
fffff880`09c4bfb8  fffff800`02cdb2ee nt!KiPageFault+0x16e
fffff880`09c4c018  fffff800`02c5e000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09c4c0c8  fffff800`02ccfbd7 nt!KiDeliverApc+0x1c7
fffff880`09c4c0d8  fffff880`062b4148Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
fffff880`09c4c0f8  fffff800`02fb0553 nt!CmpGetValueData+0x73
fffff880`09c4c128  fffff800`02ccfe88 nt!KiApcInterrupt+0xd8
fffff880`09c4c1b8  fffff800`02e08fbd nt!ExFreePoolWithTag+0x22d
fffff880`09c4c268  fffff800`030822f6 nt!CmpCallCallBacks+0x4f6
fffff880`09c4c2b8  fffff800`02fa9092 nt!HvpGetCellPaged+0x92
fffff880`09c4c338  fffff800`02f8ed2f nt!CmEnumerateKey+0x11f
fffff880`09c4c358  fffff800`02e08fbd nt!ExFreePoolWithTag+0x22d
fffff880`09c4c368  fffff880`0142b236Unable to load image \SystemRoot\system32\DRIVERS\ehdrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`09c4c468  fffff800`02f8f1a3 nt!NtEnumerateKey+0x261
fffff880`09c4c4a8  fffff800`02e081de nt!ExAllocatePoolWithTag+0xfe
fffff880`09c4c548  fffff800`02cdc453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09c4c5a8  fffff800`02cdc453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09c4c608  fffff880`010c392f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`09c4c638  fffff800`02e08fbd nt!ExFreePoolWithTag+0x22d
fffff880`09c4c6b8  fffff800`02cd8a10 nt!KiServiceLinkage
fffff880`09c4c6e8  fffff880`010dcf34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`09c4c748  fffff880`010c8978 fltmgr!FltpRegAltitudeValueName
fffff880`09c4c788  fffff800`02cd8a10 nt!KiServiceLinkage
fffff880`09c4c7b8  fffff880`010ddcec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`09c4c828  fffff880`010ba72e fltmgr!FltObjectReference+0xe
fffff880`09c4c858  fffff880`010dbdbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`09c4c8c8  fffff880`010d73f0 fltmgr!FltpCreate+0x3e0
fffff880`09c4c978  fffff800`02fd6be5 nt!IopParseDevice+0x5a5
fffff880`09c4c9c8  fffff800`02fd0144 nt!ObpCloseHandle+0x94
fffff880`09c4ca78  fffff800`02fd288a nt!SeQueryInformationToken+0x4a
fffff880`09c4ca90  fffff800`02fd9230 nt! ?? ::NNGAKEGL::`string'
fffff880`09c4caa8  fffff800`02fd40b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09c4cae0  fffff800`02fe0c20 nt!ObpParseSymbolicLink
fffff880`09c4caf0  fffff800`02fd6640 nt!IopParseDevice
fffff880`09c4cb00  fffff800`02c5e000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09c4cb08  fffff800`02fd3488 nt!ObpLookupObjectName+0x588
fffff880`09c4cbf8  fffff800`02fd46a6 nt!ObOpenObjectByName+0x306
fffff880`09c4cc58  fffff800`02cfec63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`09c4ccc8  fffff800`02fd5fac nt!IopCreateFile+0x2bc
fffff880`09c4ccd0  fffff800`02e86b20 nt!ObTypeIndexTable
fffff880`09c4cd08  fffff800`02fd40b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09c4cd68  fffff800`02fe0c04 nt!NtCreateFile+0x78
fffff880`09c4cdf8  fffff800`02cdc453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09c4ce08  fffff800`02fc2ed7 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\081512-17955-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e46670
Debug session time: Wed Aug 15 08:07:31.663 2012 (UTC - 7:00)
System Uptime: 0 days 0:18:16.880
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffa9, 0, fffff80002c73e88, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
3: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`09ee0e58  fffff800`02c2954c nt! ?? ::FNODOBFM::`string'+0x456df
fffff880`09ee0e88  fffff800`02c8681a nt!KiDeferredReadyThread+0x31a
fffff880`09ee0fb8  fffff800`02c7f2ee nt!KiPageFault+0x16e
