New
#1
BSOD While surfing the Internet
Well I frequently get random BSOD's when I am surfing the net. I never download anything and am very careful when running .exe's.
I got the attached two BSOD's in the past 6 hours. Please help!
Well I frequently get random BSOD's when I am surfing the net. I never download anything and am very careful when running .exe's.
I got the attached two BSOD's in the past 6 hours. Please help!
Both of these dumps show the same stop error code.
STOP 0x00000019: BAD_POOL_HEADER
Usual causes: Device driverTo start I reccomend that you enable Driver Verifier and let it run unil it blue screens. The upload the dumps. We would prefer that you zip the dumps and do use rar. In the meantime, I will look at your drivers and see if I can find problems there.Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\Dump Files\072910-24086-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.x86fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0x82a39000 PsLoadedModuleList = 0x82b81810 Debug session time: Thu Jul 29 14:07:22.090 2010 (GMT-4) System Uptime: 0 days 0:28:59.196 Loading Kernel Symbols ............................................................... ................................................................ .................... Loading User Symbols Loading unloaded module list ...... 1: kd> !analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 19, {20, 8520d000, 8520d300, 8600000} Probably caused by : fileinfo.sys ( fileinfo!FIStreamGetInfo+109 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_HEADER (19) The pool is already corrupt at the time of the current request. This may or may not be due to the caller. The internal pool links must be walked to figure out a possible cause of the problem, and then special pool applied to the suspect tags or the driver verifier to a suspect driver. Arguments: Arg1: 00000020, a pool block header size is corrupt. Arg2: 8520d000, The pool entry we were looking for within the page. Arg3: 8520d300, The next pool entry. Arg4: 08600000, (reserved) Debugging Details: ------------------ BUGCHECK_STR: 0x19_20 POOL_ADDRESS: GetPointerFromAddress: unable to read from 82ba1718 Unable to read MiSystemVaType memory at 82b81160 8520d000 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 82c7ae8a to 82b581b6 STACK_TEXT: 9960f080 82c7ae8a 8520d008 00000000 84ee4938 nt!ExFreePoolWithTag+0x1b1 9960f0cc 82c5a73c 851cc6e8 851cc6e8 851cc6d0 nt!IopDeleteFile+0x18f 9960f0e4 82aa1f60 00000000 8769a2c8 851cc6d0 nt!ObpRemoveObjectRoutine+0x59 9960f0f8 82aa1ed0 851cc6e8 82c7e7cc 8b801d10 nt!ObfDereferenceObjectWithTag+0x88 9960f100 82c7e7cc 8b801d10 8769a2c8 00002588 nt!ObfDereferenceObject+0xd 9960f144 82c7ffb2 8b801d10 a7479b10 84e607f0 nt!ObpCloseHandleTableEntry+0x21d 9960f174 82c8012a 84e607f0 00000000 9960f218 nt!ObpCloseHandle+0x7f 9960f190 82a7c44a 80002588 9960f238 82a79dad nt!NtClose+0x4e 9960f190 82a79dad 80002588 9960f238 82a79dad nt!KiFastCallEntry+0x12a 9960f20c 8a93c082 80002588 00000000 86dcb0b0 nt!ZwClose+0x11 9960f238 8a93cdf4 01dcb0b0 00000000 86dcb0b0 fltmgr!FltpExpandShortNames+0x304 9960f254 8a93d505 86dc0000 00000000 872dbefc fltmgr!FltpGetNormalizedFileNameWorker+0xae 9960f26c 8a93a765 86dcb0b0 00000000 86dcb0b0 fltmgr!FltpGetNormalizedFileName+0x19 9960f284 8a924b21 86dcb0b0 00000000 00000000 fltmgr!FltpCreateFileNameInformation+0x81 9960f2b4 8a924fa3 86867d64 00000000 9960f34c fltmgr!FltpGetFileNameInformation+0x321 9960f2dc 8a957c87 00143940 00000401 9960f310 fltmgr!FltGetFileNameInformation+0x12b 9960f32c 8a957edd 85143940 9960f34c 00002991 fileinfo!FIStreamGetInfo+0x109 9960f368 8a91e324 85143940 9960f38c 00000000 fileinfo!FIPostCreateCallback+0x171 9960f3d0 8a921512 001438e0 851438e0 1000000c fltmgr!FltpPerformPostCallbacks+0x24a 9960f3e4 8a921b46 851438e0 850fd548 9960f424 fltmgr!FltpProcessIoCompletion+0x10 9960f3f4 8a92229c 85d522a0 850fd548 851438e0 fltmgr!FltpPassThroughCompletion+0x98 9960f424 8a9358c9 9960f444 00000000 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x33a 9960f470 82a754bc 85d522a0 86653288 8533c514 fltmgr!FltpCreate+0x2db 9960f488 82c7966d bf1fc90a 8505d570 85008008 nt!IofCallDriver+0x63 9960f560 82cc3071 85d522a0 84ee4938 84fda178 nt!IopParseDevice+0xed7 9960f5a0 82c5a21f 8505d570 84ee4938 84fda178 nt!IopParseFile+0x51 9960f61c 82c8028d 8000259c 9960f670 00000240 nt!ObpLookupObjectName+0x4fa 9960f678 82c785eb 9960f8d8 84ee4938 00000000 nt!ObOpenObjectByName+0x159 9960f6f4 82cafdd9 9960f8ac 00000020 9960f8d8 nt!IopCreateFile+0x673 9960f750 8a937b62 9960f8ac 00000020 9960f8d8 nt!IoCreateFileEx+0x9e 9960f7dc 8a95a2d3 84ed8b00 00000000 9960f8ac