Tech Support Forum banner
Status
Not open for further replies.
1 - 16 of 16 Posts

· Registered
Joined
·
8 Posts
So I've been having a lot of BSODs recently and I finally installed windows debugger and opened a crash dump file. I think I'm supposed to look for the IMAGE_NAME to determine what's giving me trouble, but I have no idea what this image name (SYMNDISV.SYS) refers to. Any help?

Here's the whole crash dump
-----------------------------------------------------------------------------
Code:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000002000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001bde848, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fd0e0
 0000000002000000 

CURRENT_IRQL:  2

FAULTING_IP: 
SYMNDISV+4848
fffff880`01bde848 488b08          mov     rcx,qword ptr [rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8800a0f3360 -- (.trap 0xfffff8800a0f3360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000002000000 rbx=0000000000000000 rcx=0000000002000000
rdx=fffffa80069d1860 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001bde848 rsp=fffff8800a0f34f8 rbp=fffffa80074261a0
 r8=0000000000000000  r9=fffff8800a0f3550 r10=fffff88001be3e30
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
SYMNDISV+0x4848:
fffff880`01bde848 488b08          mov     rcx,qword ptr [rax] ds:e358:00000000`02000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ec4b69 to fffff80002ec5600

STACK_TEXT:  
fffff880`0a0f3218 fffff800`02ec4b69 : 00000000`0000000a 00000000`02000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a0f3220 fffff800`02ec37e0 : fffff880`0a0f3500 fffff880`0a0f3c70 fffffa80`0865b7e0 fffffa80`075ffcf0 : nt!KiBugCheckDispatch+0x69
fffff880`0a0f3360 fffff880`01bde848 : fffff880`01bdd412 fffff880`0a0f3c70 00000000`00000014 00000000`00000022 : nt!KiPageFault+0x260
fffff880`0a0f34f8 fffff880`01bdd412 : fffff880`0a0f3c70 00000000`00000014 00000000`00000022 00000000`c0a8012e : SYMNDISV+0x4848
fffff880`0a0f3500 fffff880`0a0f3c70 : 00000000`00000014 00000000`00000022 00000000`c0a8012e ffff0000`0b9942b5 : SYMNDISV+0x3412
fffff880`0a0f3508 00000000`00000014 : 00000000`00000022 00000000`c0a8012e ffff0000`0b9942b5 00000000`00000001 : 0xfffff880`0a0f3c70
fffff880`0a0f3510 00000000`00000022 : 00000000`c0a8012e ffff0000`0b9942b5 00000000`00000001 00000000`00000003 : 0x14
fffff880`0a0f3518 00000000`c0a8012e : ffff0000`0b9942b5 00000000`00000001 00000000`00000003 00000000`41c73f98 : 0x22
fffff880`0a0f3520 ffff0000`0b9942b5 : 00000000`00000001 00000000`00000003 00000000`41c73f98 fffff880`0a0f3c48 : 0xc0a8012e
fffff880`0a0f3528 00000000`00000001 : 00000000`00000003 00000000`41c73f98 fffff880`0a0f3c48 fffff880`01848093 : 0xffff0000`0b9942b5
fffff880`0a0f3530 00000000`00000003 : 00000000`41c73f98 fffff880`0a0f3c48 fffff880`01848093 fffff880`01be3f30 : 0x1
fffff880`0a0f3538 00000000`41c73f98 : fffff880`0a0f3c48 fffff880`01848093 fffff880`01be3f30 00000000`00000000 : 0x3
fffff880`0a0f3540 fffff880`0a0f3c48 : fffff880`01848093 fffff880`01be3f30 00000000`00000000 fffff880`01be3f50 : 0x41c73f98
fffff880`0a0f3548 fffff880`01848093 : fffff880`01be3f30 00000000`00000000 fffff880`01be3f50 fffffa80`069d1860 : 0xfffff880`0a0f3c48
fffff880`0a0f3550 fffff880`0187bb1d : 00000001`20ff20e7 fffffa80`075ffe50 fffffa80`075ffcf0 fffffa80`077d2080 : tcpip!TcpBwManageTrackedData+0x153
fffff880`0a0f35d0 fffff880`0187c32d : fffff880`0a0f3d30 00000000`00000000 00000000`00000000 fffff880`0a0f3c70 : tcpip!TcpDeliverDataToClient+0x43d
fffff880`0a0f3750 fffff880`0a0f3d30 : fffffa80`05bad080 fffff880`016074db fffffa80`05ba0000 fffff880`0a0f3c48 : tcpip!TcpDeliverReceive+0xdd
fffff880`0a0f3850 fffffa80`05bad080 : fffff880`016074db fffffa80`05ba0000 fffff880`0a0f3c48 fffff880`0a0f3d30 : 0xfffff880`0a0f3d30
fffff880`0a0f3858 fffff880`016074db : fffffa80`05ba0000 fffff880`0a0f3c48 fffff880`0a0f3d30 fffffa80`069d1860 : 0xfffffa80`05bad080
fffff880`0a0f3860 fffff880`0185e0c0 : fffffa80`06785880 fffff880`0a0f3c48 fffff880`01804818 fffffa80`069d1860 : NETIO!KfdClassify+0x24b
fffff880`0a0f3bd0 fffff880`0185d7f9 : fffffa80`049c3000 fffff780`00000320 00000000`0004bd1a fffff880`0a0f3f90 : tcpip!IppReceiveHeadersHelper+0x3f0
fffff880`0a0f3f40 fffff880`0185c821 : 00000000`00000000 fffffa80`049c3000 fffff880`0196d9a0 00000000`06b24301 : tcpip!IppReceiveHeaderBatch+0x99
fffff880`0a0f4020 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePackets+0x651