fffff880`09ee1018  fffff800`02c02000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09ee10c8  fffff800`02c73bd7 nt!KiDeliverApc+0x1c7
fffff880`09ee10d8  fffff880`06e73148Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
fffff880`09ee10f8  fffff800`02f54553 nt!CmpGetValueData+0x73
fffff880`09ee1128  fffff800`02c73e88 nt!KiApcInterrupt+0xd8
fffff880`09ee11b8  fffff800`02dacfbd nt!ExFreePoolWithTag+0x22d
fffff880`09ee1268  fffff800`030262f6 nt!CmpCallCallBacks+0x4f6
fffff880`09ee12b8  fffff800`02f4d131 nt!HvpGetCellPaged+0x131
fffff880`09ee1338  fffff800`02f32d2f nt!CmEnumerateKey+0x11f
fffff880`09ee1358  fffff800`02dacfbd nt!ExFreePoolWithTag+0x22d
fffff880`09ee1368  fffff880`015cb236Unable to load image \SystemRoot\system32\DRIVERS\ehdrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`09ee1468  fffff800`02f331a3 nt!NtEnumerateKey+0x261
fffff880`09ee14a8  fffff800`02dac1de nt!ExAllocatePoolWithTag+0xfe
fffff880`09ee1548  fffff800`02c80453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09ee15a8  fffff800`02c80453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09ee1608  fffff880`0106092f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`09ee1638  fffff800`02dacfbd nt!ExFreePoolWithTag+0x22d
fffff880`09ee16b8  fffff800`02c7ca10 nt!KiServiceLinkage
fffff880`09ee16e8  fffff880`01079f34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`09ee1748  fffff880`01065978 fltmgr!FltpRegAltitudeValueName
fffff880`09ee1788  fffff800`02c7ca10 nt!KiServiceLinkage
fffff880`09ee17b8  fffff880`0107acec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`09ee1828  fffff880`0105772e fltmgr!FltObjectReference+0xe
fffff880`09ee1858  fffff880`01078dbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`09ee18c8  fffff880`010743f0 fltmgr!FltpCreate+0x3e0
fffff880`09ee1978  fffff800`02f7abe5 nt!IopParseDevice+0x5a5
fffff880`09ee19c8  fffff800`02f74144 nt!ObpCloseHandle+0x94
fffff880`09ee1a78  fffff800`02f7688a nt!SeQueryInformationToken+0x4a
fffff880`09ee1a90  fffff800`02f7d230 nt! ?? ::NNGAKEGL::`string'
fffff880`09ee1aa8  fffff800`02f780b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09ee1ae0  fffff800`02f84c20 nt!ObpParseSymbolicLink
fffff880`09ee1af0  fffff800`02f7a640 nt!IopParseDevice
fffff880`09ee1b00  fffff800`02c02000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09ee1b08  fffff800`02f77488 nt!ObpLookupObjectName+0x588
fffff880`09ee1bf8  fffff800`02f786a6 nt!ObOpenObjectByName+0x306
fffff880`09ee1c58  fffff800`02ca2c63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`09ee1cc8  fffff800`02f79fac nt!IopCreateFile+0x2bc
fffff880`09ee1cd0  fffff800`02e2ab20 nt!ObTypeIndexTable
fffff880`09ee1d08  fffff800`02f780b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09ee1d68  fffff800`02f84c04 nt!NtCreateFile+0x78
fffff880`09ee1df8  fffff800`02c80453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09ee1e08  fffff800`02f66ed7 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\080912-17971-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e98670
Debug session time: Thu Aug  9 07:53:15.475 2012 (UTC - 7:00)
System Uptime: 0 days 0:07:43.098
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffa9, 0, fffff80002cc5e88, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+d8 )
1: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`09d6be58  fffff800`02c7b54c nt! ?? ::FNODOBFM::`string'+0x456df
fffff880`09d6be88  fffff800`02cd881a nt!KiDeferredReadyThread+0x31a
fffff880`09d6be90  fffff800`02e45e80 nt!KiInitialPCR+0x180
fffff880`09d6bfb8  fffff800`02cd12ee nt!KiPageFault+0x16e
