New
#11
Try these instructions: https://www.sevenforums.com/crashes-d...tructions.html
Maybe there is event viewer logs that will be helpful.
Try these instructions: https://www.sevenforums.com/crashes-d...tructions.html
Maybe there is event viewer logs that will be helpful.
Go ahead and run it again, I would like to see the new event viewer logs that have been generated.
I have looked at the latest four dump files. Three show a stop error code of 1A and one shows 50. These point to hardware/hardware relate problems.
STOP 0x0000001A: MEMORY_MANAGEMENT
Usual causes: Device driver, memory, kernel
STOP 0x00000050: PAGE_FAULT_IN_NONPAGED_AREA
Usual causes: Defective hardware (particularly memory - but not just RAM), Faulty system service, Antivirus, Device driver, NTFS corruption, BIOSLet's begin by testing your RAM. Download a copy of Memtest86 and burn the ISO to a CD using Iso Recorder or another ISO burning program. Boot from the CD, and leave it running for at least 5 or 6 passes. Post back with the results of these test.Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\Windows7_BSOD_jcgriff2\071210-20498-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50 Debug session time: Mon Jul 12 07:36:00.902 2010 (GMT-4) System Uptime: 0 days 0:11:28.179 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80021020a0, ffff, 0} Probably caused by : win32k.sys ( win32k!FreeView+a2 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80021020a0 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: conhost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002b01ede to fffff80002a8e600 STACK_TEXT: fffff880`09924268 fffff800`02b01ede : 00000000`0000001a 00000000`00041790 fffffa80`021020a0 00000000`0000ffff : nt!KeBugCheckEx fffff880`09924270 fffff800`02ac1cc9 : 00000000`00000000 00000000`0062ffff 00000000`00000000 00000000`0099f018 : nt! ?? ::FNODOBFM::`string'+0x33946 fffff880`09924430 fffff800`02da8170 : fffffa80`0aeaf890 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`09924550 fffff960`000ebfd6 : 00000000`00000000 fffff900`c0831790 fffff900`00000001 fffff900`c0ab1240 : nt!MiUnmapViewOfSection+0x1b0 fffff880`09924610 fffff960`000e9dcb : fffff880`09924730 fffff960`000e9d60 00000000`00000001 fffff960`000e944c : win32k!FreeView+0xa2 fffff880`09924680 fffff800`02d364cc : 00000000`00000000 fffffa80`09eb4ef0 00000000`00000001 fffff900`c0ab48d0 : win32k!UnmapDesktop+0x6b fffff880`099246b0 fffff800`02d4bcff : 00000000`00000000 fffffa80`09e39060 fffffa80`09eb4ef0 fffffa80`0676e3f0 : nt!ExpWin32SessionCallout+0x5c fffff880`09924710 fffff800`02d8b604 : fffffa80`09e39060 00000000`00000000 fffffa80`0a7ec060 00000000`00000000 : nt!ExpWin32CloseProcedure+0x53 fffff880`09924760 fffff800`02da54a1 : fffffa80`09e39060 fffffa80`00000001 fffff8a0`0226c0a0 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4 fffff880`099247e0 fffff800`02da53b4 : 00000000`00000018 fffffa80`09e39060 fffff8a0`0226c0a0 00000000`00000018 : nt!ObpCloseHandleTableEntry+0xb1 fffff880`09924870 fffff960`000ed1ff : 00000000`00000018 00000000`00004000 00000000`00000000 fffff960`000e8d87 : nt!ObpCloseHandle+0x94 fffff880`099248c0 fffff960`000e408f : fffff900`c2085ce0 fffff880`09924c20 00000000`ffffffff fffffa80`09e39060 : win32k!DestroyProcessInfo+0x327 fffff880`099248f0 fffff960`000e418a : fffffa80`09e25b00 fffff900`c2085ce0 fffffa80`0a7ec060 fffff880`09924c20 : win32k!xxxUserProcessCallout+0x15f fffff880`09924940 fffff800`02d74881 : fffffa80`09e25bc0 00000000`00000000 00000000`00000000 fffffa80`0a7ec060 : win32k!W32pProcessCallout+0x4e fffff880`09924970 fffff800`02d4d4d1 : 00000000`00000000 fffff8a0`0369c001 00000000`78457300 fffffa80`0a5d65d0 : nt!PspExitThread+0x561 fffff880`09924a30 fffff800`02a6b0e3 : fffff8a0`0369c010 fffff800`02d90fd8 fffff880`09924ca0 00000000`fffeffff : nt!PsExitSpecialApc+0x1d fffff880`09924a60 fffff800`02a6b520 : 00000000`00000001 fffff880`09924ae0 fffff800`02d4d5dc 00000000`00000001 : nt!KiDeliverApc+0x2eb fffff880`09924ae0 fffff800`02a8d8f7 : fffffa80`0a7ec060 fffff880`09924ca0 00000000`0099f520 fffffa80`0aa57460 : nt!KiInitiateUserApc+0x70 fffff880`09924c20 00000000`77a6fe0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`0099f558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a6fe0a STACK_COMMAND: kb FOLLOWUP_IP: win32k!FreeView+a2 fffff960`000ebfd6 488b06 mov rax,qword ptr [rsi] SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: win32k!FreeView+a2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4bdc4376 FAILURE_BUCKET_ID: X64_0x1a_41790_win32k!FreeView+a2 BUCKET_ID: X64_0x1a_41790_win32k!FreeView+a2 Followup: MachineOwner --------- 3: kd> lmtsmn start end module name fffff880`045bb000 fffff880`045f9000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00eb4000 fffff880`00f0b000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`040f7000 fffff880`04181000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`048c5000 fffff880`048db000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`0119c000 fffff880`011a7000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`048a1000 