fltmgr!FltCreateFileEx2+0xba 9960f8bc 82c4f966 00000000 9960f9c0 9960f934 fileinfo!FIPfInterfaceOpen+0x2a9 9960f920 82c3dc73 9960f97c 8000259c 00000020 nt!PfpOpenHandleCreate+0xc0 9960f998 82c3d712 9960fa58 a8579bb0 00000201 nt!PfpFileBuildReadSupport+0x93 9960fa2c 82c3f0f2 0060fa58 9960fbb4 00000001 nt!PfpPrefetchFilesTrickle+0xdf 9960fad0 82c3edaf a8577000 bf1fc74e 9960fbc8 nt!PfpPrefetchRequestPerform+0x2a6 9960fb24 82c589c7 9960fbb4 82a07b01 bf1fc782 nt!PfpPrefetchRequest+0x16e 9960fbe8 82cc4936 0325fd38 00000014 82a07b01 nt!PfSetSuperfetchInformation+0x182 9960fd20 82a7c44a 0000004f 00000000 00000014 nt!NtSetSystemInformation+0xb00 9960fd20 775664f4 0000004f 00000000 00000014 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0325fd50 00000000 00000000 00000000 00000000 0x775664f4 STACK_COMMAND: kb FOLLOWUP_IP: fileinfo!FIStreamGetInfo+109 8a957c87 85c0 test eax,eax SYMBOL_STACK_INDEX: 10 SYMBOL_NAME: fileinfo!FIStreamGetInfo+109 FOLLOWUP_NAME: MachineOwner MODULE_NAME: fileinfo IMAGE_NAME: fileinfo.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18f FAILURE_BUCKET_ID: 0x19_20_fileinfo!FIStreamGetInfo+109 BUCKET_ID: 0x19_20_fileinfo!FIStreamGetInfo+109 Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\Dump Files\072910-25365-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.x86fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0x82a53000 PsLoadedModuleList = 0x82b9b810 Debug session time: Thu Jul 29 09:44:43.500 2010 (GMT-4) System Uptime: 0 days 0:04:22.482 Loading Kernel Symbols ............................................................... ................................................................ ..................... Loading User Symbols Loading unloaded module list ........ 0: kd> !Analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 19, {20, 8520d000, 8520d300, 8600000} GetPointerFromAddress: unable to read from 82bbb718 Unable to read MiSystemVaType memory at 82b9b160 Probably caused by : ntkrpamp.exe ( nt!ExFreePoolWithTag+1b1 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_HEADER (19) The pool is already corrupt at the time of the current request. This may or may not be due to the caller. The internal pool links must be walked to figure out a possible cause of the problem, and then special pool applied to the suspect tags or the driver verifier to a suspect driver. Arguments: Arg1: 00000020, a pool block header size is corrupt. Arg2: 8520d000, The pool entry we were looking for within the page. Arg3: 8520d300, The next pool entry. Arg4: 08600000, (reserved) Debugging Details: ------------------ GetPointerFromAddress: unable to read from 82bbb718 Unable to read MiSystemVaType memory at 82b9b160 BUGCHECK_STR: 0x19_20 POOL_ADDRESS: GetPointerFromAddress: unable to read from 82bbb718 Unable to read MiSystemVaType memory at 82b9b160 8520d000 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 82b73a76 to 82b721b6 STACK_TEXT: 9e56d5bc 82b73a76 8520d008 00000000 9e56d5d8 nt!ExFreePoolWithTag+0x1b1 9e56d5cc 8a91be8c 8520d008 9e56d5e8 8a922ed7 nt!ExFreePool+0xf 9e56d5d8 8a922ed7 8a92ac80 8520d008 9e56d5fc fltmgr!ExFreeToNPagedLookasideList+0x1e 9e56d5e8 8a93a9ba 8520d008 a62740f8 00000000 fltmgr!FltpReleaseStreamListCtrl+0x1f 9e56d5fc 82c71800 8520d00c ba11a687 00000000 fltmgr!DeleteStreamListCtrlCallback+0x60 9e56d63c 8aab4fb2 a62740f8 a6274008 a62740f8 nt!FsRtlTeardownPerStreamContexts+0x13a 9e56d658 8aaabb3b 00000705 a6274030 a6274008 Ntfs!NtfsDeleteScb+0x214 9e56d670 8aa1b71e 85076c68 a62740f8 00000000 Ntfs!NtfsRemoveScb+0xc5 9e56d68c 8aa9c0d2 85076c68 a6274008 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x62 9e56d6d0 8aa18bec 85076c68 a62740f8 a62742a0 Ntfs!NtfsTeardownStructures+0x68 9e56d6f8 8aa9855b 85076c68 a62740f8 a62742a0 Ntfs!NtfsDecrementCloseCounts+0xaf 9e56d758 8aab74c3 85076c68 a62740f8 a6274008 Ntfs!NtfsCommonClose+0x4f2 9e56d7ec 8aa7751f 85d360d8 14f291e1 85276330 Ntfs!NtfsFspClose+0x118 9e56d87c 8aa85fab 87225008 85d360d8 00000001 Ntfs!NtfsFlushVolume+0x74 9e56d900 8aa8676b 87225008 85276330 14f290f5 Ntfs!NtfsCommonFlushBuffers+0x1a9 9e56d968 82a8f4bc 85d36020 85276330 85276330 Ntfs!NtfsFsdFlushBuffers+0xf7 9e56d980 8a91f20c 85d35a60 85276330 00000000 nt!IofCallDriver+0x63 9e56d9a4 8a91f3cb 9e56d9c4 85d35a60 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa 9e56d9dc 82a8f4bc 85d35a60 85276330 85276330 fltmgr!FltpDispatch+0xc5 9e56d9f4 82c90f2e 85276330 86bb8a48 00000000 nt!IofCallDriver+0x63 9e56da14 82c71ea2 85d35a60 86bb8a48 00000000 nt!IopSynchronousServiceTail+0x1f8 9e56da80 82a9644a 871b4ec8 9e56db40 9e56dd50 nt!NtFlushBuffersFile+0x1d7 9e56da80 82a94361 871b4ec8 9e56db40 9e56dd50 nt!KiFastCallEntry+0x12a 