STACK_COMMAND:  kb

FOLLOWUP_IP: 
SYMNDISV+4848
fffff880`01bde848 488b08          mov     rcx,qword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  SYMNDISV+4848

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: SYMNDISV

IMAGE_NAME:  SYMNDISV.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5297d6

FAILURE_BUCKET_ID:  X64_0xD1_SYMNDISV+4848

BUCKET_ID:  X64_0xD1_SYMNDISV+4848

Followup: MachineOwner
---------
 

· Registered
Joined
·
8 Posts
Well, Now I just got a BSod but the fault module is ntkrnlmp.exe. Any idea what this means?

---------------------------------------------------------------------------------------

Debugging Details:
------------------

Code:
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpCloseHandleTableEntry+51
fffff800`031d2441 4883bba800000000 cmp     qword ptr [rbx+0A8h],0

CONTEXT:  fffff8800a69cfc0 -- (.cxr 0xfffff8800a69cfc0)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00bb33510
rdx=fffff8a00089f060 rsi=fffffa8003d7e770 rdi=fffff8a00089f060
rip=fffff800031d2441 rsp=fffff8800a69d990 rbp=fffff8a00bb33510
 r8=fffffa80077cfb30  r9=0000000000000018 r10=0000000000000018
r11=fffff8800a69d9f0 r12=fffff8a000932550 r13=fffffa80077cfb30
r14=fffffa80077cfc00 r15=fffff8a00bb33510
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ObpCloseHandleTableEntry+0x51:
fffff800`031d2441 4883bba800000000 cmp     qword ptr [rbx+0A8h],0 ds:002b:00000000`000000a8=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  lag_win32_publ

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031d2441

STACK_TEXT:  
fffff880`0a69d990 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandleTableEntry+0x51


FOLLOWUP_IP: 
nt!ObpCloseHandleTableEntry+51
fffff800`031d2441 4883bba800000000 cmp     qword ptr [rbx+0A8h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCloseHandleTableEntry+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

STACK_COMMAND:  .cxr 0xfffff8800a69cfc0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpCloseHandleTableEntry+51

BUCKET_ID:  X64_0x3B_nt!ObpCloseHandleTableEntry+51

Followup: MachineOwner
---------
 

· Registered
Joined
·
3,285 Posts
In addition to removing Norton, install the latest ATK 0110 utility for Windows 7/Vista from here: http://support.asus.com/download/download.aspx?SLanguage=en-us

If that doesn't do the trick, enable driver verifier: http://www.techsupportforum.com/f217/driver-verifier-windows-7-and-vista-bsod-related-473665.html

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 1 for BSODINFo.zip\BSODINFo\Windows7_Vista_jcgriff2\072610-20280-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02e4b000 PsLoadedModuleList = 0xfffff800`03088e50
Debug session time: Mon Jul 26 22:43:02.224 2010 (GMT-4)
System Uptime: 0 days 0:11:17.535
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031d2441, fffff8800a69cfc0, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+51 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031d2441, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800a69cfc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!ObpCloseHandleTableEntry+51
fffff800`031d2441 4883bba800000000 cmp     qword ptr [rbx+0A8h],0