fffff880`048a9000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD) fffff880`043a8000 fffff880`043ae000 AsIO AsIO.sys Mon Aug 03 03:03:16 2009 (4A768BB4) fffff880`043a2000 fffff880`043a8000 AsUpIO AsUpIO.sys Sun Jul 05 22:21:38 2009 (4A515FB2) fffff880`075a5000 fffff880`075b0000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5) fffff880`01169000 fffff880`01172000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`01172000 fffff880`0119c000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`05339000 fffff880`0535c000 AtiHdmi AtiHdmi.sys Thu May 06 05:20:39 2010 (4BE289E7) fffff880`048f2000 fffff880`04fce000 atikmdag atikmdag.sys Thu May 27 12:47:58 2010 (4BFEA23E) fffff880`04200000 fffff880`04246000 atikmpag atikmpag.sys Thu May 27 12:25:36 2010 (4BFE9D00) fffff960`00880000 fffff960`008e1000 ATMFD ATMFD.DLL Thu May 27 00:11:31 2010 (4BFDF0F3) fffff880`02d9d000 fffff880`02da4000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`04391000 fffff880`043a2000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`04712000 fffff880`04730000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00690000 fffff960`006b7000 cdd cdd.dll unavailable (00000000) fffff880`02d3d000 fffff880`02d67000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`015b3000 fffff880`015e3000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00d3e000 fffff880`00d9c000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`01433000 fffff880`014a6000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`048b5000 fffff880`048c5000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`053c1000 fffff880`053cf000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`042f0000 fffff880`04373000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`04373000 fffff880`04391000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`0121a000 fffff880`01229000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`0168f000 fffff880`016a5000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`05399000 fffff880`053bb000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`02ba6000 fffff880`02bb9000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`02a88000 fffff880`02ba6000 dump_iaStorV dump_iaStorV.sys Wed Apr 08 12:57:17 2009 (49DCD76D) fffff880`0525c000 fffff880`05268000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`044c7000 fffff880`045bb000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`04400000 fffff880`04446000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`0447b000 fffff880`044c4000 e1e6232e e1e6232e.sys Fri Mar 26 04:14:14 2010 (4BAC6CD6) fffff880`01000000 fffff880`01014000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`011a7000 fffff880`011f3000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`014b7000 fffff880`014c1000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01655000 fffff880`0168f000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`01751000 fffff880`0179b000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`02ffa000 fffff800`03043000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`04446000 fffff880`0446a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`05200000 fffff880`0525c000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23) fffff880`02a0e000 fffff880`02a27000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`02a27000 fffff880`02a2f080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`02a00000 fffff880`02a0e000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`0464a000 fffff880`04712000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`0164c000 fffff880`01655000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`0104b000 fffff880`01169000 iaStorV iaStorV.sys Wed Apr 08 12:57:17 2009 (49DCD76D) fffff880`043d4000 fffff880`043ea000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`043ea000 fffff880`043f9000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`02a30000 fffff880`02a3e000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bb5000 fffff800`00bbf000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`05271000 fffff880`052b4000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F) fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01726000 fffff880`01751000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`053bb000 fffff880`053c0200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`052b4000 fffff880`052b7d80 LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0) fffff880`07531000 fffff880`07533480 LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0) fffff880`02c8e000 fffff880`02ca3000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`02a51000 fffff880`02a74000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00ce6000 fffff880`00d2a000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`053cf000 fffff880`053dd000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`01229000 fffff880`01238000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`02a44000 fffff880`02a51000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02d67000 fffff880`02d94000 MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0) fffff880`07521000 fffff880`07531000 MpNWMon