fffff880`09d6c018  fffff800`02c54000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09d6c0c8  fffff800`02cc5bd7 nt!KiDeliverApc+0x1c7
fffff880`09d6c0d8  fffff880`07cfd148Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
fffff880`09d6c0f8  fffff800`02fa6553 nt!CmpGetValueData+0x73
fffff880`09d6c128  fffff800`02cc5e88 nt!KiApcInterrupt+0xd8
fffff880`09d6c1b8  fffff800`02dfefbd nt!ExFreePoolWithTag+0x22d
fffff880`09d6c268  fffff800`030782f6 nt!CmpCallCallBacks+0x4f6
fffff880`09d6c2b8  fffff800`02f9f024 nt!HvpGetCellPaged+0x24
fffff880`09d6c338  fffff800`02f84d2f nt!CmEnumerateKey+0x11f
fffff880`09d6c358  fffff800`02dfefbd nt!ExFreePoolWithTag+0x22d
fffff880`09d6c368  fffff880`015cf236Unable to load image \SystemRoot\system32\DRIVERS\ehdrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ehdrv.sys
*** ERROR: Module load completed but symbols could not be loaded for ehdrv.sys
fffff880`09d6c468  fffff800`02f851a3 nt!NtEnumerateKey+0x261
fffff880`09d6c4a8  fffff800`02dfe1de nt!ExAllocatePoolWithTag+0xfe
fffff880`09d6c548  fffff800`02cd2453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09d6c5a8  fffff800`02cd2453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09d6c608  fffff880`010fc92f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`09d6c638  fffff800`02dfefbd nt!ExFreePoolWithTag+0x22d
fffff880`09d6c6b8  fffff800`02ccea10 nt!KiServiceLinkage
fffff880`09d6c6e8  fffff880`01115f34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`09d6c748  fffff880`01101978 fltmgr!FltpRegAltitudeValueName
fffff880`09d6c788  fffff800`02ccea10 nt!KiServiceLinkage
fffff880`09d6c7b8  fffff880`01116cec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`09d6c828  fffff880`010f372e fltmgr!FltObjectReference+0xe
fffff880`09d6c858  fffff880`01114dbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`09d6c8c8  fffff880`011103f0 fltmgr!FltpCreate+0x3e0
fffff880`09d6c978  fffff800`02fccbe5 nt!IopParseDevice+0x5a5
fffff880`09d6c9c8  fffff800`02fc6144 nt!ObpCloseHandle+0x94
fffff880`09d6ca78  fffff800`02fc888a nt!SeQueryInformationToken+0x4a
fffff880`09d6ca90  fffff800`02fcf230 nt! ?? ::NNGAKEGL::`string'
fffff880`09d6caa8  fffff800`02fca0b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09d6cae0  fffff800`02fd6c20 nt!ObpParseSymbolicLink
fffff880`09d6caf0  fffff800`02fcc640 nt!IopParseDevice
fffff880`09d6cb00  fffff800`02c54000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`09d6cb08  fffff800`02fc9488 nt!ObpLookupObjectName+0x588
fffff880`09d6cbf8  fffff800`02fca6a6 nt!ObOpenObjectByName+0x306
fffff880`09d6cc58  fffff800`02cf4c63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`09d6ccc8  fffff800`02fcbfac nt!IopCreateFile+0x2bc
fffff880`09d6ccd0  fffff800`02e7cb20 nt!ObTypeIndexTable
fffff880`09d6cd08  fffff800`02fca0b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`09d6cd68  fffff800`02fd6c04 nt!NtCreateFile+0x78
fffff880`09d6cdf8  fffff800`02cd2453 nt!KiSystemServiceCopyEnd+0x13
fffff880`09d6ce08  fffff800`02fb8ed7 nt!ObInsertObjectEx+0x137
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\080712-20607-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c04000 PsLoadedModuleList = 0xfffff800`02e48670
Debug session time: Tue Aug  7 08:01:56.320 2012 (UTC - 7:00)
System Uptime: 0 days 0:32:59.317
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 23, {e0107, fffff88008558fc8, fffff88008558820, fffff8800453908d}
Probably caused by : fastfat.SYS ( fastfat!FatFlushFat+f1 )
2: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`08557fe8  fffff880`0451ad82 fastfat!FatExceptionFilter+0xaa
fffff880`08558010  fffff880`0453908d fastfat!FatFlushFat+0xf1