CONTEXT:  fffff8800a69cfc0 -- (.cxr 0xfffff8800a69cfc0)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00bb33510
rdx=fffff8a00089f060 rsi=fffffa8003d7e770 rdi=fffff8a00089f060
rip=fffff800031d2441 rsp=fffff8800a69d990 rbp=fffff8a00bb33510
 r8=fffffa80077cfb30  r9=0000000000000018 r10=0000000000000018
r11=fffff8800a69d9f0 r12=fffff8a000932550 r13=fffffa80077cfb30
r14=fffffa80077cfc00 r15=fffff8a00bb33510
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ObpCloseHandleTableEntry+0x51:
fffff800`031d2441 4883bba800000000 cmp     qword ptr [rbx+0A8h],0 ds:002b:00000000`000000a8=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  lag_win32_publ

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031d2441

STACK_TEXT:  
fffff880`0a69d990 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandleTableEntry+0x51


FOLLOWUP_IP: 
nt!ObpCloseHandleTableEntry+51
fffff800`031d2441 4883bba800000000 cmp     qword ptr [rbx+0A8h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCloseHandleTableEntry+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

STACK_COMMAND:  .cxr 0xfffff8800a69cfc0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpCloseHandleTableEntry+51

BUCKET_ID:  X64_0x3B_nt!ObpCloseHandleTableEntry+51

Followup: MachineOwner
---------

2: kd> lmsmn
start             end                 module name
fffff880`04400000 fffff880`0443e000   1394ohci 1394ohci.sys
fffff880`00e00000 fffff880`00e57000   ACPI     ACPI.sys    
fffff880`01107000 fffff880`01191000   afd      afd.sys     
fffff880`0435f000 fffff880`04375000   AgileVpn AgileVpn.sys
fffff880`011ed000 fffff880`011f8000   amdxata  amdxata.sys 
fffff880`10df8000 fffff880`10e00000   ASACPI   ASACPI.sys  
fffff880`01088000 fffff880`01091000   atapi    atapi.sys   
fffff880`00dac000 fffff880`00dd6000   ataport  ataport.SYS 
fffff880`07471000 fffff880`074c0000   atksgt   atksgt.sys  
fffff960`008f0000 fffff960`00951000   ATMFD    ATMFD.DLL   
fffff880`01bcc000 fffff880`01bd3000   Beep     Beep.SYS    
fffff880`04454000 fffff880`0453f000   BHDrvx64 BHDrvx64.sys
fffff880`0434e000 fffff880`0435f000   blbdrive blbdrive.sys
fffff880`0759d000 fffff880`075bb000   bowser   bowser.sys  
fffff880`042b2000 fffff880`0434e000   ccHPx64  ccHPx64.sys 
fffff960`00660000 fffff960`00687000   cdd      cdd.dll     
fffff880`01b99000 fffff880`01bc3000   cdrom    cdrom.sys   
fffff880`00e88000 fffff880`00f48000   CI       CI.dll      
fffff880`01b33000 fffff880`01b63000   CLASSPNP CLASSPNP.SYS
fffff880`00cec000 fffff880`00d4a000   CLFS     CLFS.SYS    
fffff880`01200000 fffff880`01273000   cng      cng.sys     
fffff880`0443e000 fffff880`0444e000   CompositeBus CompositeBus.sys
fffff880`05daa000 fffff880`05db8000   crashdmp crashdmp.sys
fffff880`04211000 fffff880`04294000   csc      csc.sys     
fffff880`05de0000 fffff880`05de3180   dadder   dadder.sys  
fffff880`04294000 fffff880`042b2000   dfsc     dfsc.sys    
fffff880`0417d000 fffff880`0418c000   discache discache.sys
fffff880`01b1d000 fffff880`01b33000   disk     disk.sys    
fffff880`05d82000 fffff880`05da4000   drmk     drmk.sys    
fffff880`05dc4000 fffff880`05dcd000   dump_atapi dump_atapi.sys
fffff880`05db8000 fffff880`05dc4000   dump_dumpata dump_dumpata.sys
fffff880`05dcd000 fffff880`05de0000   dump_dumpfve dump_dumpfve.sys
fffff880`04d47000 fffff880`04d53000   Dxapi    Dxapi.sys   
fffff880`10c8e000 fffff880`10d82000   dxgkrnl  dxgkrnl.sys 
fffff880`10d82000 fffff880`10dc8000   dxgmms1  dxgmms1.sys 
fffff880`040e2000 fffff880`04158000   eeCtrl64 eeCtrl64.sys
fffff880`040d7000 fffff880`040e2000   ElbyCDIO ElbyCDIO.sys
fffff880`089d0000 fffff880`089f0000   ENG64    ENG64.SYS   
fffff880`04158000 fffff880`0417d000   EraserUtilRebootDrv EraserUtilRebootDrv.sys