MpNWMon.sys Sat Mar 20 01:58:00 2010 (4BA463E8) fffff880`04730000 fffff880`04748000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`04748000 fffff880`04775000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`04775000 fffff880`047c3000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`047c3000 fffff880`047e6000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`016b3000 fffff880`016be000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f14000 fffff880`00f1e000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`00d9c000 fffff880`00dfa000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`041f5000 fffff880`04200000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`0163a000 fffff880`0164c000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`014c1000 fffff880`015b3000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04ff2000 fffff880`04ffe000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`04246000 fffff880`04275000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`05324000 fffff880`05339000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`04000000 fffff880`0400f000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`04181000 fffff880`041c6000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`016c6000 fffff880`01726000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`015e3000 fffff880`015f4000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`040e8000 fffff880`040f4000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02a1e000 fffff800`02ffa000 nt ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB) fffff880`01253000 fffff880`013f6000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`02d94000 fffff880`02d9d000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`041cf000 fffff880`041f5000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00f5e000 fffff880`00f73000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f1e000 fffff880`00f51000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00fe4000 fffff880`00feb000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00feb000 fffff880`00ffb000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`014a6000 fffff880`014b7000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`07084000 fffff880`0712a000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`0535c000 fffff880`05399000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00d2a000 fffff880`00d3e000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`04fce000 fffff880`04ff2000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04275000 fffff880`04290000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`04290000 fffff880`042b1000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`042b1000 fffff880`042cb000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02a3e000 fffff880`02a43280 Razerlow Razerlow.sys Mon Nov 07 01:33:11 2005 (436EF527) fffff880`04097000 fffff880`040e8000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`048db000 fffff880`048e6000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`02de7000 fffff880`02df0000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02df0000 fffff880`02df9000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02c00000 fffff880`02c09000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01600000 fffff880`0163a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`02ca3000 fffff880`02cbb000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`04856000 fffff880`048a1000 Rt64win7 Rt64win7.sys Thu Nov 05 09:15:41 2009 (4AF2DE0D) fffff880`0712a000 fffff880`07135000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`048a9000 fffff880`048b5000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`0400f000 fffff880`0402c000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8) fffff880`02bf3000 fffff880`02c00000 skfiltv skfiltv.sys Thu Aug 14 02:48:33 2008 (48A3D541) fffff880`017f7000 fffff880`017ff000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`07400000 fffff880`07471000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A) fffff880`07489000 fffff880`07521000 srv srv.sys Tue Dec 08 03:32:55 2009 (4B1E0F37) fffff880`07174000 fffff880`071dd000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E) fffff880`07135000 fffff880`07162000 srvnet srvnet.sys Tue Dec 08 03:32:26 2009 (4B1E0F1A) fffff880`044c4000 fffff880`044c5480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`01801000 fffff880`019fe000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E) fffff880`07162000 fffff880`07174000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`0141e000 fffff880`0142b000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`01400000 fffff880`0141e000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`04083000 fffff880`04097000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00490000 fffff960`0049a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`043ae000 fffff880`043d4000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`02c09000 fffff880`02c5d000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9) fffff880`052b8000 fffff880`052ca000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`02bd8000 