fffff880`08558028  fffff880`0454724a fastfat! ?? ::NNGAKEGL::`string'+0xc1a
fffff880`08558030  fffff880`0451e424 fastfat!ntoskrnl_NULL_THUNK_DATA+0xd04
fffff880`08558068  fffff800`02cae3ac nt!_C_specific_handler+0x8c
fffff880`08558078  fffff960`007dcf59 cdd!ClipDstRects+0x3d
fffff880`08558098  fffff800`02cadf0b nt!KeQueryCurrentStackInformation+0x4b
fffff880`085580b8  fffff880`0451c990 fastfat!_C_specific_handler
fffff880`085580c0  fffff880`04521810 fastfat!__PchSym_ <PERF> (fastfat+0x8810)
fffff880`085580c8  fffff880`0453908d fastfat!FatFlushFat+0xf1
fffff880`085580d8  fffff800`02cade2d nt!RtlpExecuteHandlerForException+0xd
fffff880`085580e0  fffff880`0451e408 fastfat!ntoskrnl_NULL_THUNK_DATA+0xce8
fffff880`085580f8  fffff880`04519000 fastfat!FatSetDirtyBcb <PERF> (fastfat+0x0)
fffff880`08558108  fffff800`02cacc05 nt!RtlDispatchException+0x415
fffff880`08558110  fffff880`0451e408 fastfat!ntoskrnl_NULL_THUNK_DATA+0xce8
fffff880`08558128  fffff880`04519000 fastfat!FatSetDirtyBcb <PERF> (fastfat+0x0)
fffff880`08558138  fffff960`007ddfcf cdd!CddBitmapHw::AddCommandBufferReference+0x77
fffff880`08558158  fffff880`04519000 fastfat!FatSetDirtyBcb <PERF> (fastfat+0x0)
fffff880`08558160  fffff880`0451e408 fastfat!ntoskrnl_NULL_THUNK_DATA+0xce8
fffff880`08558178  fffff880`04521810 fastfat!__PchSym_ <PERF> (fastfat+0x8810)
fffff880`085581a0  fffff880`0453908d fastfat!FatFlushFat+0xf1
fffff880`085581a8  fffff880`04519000 fastfat!FatSetDirtyBcb <PERF> (fastfat+0x0)
fffff880`085581b0  fffff880`04521810 fastfat!__PchSym_ <PERF> (fastfat+0x8810)
fffff880`085581d0  fffff880`0451c990 fastfat!_C_specific_handler
fffff880`085581d8  fffff880`0451e408 fastfat!ntoskrnl_NULL_THUNK_DATA+0xce8
fffff880`08558218  fffff800`02c8c2c2 nt!ExReleaseResourceAndLeaveCriticalRegion+0x12
fffff880`08558248  fffff960`0018b590 win32k!EngReleaseSemaphore+0x2c
fffff880`08558278  fffff960`007ec226 cdd!DrvTextOut+0x10ea
fffff880`085582b8  fffff880`04c01acfUnable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
fffff880`085582e8  fffff880`04539232 fastfat!FatFlushVolume+0x3e
fffff880`085582f8  fffff800`02f786af nt!ObpAllocateObject+0x12f
fffff880`08558368  fffff800`02f862f8 nt!IopAllocRealFileObject+0x128
fffff880`085583b8  fffff880`04c01841 atikmdag+0x3c2841
fffff880`085583d8  fffff880`04c07d37 atikmdag+0x3c8d37
fffff880`085584e8  fffff880`0488cf62 atikmdag+0x4df62
fffff880`08558508  fffff880`0534a24f dxgmms1!VidSchDdiNotifyInterruptWorker+0x2c7
fffff880`08558588  fffff880`0489f2e0 atikmdag+0x602e0
fffff880`085585b8  fffff880`04934198 atikmdag+0xf5198
fffff880`085585f0  fffff880`0488cff0 atikmdag+0x4dff0
fffff880`08558608  fffff880`0488cf62 atikmdag+0x4df62
fffff880`08558638  fffff880`0493a38c atikmdag+0xfb38c
fffff880`085586a8  fffff880`0489f2e0 atikmdag+0x602e0
fffff880`085586c8  fffff880`04538f9c fastfat!FatFlushFat
fffff880`085586d0  fffff880`045391ed fastfat!FatFlushFat+0x251
fffff880`085586d8  fffff880`04519000 fastfat!FatSetDirtyBcb <PERF> (fastfat+0x0)
fffff880`085586e0  fffff880`04521810 fastfat!__PchSym_ <PERF> (fastfat+0x8810)
fffff880`08558708  fffff800`02c59b09 nt!KiOpDecode+0xc1
fffff880`08558730  fffff800`02c8e52c nt!KiSecondaryClockInterrupt+0x13c
fffff880`08558758  fffff800`02cbda18 nt!KiPreprocessFault+0xf4
fffff880`08558780  fffff880`0453908d fastfat!FatFlushFat+0xf1
fffff880`08558788  fffff880`0453908f fastfat!FatFlushFat+0xf3
fffff880`085587a0  fffff880`0453908e fastfat!FatFlushFat+0xf2
fffff880`085587e8  fffff800`02cbdb81 nt!KiDispatchException+0x135
fffff880`08558838  fffff800`02dae1de nt!ExAllocatePoolWithTag+0xfe
fffff880`08558848  fffff800`02c86443 nt!SwapContext_PatchXSave+0xa3