fffff880`08816000 fffff880`089d0000   EX64     EX64.SYS    
fffff880`01347000 fffff880`0135b000   fileinfo fileinfo.sys
fffff880`00c00000 fffff880`00c4c000   fltmgr   fltmgr.sys  
fffff880`0142b000 fffff880`01435000   Fs_Rec   Fs_Rec.sys  
fffff880`01ae3000 fffff880`01b1d000   fvevol   fvevol.sys  
fffff880`017a5000 fffff880`017ef000   fwpkclnt fwpkclnt.sys
fffff880`1000c000 fffff880`10019000   GEARAspiWDM GEARAspiWDM.sys
fffff800`02e02000 fffff800`02e4b000   hal      hal.dll     
fffff880`045d1000 fffff880`045f5000   HDAudBus HDAudBus.sys
fffff880`05c00000 fffff880`05c19000   HIDCLASS HIDCLASS.SYS
fffff880`05df2000 fffff880`05dfa080   HIDPARSE HIDPARSE.SYS
fffff880`05de4000 fffff880`05df2000   hidusb   hidusb.sys  
fffff880`074d5000 fffff880`0759d000   HTTP     HTTP.sys    
fffff880`016a5000 fffff880`016ae000   hwpolicy hwpolicy.sys
fffff880`04061000 fffff880`040d7000   IDSvia64 IDSvia64.sys
fffff880`04565000 fffff880`0457b000   intelppm intelppm.sys
fffff880`02f11000 fffff880`02f38000   Ironx64  Ironx64.SYS 
fffff880`043ef000 fffff880`043fe000   kbdclass kbdclass.sys
fffff880`04d81000 fffff880`04d8f000   kbdhid   kbdhid.sys  
fffff800`00ba4000 fffff800`00bae000   kdcom    kdcom.dll   
fffff880`04000000 fffff880`04043000   ks       ks.sys      
fffff880`01400000 fffff880`0141a000   ksecdd   ksecdd.sys  
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys 
fffff880`05da4000 fffff880`05da9200   ksthunk  ksthunk.sys 
fffff880`10de6000 fffff880`10df8000   L1E62x64 L1E62x64.sys
fffff880`074c0000 fffff880`074cd000   lirsgt   lirsgt.sys  
fffff880`04c31000 fffff880`04c46000   lltdio   lltdio.sys  
fffff880`04d8f000 fffff880`04db2000   luafv    luafv.sys   
fffff880`00c94000 fffff880`00cd8000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll
fffff880`07d1f000 fffff880`07d2d000   monitor  monitor.sys 
fffff880`04200000 fffff880`0420f000   mouclass mouclass.sys
fffff880`04cf8000 fffff880`04d05000   mouhid   mouhid.sys  
fffff880`00d92000 fffff880`00dac000   mountmgr mountmgr.sys
fffff880`075bb000 fffff880`075d3000   mpsdrv   mpsdrv.sys  
fffff880`075d3000 fffff880`07600000   mrxsmb   mrxsmb.sys  
fffff880`07400000 fffff880`0744e000   mrxsmb10 mrxsmb10.sys
fffff880`0744e000 fffff880`07471000   mrxsmb20 mrxsmb20.sys
fffff880`01a50000 fffff880`01a5b000   Msfs     Msfs.SYS    
fffff880`00e60000 fffff880`00e6a000   msisadrv msisadrv.sys
fffff880`01396000 fffff880`013f4000   msrpc    msrpc.sys   
fffff880`02fa9000 fffff880`02fb4000   mssmbios mssmbios.sys
fffff880`01693000 fffff880`016a5000   mup      mup.sys     
fffff880`016b3000 fffff880`017a5000   ndis     ndis.sys    
fffff880`04399000 fffff880`043a5000   ndistapi ndistapi.sys
fffff880`043a5000 fffff880`043d4000   ndiswan  ndiswan.sys 
fffff880`04ce3000 fffff880`04cf8000   NDProxy  NDProxy.SYS 
fffff880`02eb6000 fffff880`02ec5000   netbios  netbios.sys 
fffff880`02e42000 fffff880`02e87000   netbt    netbt.sys   
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS   
fffff880`01a5b000 fffff880`01a6c000   Npfs     Npfs.SYS    
fffff880`02f9d000 fffff880`02fa9000   nsiproxy nsiproxy.sys
fffff800`02e4b000 fffff800`03427000   nt       ntkrnlmp.exe
fffff880`0144d000 fffff880`015f0000   Ntfs     Ntfs.sys    
fffff880`01bc3000 fffff880`01bcc000   Null     Null.SYS    
fffff880`10c8c000 fffff880`10c8d180   nvBridge nvBridge.kmd
fffff880`1001e000 fffff880`10c8bc80   nvlddmkm nvlddmkm.sys
fffff880`02e90000 fffff880`02eb6000   pacer    pacer.sys   
fffff880`00d7d000 fffff880`00d92000   partmgr  partmgr.sys 
fffff880`00d4a000 fffff880`00d7d000   pci      pci.sys     
fffff880`01071000 fffff880`01078000   pciide   pciide.sys  
fffff880`01078000 fffff880`01088000   PCIIDEX  PCIIDEX.SYS 
fffff880`0141a000 fffff880`0142b000   pcw      pcw.sys     
fffff880`07a3a000 fffff880`07ae0000   peauth   peauth.sys  