fffff880`02bf2c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`02bb9000 fffff880`02bd6000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`02bd6000 fffff880`02bd7f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`0446a000 fffff880`0447b000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`052ca000 fffff880`05324000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D) fffff880`04800000 fffff880`04856000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`04053000 fffff880`04082dc0 VBoxDrv VBoxDrv.sys Fri Jun 25 09:32:28 2010 (4C24AFEC) fffff880`042cb000 fffff880`042ecb00 VBoxNetAdp VBoxNetAdp.sys Fri Jun 25 09:32:28 2010 (4C24AFEC) fffff880`01014000 fffff880`0103a740 VBoxNetFlt VBoxNetFlt.sys Fri Jun 25 09:32:28 2010 (4C24AFEC) fffff880`04047000 fffff880`040528c0 VBoxUSBMon VBoxUSBMon.sys Fri Jun 25 09:32:28 2010 (4C24AFEC) fffff880`00f51000 fffff880`00f5e000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`02da4000 fffff880`02db2000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`02db2000 fffff880`02dd7000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`0179b000 fffff880`017ab000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`045f9000 fffff880`04600000 vncmirror vncmirror.sys Fri Mar 14 13:43:05 2008 (47DAB929) fffff880`00f73000 fffff880`00f88000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00f88000 fffff880`00fe4000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`017ab000 fffff880`017f7000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`0402c000 fffff880`04047000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02dd7000 fffff880`02de7000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e01000 fffff880`00ea5000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00ea5000 fffff880`00eb4000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`041c6000 fffff880`041cf000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00020000 fffff960`0032f000 win32k win32k.sys Sat May 01 11:06:30 2010 (4BDC4376) fffff880`00f0b000 fffff880`00f14000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`053dd000 fffff880`053fe000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) Unloaded modules: fffff880`02c5d000 fffff880`02c8e000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`07534000 fffff880`075a5000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`016a5000 fffff880`016b3000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`02c0c000 fffff880`02d2a000 dump_iaStorV Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`02d2a000 fffff880`02d3d000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01014000 fffff880`01045000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01014000 fffff880`01045000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\Windows7_BSOD_jcgriff2\071210-20124-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50 Debug session time: Mon Jul 12 07:58:50.602 2010 (GMT-4) System Uptime: 0 days 0:08:12.601 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffffa80c2201c58, 0, fffff80002c894ab, 5} Could not read faulting driver name Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+48b ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffa80c2201c58, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80002c894ab, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0 fffffa80c2201c58 FAULTING_IP: nt!MiAgeWorkingSet+48b fffff800`02c894ab 6641837f1801 cmp word ptr [r15+18h],1 MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: System CURRENT_IRQL: 0 TRAP_FRAME: fffff880033e77a0 -- (.trap 0xfffff880033e77a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000003 rbx=0000000000000000 rcx=fffff6fc50079ba0 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002c894ab rsp=fffff880033e7930 rbp=0000000000000007 r8=0000000000000001 r9=fffff80002e01b40 r10=0000000000000005 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!MiAgeWorkingSet+0x48b: fffff800`02c894ab 6641837f1801 cmp word ptr [r15+18h],1 ds:9410:00000000`00000018=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002cf4801 to fffff80002c75600 STACK_TEXT: fffff880`033e7638 fffff800`02cf4801 : 00000000`00000050 fffffa80`c2201c58 00000000`00000000 fffff880`033e77a0 : nt!KeBugCheckEx fffff880`033e7640 fffff800`02c736ee : 00000000`00000000 d3d00040`b55ec963 00000000`00040000 00000000`000000ef : nt! ?? ::FNODOBFM::`string'+0x40ecb fffff880`033e77a0 fffff800`02c894ab : fffff800`000002c9 00000000`000001ed 00000000`00000000 00000000`000007ff : nt!KiPageFault+0x16e fffff880`033e7930 fffff800`02cf799e : fffff800`02e01b40 fffff880`00000001 00000000`00000001 fffff880`033e7bb0 : nt!MiAgeWorkingSet+0x48b fffff880`033e7ae0 fffff800`02c89de2 : 00000000`000001ed 00000000`00000000 fffffa80`00000000 00000000`00000006 : nt! ?? ::FNODOBFM::`string'+0x49716 fffff880`033e7b80 fffff800`02c8a06f : 00000000`00000008 fffff880`033e7c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e fffff880`033e7bd0 fffff800`02f1aa86 : fffffa80`06747a60 00000000`00000080 fffffa80`06713040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3 fffff880`033e7d40 