fffff880`085588e8  fffff800`02c04000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`08558918  fffff880`0453908d fastfat!FatFlushFat+0xf1
fffff880`08558928  fffff800`02f786af nt!ObpAllocateObject+0x12f
fffff880`08558998  fffff800`02f862f8 nt!IopAllocRealFileObject+0x128
fffff880`08558af8  fffff800`02f77de8 nt!ObpIncrementHandleCountEx+0x278
fffff880`08558b48  fffff800`02f7888a nt!SeQueryInformationToken+0x4a
fffff880`08558b60  fffff800`02f7f230 nt! ?? ::NNGAKEGL::`string'
fffff880`08558b78  fffff800`02e2cb20 nt!ObTypeIndexTable
fffff880`08558bb8  fffff800`02f77649 nt!ObpCreateHandle+0x1f9
fffff880`08558be8  fffff800`02c8881a nt!KiDeferredReadyThread+0x31a
fffff880`08558c68  fffff800`02c9e8c8 nt!KeReleaseSemaphore+0x228
fffff880`08558c88  fffff800`02c99d07 nt!MiObtainSystemCacheView+0x43
fffff880`08558ca0  fffff800`02eb5a00 nt!CcVacbSpinLock
fffff880`08558cb8  fffff800`02caaab5 nt!RtlGetExtendedContextLength+0x19
fffff880`08558cc8  fffff800`02e48f40 nt!MiSystemCacheViewLock
fffff880`08558d08  fffff800`02c93f5c nt!IopFreeIrp+0x11c
fffff880`08558d18  fffff800`02c97200 nt!IopDequeueIrpFromThread+0xd0
fffff880`08558d48  fffff800`02f866ca nt!IopCloseFile+0x14a
fffff880`08558d68  fffff800`031f3b7f hal!HalSendSoftwareInterrupt+0x48
fffff880`08558d98  fffff800`02c8881a nt!KiDeferredReadyThread+0x31a
fffff880`08558dc0  fffff800`02eb5a00 nt!CcVacbSpinLock
fffff880`08558e00  fffff800`02e20288 nt!ExWorkerQueue+0x8
fffff880`08558e18  fffff800`02c793de nt!KiInsertQueue+0x1fe
fffff880`08558e48  fffff800`02c75be7 nt!KiDeliverApc+0x1d7
fffff880`08558e88  fffff800`02c82842 nt!KiExceptionDispatch+0xc2
fffff880`08558fd8  fffff880`0453908d fastfat!FatFlushFat+0xf1
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\072612-18735-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e60670
Debug session time: Thu Jul 26 07:45:36.399 2012 (UTC - 7:00)
System Uptime: 0 days 0:01:26.022
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa80c0000010, 0, fffff80002c8da7a, 5}
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+402 )
2: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`031ae688  fffff800`02c41f0f nt! ?? ::FNODOBFM::`string'+0x43d51
fffff880`031ae6e8  fffff800`02f8e1a6 nt!ExMapHandleToPointer+0x26
fffff880`031ae708  fffff800`0320bb7f hal!HalSendSoftwareInterrupt+0x48
fffff880`031ae7a0  fffff800`02e38288 nt!ExWorkerQueue+0x8
fffff880`031ae7e8  fffff800`02c992ee nt!KiPageFault+0x16e
fffff880`031ae848  fffff800`02c1c000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`031ae958  fffff800`02c8da7a nt!KiDeliverApc+0x6a
fffff880`031ae9a8  fffff800`02f6e6f4 nt!CmpGetValueDataFromCache+0x6c
fffff880`031ae9f8  fffff800`02c44a85 nt!KiCheckForKernelApcDelivery+0x25
fffff880`031aea28  fffff800`02dc7cbe nt!ExDeferredFreePool+0x402
fffff880`031aeab8  fffff800`02dc71a1 nt!ExFreePoolWithTag+0x411
fffff880`031aeb68  fffff800`030402f6 nt!CmpCallCallBacks+0x4f6
fffff880`031aebc8  fffff800`030402f6 nt!CmpCallCallBacks+0x4f6
fffff880`031aec38  fffff800`02fdcbde nt! ?? ::NNGAKEGL::`string'+0x367cf
fffff880`031aece8  fffff800`02f8dd7d nt!ObpDecrementHandleCount+0x6d
fffff880`031aed08  fffff800`02ca43d4 nt!ObfDereferenceObject+0xd4
fffff880`031aed38  fffff800`02f8df16 nt!ExDestroyHandle+0x66
fffff880`031aed68  fffff800`02f8db94 nt!ObpCloseHandleTableEntry+0xc4
fffff880`031aedc8  fffff800`02f8e1a6 nt!ExMapHandleToPointer+0x26
fffff880`031aedf8  fffff800`02f8e144 nt!ObpCloseHandle+0x94
fffff880`031aee48  fffff800`02c9a453 nt!KiSystemServiceCopyEnd+0x13
fffff880`031aeee8  fffff800`02c96a10 nt!KiServiceLinkage