fffff880`05d45000 fffff880`05d82000   portcls  portcls.sys 
fffff880`00cd8000 fffff880`00cec000   PSHED    PSHED.dll   
fffff880`04375000 fffff880`04399000   rasl2tp  rasl2tp.sys 
fffff880`043d4000 fffff880`043ef000   raspppoe raspppoe.sys
fffff880`0418c000 fffff880`041ad000   raspptp  raspptp.sys 
fffff880`041ad000 fffff880`041c7000   rassstp  rassstp.sys 
fffff880`02f4c000 fffff880`02f9d000   rdbss    rdbss.sys   
fffff880`045f5000 fffff880`04600000   rdpbus   rdpbus.sys  
fffff880`01a35000 fffff880`01a3e000   RDPCDD   RDPCDD.sys  
fffff880`01a3e000 fffff880`01a47000   rdpencdd rdpencdd.sys
fffff880`01a47000 fffff880`01a50000   rdprefmp rdprefmp.sys
fffff880`00c4c000 fffff880`00c86000   rdyboost rdyboost.sys
fffff880`04c46000 fffff880`04c5e000   rspndr   rspndr.sys  
fffff880`011be000 fffff880`011ed000   SCSIPORT SCSIPORT.SYS
fffff880`07ae0000 fffff880`07aeb000   secdrv   secdrv.SYS  
fffff880`10000000 fffff880`1000c000   serenum  serenum.sys 
fffff880`02ec5000 fffff880`02ee2000   serial   serial.sys  
fffff880`0168b000 fffff880`01693000   spldr    spldr.sys   
fffff880`07d2d000 fffff880`07db3000   SRTSP64  SRTSP64.SYS 
fffff880`02f38000 fffff880`02f4c000   SRTSPX64 SRTSPX64.SYS
fffff880`07c87000 fffff880`07d1f000   srv      srv.sys     
fffff880`07b2a000 fffff880`07b93000   srv2     srv2.sys    
fffff880`07aeb000 fffff880`07b18000   srvnet   srvnet.sys  
fffff880`10019000 fffff880`1001a480   swenum   swenum.sys  
fffff880`012d9000 fffff880`01347000   SYMDS64  SYMDS64.SYS 
fffff880`0135b000 fffff880`01396000   SYMEFA64 SYMEFA64.SYS
fffff880`01a97000 fffff880`01acd000   SYMEVENT64x86 SYMEVENT64x86.SYS
fffff880`01091000 fffff880`01107000   SYMTDIV  SYMTDIV.SYS 
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys   
fffff880`07b18000 fffff880`07b2a000   tcpipreg tcpipreg.sys
fffff880`01a8a000 fffff880`01a97000   TDI      TDI.SYS     
fffff880`01a6c000 fffff880`01a8a000   tdx      tdx.sys     
fffff880`02efd000 fffff880`02f11000   termdd   termdd.sys  
fffff960`004d0000 fffff960`004da000   TSDDD    TSDDD.dll   
fffff880`0453f000 fffff880`04565000   tunnel   tunnel.sys  
fffff880`04043000 fffff880`04055000   umbus    umbus.sys   
fffff880`04d64000 fffff880`04d81000   usbccgp  usbccgp.sys 
fffff880`05dfb000 fffff880`05dfcf00   USBD     USBD.SYS    
fffff880`10dd5000 fffff880`10de6000   usbehci  usbehci.sys 
fffff880`04c89000 fffff880`04ce3000   usbhub   usbhub.sys  
fffff880`0457b000 fffff880`045d1000   USBPORT  USBPORT.SYS 
fffff880`10dc8000 fffff880`10dd5000   usbuhci  usbuhci.sys 
fffff880`041c7000 fffff880`041d6000   VClone   VClone.sys  
fffff880`00e6a000 fffff880`00e77000   vdrvroot vdrvroot.sys
fffff880`01bd3000 fffff880`01be1000   vga      vga.sys     
fffff880`05c21000 fffff880`05d45000   viahduaa viahduaa.sys
fffff880`01a00000 fffff880`01a25000   VIDEOPRT VIDEOPRT.SYS
fffff880`017ef000 fffff880`017ff000   vmstorfl vmstorfl.sys
fffff880`01000000 fffff880`01015000   volmgr   volmgr.sys  
fffff880`01015000 fffff880`01071000   volmgrx  volmgrx.sys 
fffff880`01273000 fffff880`012bf000   volsnap  volsnap.sys 
fffff880`02ee2000 fffff880`02efd000   wanarp   wanarp.sys  
fffff880`01a25000 fffff880`01a35000   watchdog watchdog.sys
fffff880`00f48000 fffff880`00fec000   Wdf01000 Wdf01000.sys
fffff880`00fec000 fffff880`00ffb000   WDFLDR   WDFLDR.SYS  
fffff880`02e87000 fffff880`02e90000   wfplwf   wfplwf.sys  
fffff960`00070000 fffff960`0037f000   win32k   win32k.sys  
fffff880`04dd3000 fffff880`04de4000   WinUSB   WinUSB.sys  
fffff880`00e57000 fffff880`00e60000   WMILIB   WMILIB.SYS  
fffff880`04db2000 fffff880`04dd3000   WudfPf   WudfPf.sys  
fffff880`04c00000 fffff880`04c31000   WUDFRd   WUDFRd.sys  
fffff880`04d53000 fffff880`04d63980   xusb21   xusb21.sys  