fffff800`02c53b06 : fffff880`009b2180 fffffa80`06747a60 fffff880`009bd0c0 00000000`00000020 : nt!PspSystemThreadStartup+0x5a fffff880`033e7d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiAgeWorkingSet+48b fffff800`02c894ab 6641837f1801 cmp word ptr [r15+18h],1 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiAgeWorkingSet+48b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+48b BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+48b Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\Windows7_BSOD_jcgriff2\071210-19702-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50 Debug session time: Mon Jul 12 07:48:21.245 2010 (GMT-4) System Uptime: 0 days 0:10:09.244 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80033dcdd0, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80033dcdd0 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002af4ede to fffff80002a81600 STACK_TEXT: fffff880`07a89428 fffff800`02af4ede : 00000000`0000001a 00000000`00041790 fffffa80`033dcdd0 00000000`0000ffff : nt!KeBugCheckEx fffff880`07a89430 fffff800`02ab4cc9 : 00000000`00000000 00000000`08d36fff fffff880`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33946 fffff880`07a895f0 fffff800`02d9b170 : fffffa80`0af9f9c0 0007ffff`00000000 fffffa80`09c56660 fffffa80`09c56660 : nt!MiRemoveMappedView+0xd9 fffff880`07a89710 fffff800`02d9b57b : 00000980`00000000 00000000`08b40000 fffffa80`00000001 00000000`77763501 : nt!MiUnmapViewOfSection+0x1b0 fffff880`07a897d0 fffff800`02a80853 : 00000000`00000000 00000000`77763650 fffffa80`09c6f060 ffffffff`f80101aa : nt!NtUnmapViewOfSection+0x5f fffff880`07a89820 00000000`7767fffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`02b6dc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7767fffa STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946 fffff800`02af4ede cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946 Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\Windows7_BSOD_jcgriff2\071210-18330-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02c50000 PsLoadedModuleList = 0xfffff800`02e8de50 Debug session time: Mon Jul 12 09:00:03.570 2010 (GMT-4) System Uptime: 0 days 0:58:52.745 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa8002101dd0, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 ) Followup: MachineOwner --------- 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa8002101dd0 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002d33ede to fffff80002cc0600 STACK_TEXT: fffff880`08a4aa28 fffff800`02d33ede : 00000000`0000001a 00000000`00041790 fffffa80`02101dd0 00000000`0000ffff : nt!KeBugCheckEx fffff880`08a4aa30 fffff800`02d01fca : 00000000`00000000 00000000`080ecfff fffffa80`00000000 fffffa80`09ced060 : nt! ?? ::FNODOBFM::`string'+0x33946 fffff880`08a4abf0 fffff800`02cbf853 : ffffffff`ffffffff 00000000`03e5e7e0 00000000`03e5e7a8 fffffa80`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`08a4ace0 00000000`7783ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`03e5e718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7783ff3a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946 fffff800`02d33ede cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946 Followup: MachineOwner ---------
You have some outdated drivers on your system. Older drivers can cause conflicts and memory corruption with Win 7.
iaStorV.sys Wed Apr 08 12:57:17 2009 - This driver was indicated in one of the dumps. Intel Storage drivers http://downloadcenter.intel.com/Default.aspx Also you might want read this link: Intel Matrix Storage Manager: iaStor.sys vs iaStorV.sys
Razerlow.sys Mon Nov 07 01:33:11 2005 - Razer Diamondback driver, Diamonback USB Optical Mouse Driver Razer Support If you cannot find an updated driver for this one, you might consider a new optical mouse certified for Win 7.
skfiltv.sys Thu Aug 14 02:48:33 2008 - probably Pilote USB audio (WDM); Creative wireless headset; Hs-1200 Digital Wireless Headset Creative Worldwide Support
vncmirror.sys Fri Mar 14 13:43:05 2008 - VNC Mirror Miniport is a driver file from company RealVNC Ltd. belonging to product VNC Server for Windows.
Start with the oldest driver and try to update them. if you need help, please ask.
How to find drivers:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
Last edited by CarlTR6; 28 Jul 2010 at 21:33.
already did the memory test thing and it passed..
maybe i'll just format it or ship it to warranty, as the laptop is 2 weeks old they must fix it.
I would do that if it is under warranty. But refresh your page and see what I added to my post above. You have some obsolete drivers and hardware and software that are not helping the stability of your system. You might try updated those older drivers in the red font before you decide to ship your computer off.
When you do the memory test, did you use Memtest86 or the Windows built in memory test? I do not have much confidence in Windows built in test.
it was the memtest86
those drivers idk where they came from... i dont have a razer mouse..never had. i dont have a create wireless headset and i dont have vnc installed