fffff880`031aef18  fffff880`0109bf34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`031aefb8  fffff800`02c96a10 nt!KiServiceLinkage
fffff880`031aefe8  fffff880`0109cddb fltmgr!FltpEnumerateRegistryInstances+0x18b
fffff880`031af058  fffff880`0107972e fltmgr!FltObjectReference+0xe
fffff880`031af088  fffff880`0109adbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`031af0f8  fffff880`010963f0 fltmgr!FltpCreate+0x3e0
fffff880`031af1a8  fffff800`02f94be5 nt!IopParseDevice+0x5a5
fffff880`031af250  fffff880`01087a00 fltmgr!FltpOperationFlags
fffff880`031af2a8  fffff800`02f9088a nt!SeQueryInformationToken+0x4a
fffff880`031af2c0  fffff800`02f97230 nt! ?? ::NNGAKEGL::`string'
fffff880`031af2c8  fffff800`02f8fde8 nt!ObpIncrementHandleCountEx+0x278
fffff880`031af2d8  fffff800`02f920b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`031af310  fffff800`02f9ec20 nt!ObpParseSymbolicLink
fffff880`031af320  fffff800`02f94640 nt!IopParseDevice
fffff880`031af330  fffff800`02c1c000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`031af338  fffff800`02f91488 nt!ObpLookupObjectName+0x588
fffff880`031af428  fffff800`02f926a6 nt!ObOpenObjectByName+0x306
fffff880`031af488  fffff800`02cac121 nt!IopAllocateIrpPrivate+0x141
fffff880`031af4f8  fffff800`02f93fac nt!IopCreateFile+0x2bc
fffff880`031af518  fffff800`02f9e6ca nt!IopCloseFile+0x14a
fffff880`031af598  fffff800`02f9ec04 nt!NtCreateFile+0x78
fffff880`031af628  fffff800`02c9a453 nt!KiSystemServiceCopyEnd+0x13
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\072612-19094-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c01000 PsLoadedModuleList = 0xfffff800`02e45670
Debug session time: Thu Jul 26 07:43:15.717 2012 (UTC - 7:00)
System Uptime: 0 days 0:07:34.340
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8ac0c4b1570, 0, fffff80002dabe63, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+d3 )
0: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`093c9ff8  fffff800`02c26f0f nt! ?? ::FNODOBFM::`string'+0x43d51
fffff880`093ca0d8  fffff800`02c72bd7 nt!KiDeliverApc+0x1c7
fffff880`093ca158  fffff800`02c7e2ee nt!KiPageFault+0x16e
fffff880`093ca268  fffff800`030252f6 nt!CmpCallCallBacks+0x4f6
fffff880`093ca2a8  fffff800`02dab350 nt!ExAllocatePoolWithTag+0x270
fffff880`093ca2c8  fffff800`02dabe63 nt!ExFreePoolWithTag+0xd3
fffff880`093ca308  fffff800`02f5094f nt!CmpUnlockRegistry+0x2f
fffff880`093ca338  fffff800`02f31eff nt!CmEnumerateKey+0x2ef
fffff880`093ca398  fffff800`030252f6 nt!CmpCallCallBacks+0x4f6
fffff880`093ca468  fffff800`02fd629d nt! ?? ::NNGAKEGL::`string'+0x4d9fc
fffff880`093ca4a8  fffff800`02dab1de nt!ExAllocatePoolWithTag+0xfe
fffff880`093ca5a8  fffff800`02c7f453 nt!KiSystemServiceCopyEnd+0x13
fffff880`093ca608  fffff880`0103f92f fltmgr!FltpSetCallbacksForInstance+0x21f
fffff880`093ca638  fffff800`02dabfbd nt!ExFreePoolWithTag+0x22d
fffff880`093ca6b8  fffff800`02c7ba10 nt!KiServiceLinkage
fffff880`093ca6e8  fffff880`01058f34 fltmgr!FltpCreateInstanceFromName+0x234
fffff880`093ca748  fffff880`01044978 fltmgr!FltpRegAltitudeValueName
fffff880`093ca788  fffff800`02c7ba10 nt!KiServiceLinkage
fffff880`093ca7b8  fffff880`01059cec fltmgr!FltpEnumerateRegistryInstances+0x9c
fffff880`093ca828  fffff880`0103672e fltmgr!FltObjectReference+0xe
fffff880`093ca858  fffff880`01057dbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`093ca8c8  fffff880`010533f0 fltmgr!FltpCreate+0x3e0
fffff880`093ca978  fffff800`02f79be5 nt!IopParseDevice+0x5a5
fffff880`093caa78  fffff800`02f7588a nt!SeQueryInformationToken+0x4a
fffff880`093caa90  fffff800`02f7c230 nt! ?? ::NNGAKEGL::`string'