Unloaded modules:
fffff880`07c00000 fffff880`07c71000   spsys.sys
fffff880`04d05000 fffff880`04d16000   WinUSB.sys
fffff880`04d16000 fffff880`04d47000   WUDFRd.sys
fffff880`01b63000 fffff880`01b71000   crashdmp.sys
fffff880`01b71000 fffff880`01b7d000   dump_ataport
fffff880`01b7d000 fffff880`01b86000   dump_atapi.s
fffff880`01b86000 fffff880`01b99000   dump_dumpfve
fffff880`01098000 fffff880`011be000   sptd.sys
2: kd> lmvm ASACPI
start             end                 module name
fffff880`10df8000 fffff880`10e00000   ASACPI     (deferred)             
    Image path: \SystemRoot\system32\DRIVERS\ASACPI.sys
    Image name: ASACPI.sys
    Timestamp:        Mon Oct 30 22:09:12 2006 (4546B048)
    CheckSum:         000089FB
    ImageSize:        00008000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
 

· Registered
Joined
·
8 Posts
Discussion Starter · #11 ·
In addition to removing Norton, install the latest ATK 0110 utility for Windows 7/Vista from here: http://support.asus.com/download/download.aspx?SLanguage=en-us

If that doesn't do the trick, enable driver verifier: http://www.techsupportforum.com/f217/driver-verifier-windows-7-and-vista-bsod-related-473665.html
Ok, I downloaded the ATK 0110 utility and ran the .exe inside. A command prompt box opened up for a couple of seconds and then my computer restarted. I'm assuming that's what it was supposed to do? I'll see how things go, thanks so very much for the advice.
 

· Registered
Joined
·
8 Posts
Discussion Starter · #13 ·
Ok, ASACPI.sys says its from 2009, so it looks like it worked. I haven't had anymore BSODs, but it hasn't been that long. I'll post In a day or two to let you all know if it worked. Again, thanks so much for all the help, it is very appreciated.
 

· TSF Team Emeritus, Visiting Expert | Microsoft Sup
Joined
·
4,053 Posts
1 - 16 of 16 Posts
Status
Not open for further replies.
Top