fffff880`093caaa8  fffff800`02f770b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`093caae0  fffff800`02f83c20 nt!ObpParseSymbolicLink
fffff880`093caaf0  fffff800`02f79640 nt!IopParseDevice
fffff880`093cab00  fffff800`02c01000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`093cab08  fffff800`02f76488 nt!ObpLookupObjectName+0x588
fffff880`093cabf8  fffff800`02f776a6 nt!ObOpenObjectByName+0x306
fffff880`093cac58  fffff800`02ca1c63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`093cacc8  fffff800`02f78fac nt!IopCreateFile+0x2bc
fffff880`093cacd0  fffff800`02e29b20 nt!ObTypeIndexTable
fffff880`093cad08  fffff800`02f770b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`093cad68  fffff800`02f83c04 nt!NtCreateFile+0x78
fffff880`093cadf8  fffff800`02c7f453 nt!KiSystemServiceCopyEnd+0x13
fffff880`093cae08  fffff800`02f65ed7 nt!ObInsertObjectEx+0x137
fffff880`093caf88  fffff800`02f72d7d nt!ObpDecrementHandleCount+0x6d
fffff880`093cafd8  fffff800`02c7ba10 nt!KiServiceLinkage
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\BSODDmpFiles\immigranta\Windows7_Vista_jcgriff2\072612-24804-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`02c16000 PsLoadedModuleList = 0xfffff800`02e5a670
Debug session time: Thu Jul 26 07:33:35.096 2012 (UTC - 7:00)
System Uptime: 0 days 0:04:05.078
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff800c0000010, 8, fffff800c0000010, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43d51 )
3: kd> kd: Reading initial command '!niemiro.rawstack; !niemiro.rawstack -dc; !niemiro.auto_errrec; q'
fffff880`0b689e48  fffff800`02c3bf0f nt! ?? ::FNODOBFM::`string'+0x43d51
fffff880`0b689eb8  fffff800`02f881a6 nt!ExMapHandleToPointer+0x26
fffff880`0b689ec8  fffff800`03205b7f hal!HalSendSoftwareInterrupt+0x48
fffff880`0b689f60  fffff800`02e32288 nt!ExWorkerQueue+0x8
fffff880`0b689fa8  fffff800`02c932ee nt!KiPageFault+0x16e
fffff880`0b689fe0  fffff800`02e32298 nt!ExWorkerQueue+0x18
fffff880`0b68a008  fffff800`02c16000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`0b68a0a8  fffff800`02c90a10 nt!KiServiceLinkage
fffff880`0b68a0f8  fffff800`02f68553 nt!CmpGetValueData+0x73
fffff880`0b68a198  fffff800`02e1c580 nt!NonPagedPoolDescriptor
fffff880`0b68a1b8  fffff800`02c87e87 nt!KiApcInterrupt+0xd7
fffff880`0b68a328  fffff800`02dbd386 nt!MiFreePoolPages+0x86
fffff880`0b68a3a8  fffff880`0109c978 fltmgr!FltpRegAltitudeValueName
fffff880`0b68a438  fffff800`02e1c580 nt!NonPagedPoolDescriptor
fffff880`0b68a458  fffff800`02dc1c0b nt!ExDeferredFreePool+0x34f
fffff880`0b68a488  fffff800`02e1c588 nt!NonPagedPoolDescriptor+0x8
fffff880`0b68a498  fffff800`02e1c588 nt!NonPagedPoolDescriptor+0x8
fffff880`0b68a4a8  fffff800`02dc01de nt!ExAllocatePoolWithTag+0xfe
fffff880`0b68a4d8  fffff800`02e1c580 nt!NonPagedPoolDescriptor
fffff880`0b68a4e8  fffff800`02dc11a1 nt!ExFreePoolWithTag+0x411
fffff880`0b68a558  fffff880`010b1fa1 fltmgr!FltGetVolumeProperties+0x131
fffff880`0b68a598  fffff880`028c7a3bUnable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
fffff880`0b68a618  fffff880`010b1116 fltmgr!FltpDoInstanceSetupNotification+0x86
fffff880`0b68a678  fffff880`010b011b fltmgr!FltpInitInstance+0x27b
fffff880`0b68a6e8  fffff880`010b0ed1 fltmgr!FltpCreateInstanceFromName+0x1d1
fffff880`0b68a748  fffff880`0109c978 fltmgr!FltpRegAltitudeValueName
fffff880`0b68a7b8  fffff880`010b1dab fltmgr!FltpEnumerateRegistryInstances+0x15b
fffff880`0b68a828  fffff880`0108e72e fltmgr!FltObjectReference+0xe
fffff880`0b68a858  fffff880`010afdbc fltmgr!FltpDoFilterNotificationForNewVolume+0xec
fffff880`0b68a8c8  fffff880`010ab3f0 fltmgr!FltpCreate+0x3e0
fffff880`0b68a978  fffff800`02f8ebe5 nt!IopParseDevice+0x5a5
fffff880`0b68a9c8  fffff800`02f88144 nt!ObpCloseHandle+0x94
fffff880`0b68aa78  fffff800`02f8a88a nt!SeQueryInformationToken+0x4a
fffff880`0b68aa90  fffff800`02f91230 nt! ?? ::NNGAKEGL::`string'
fffff880`0b68aaa8  fffff800`02f8c0b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`0b68aae0  fffff800`02f98c20 nt!ObpParseSymbolicLink
fffff880`0b68aaf0  fffff800`02f8e640 nt!IopParseDevice
fffff880`0b68ab00  fffff800`02c16000 nt!KiSelectNextThread <PERF> (nt+0x0)
fffff880`0b68ab08  fffff800`02f8b488 nt!ObpLookupObjectName+0x588
fffff880`0b68abf8  fffff800`02f8c6a6 nt!ObOpenObjectByName+0x306
fffff880`0b68ac58  fffff800`02cb6c63 nt!RtlpOwnerAcesPresent+0xc3
fffff880`0b68acc8  fffff800`02f8dfac nt!IopCreateFile+0x2bc
fffff880`0b68acd0  fffff800`02e3eb20 nt!ObTypeIndexTable
fffff880`0b68ad08  fffff800`02f8c0b8 nt!ObpLookupDirectoryEntry+0x3c8
fffff880`0b68ad68  fffff800`02f98c04 nt!NtCreateFile+0x78
fffff880`0b68adf8  fffff800`02c94453 nt!KiSystemServiceCopyEnd+0x13
fffff880`0b68ae08  fffff800`02f7aed7 nt!ObInsertObjectEx+0x137
writhziden is offline  
Closed Thread

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Similar Threads
Thread Thread Starter Forum Replies Last Post
BSOD ntoskrnl.exe
Hello! I'm following this forum for a while, and was seeking for solutions for my problem. Somehow, i've tryied verifier, and worked, but today i have experienced another BSODS Again! But it happens when i'm playing Guild Wars 2. Happened to me like 2 or 3 times when i was playing, and when the...
Aquash BSOD, App Crashes And Hangs 4 12-11-2012 06:49 AM
BSOD tcpip.sys ntoskrnl.exe 0x00000d1
ท Windows 7 Enterprise ท x64 ท Window XP SP3 ท Windows XP SP1 ท 3yrs ท 4monts ท Intel Core 2 Duo E6600 ท Nvidea 8600 GTS ท Asus P5B ท Aspire Chamerleon 550W
jfrosty51 BSOD, App Crashes And Hangs 1 03-16-2011 10:08 AM
BSOD 6 month Hiatus [moved from Vista/ Windows 7]
System Details - GigaByte GA-EP43-UD3L - 8GB Patriot Viper Series PC2-8500 - CPU - Windows 7 Professional 64 bit - System age 1.5-2 years - Video card ATI Radeon X1600/X1650 Series - OS install 1.5 years 6+ months ago my system was blue screening and I went thru all the suggested...
kungfusion BSOD, App Crashes And Hangs 8 03-04-2011 03:31 PM
BSOD: ntoskrnl.exe +70740 minidump.zip included
ท OS - Windows 7 ท x64 ท What was original installed OS on system? windows 7, 2 day old machine ท Windows 7 ultimate 64 bit retail ท Age of system (hardware) -2 days old ท Age of OS installation - have you re-installed the OS? 2 days old ท CPU Intel I7 950 ท Video Card EVGA GTX 470 ท...
v8killer BSOD, App Crashes And Hangs 3 01-16-2011 11:42 PM
The well known Windows 7 Bsod caused by ntoskrnl.exe !
Hi guys, :pray: :pray: :pray: First I'm running on : ท OS -Windows 7 ท x64 ท OEM version but purchased from retailer (weird I know) ท Age of system : 1.5 year ท Age of OS installation 1.5 years ท CPU : Core Quad Q8400 2.66 GHz
polol119 BSOD, App Crashes And Hangs 4 01-04-2011 02:29 PM

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


Post a Question


» Site Navigation
 > FAQ
  > 10.0.0.2
Powered by vBadvanced CMPS v3.2.3


All times are GMT -7. The time now is 01:26 PM.


Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
User Alert System provided by Advanced User Tagging v3.1.0 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright 2001 - 2018, Tech Support Forum

Windows 10 - Windows 7 - Windows XP - Windows Vista - Trojan Removal - Spyware Removal - Virus Removal - Networking - Security - Top Web Hosts