9e56db00 82d72712 800003a0 9e56db40 00000000 nt!ZwFlushBuffersFile+0x11 9e56dd50 82c616bb 8cac6ac0 ba11ad2b 00000000 nt!PopFlushVolumeWorker+0x13c 9e56dd90 82b130f9 82d725d6 8cac6ac0 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 STACK_COMMAND: kb FOLLOWUP_IP: nt!ExFreePoolWithTag+1b1 82b721b6 cc int 3 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ExFreePoolWithTag+1b1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cacf FAILURE_BUCKET_ID: 0x19_20_nt!ExFreePoolWithTag+1b1 BUCKET_ID: 0x19_20_nt!ExFreePoolWithTag+1b1 Followup: MachineOwner --------- 0: kd> lmtsmn start end module name 8a7b0000 8a7f8000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 90228000 90282000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 9016c000 9017e000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954) 914c0000 915c6000 AGRSM AGRSM.sys Mon Nov 10 09:56:37 2008 (49184BA5) 90041000 90053000 amdk8 amdk8.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 8a910000 8a919000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 8a8e4000 8a8ed000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8a8ed000 8a910000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 90639000 90766000 athr athr.sys Mon Sep 21 13:58:25 2009 (4AB7BEC1) 90e0b000 913f3000 atikmdag atikmdag.sys Mon Dec 01 16:01:46 2008 (493450BA) 8a853000 8a85e000 BATTC BATTC.SYS Mon Jul 13 19:19:15 2009 (4A5BC0F3) 8ac26000 8ac2d000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 90200000 9020e000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8a63c000 8a644000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 988ad000 988c6000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD) 983a0000 983be000 cdd cdd.dll unavailable (00000000) 99791000 997a7000 cdfs cdfs.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8a686000 8a731000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 8adbb000 8ade0000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 8a644000 8a686000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 90053000 90056700 CmBatt CmBatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6) 8ab73000 8abd0000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 8a84b000 8a853000 compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6) 913f3000 91400000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 968bc000 968c9000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 9037d000 903e1000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 903e1000 903f9000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 90371000 9037d000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 8adaa000 8adbb000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 96899000 968b2000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5) 968d4000 968dd000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 968c9000 968d4000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 968dd000 968ee000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 968b2000 968bc000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 90057000 9010e000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1) 9010e000 90147000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 99767000 99791000 fastfat fastfat.SYS Mon Jul 13 19:14:01 2009 (4A5BBFB9) 8a94d000 8a95e000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 8a919000 8a94d000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 8abde000 8abe7000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8ad78000 8adaa000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55) 90039000 90041000 FwLnk FwLnk.sys Sun Nov 19 09:11:12 2006 (45606600) 8af71000 8afa2000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 907d4000 907db000 GEARAspiWDM GEARAspiWDM.sys Wed Feb 02 00:19:49 2005 (420062F5) 82a1c000 82a53000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 907db000 907fa000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F) 9681a000 9686a000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892) 98828000 988ad000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75) 8ae10000 8ae18000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 90600000 90618000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 90618000 90625000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80ba3000 80bab000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 91429000 9145d000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709) 8ab60000 8ab73000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 8ad26000 8ad4b000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 96980000 96990000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE) 9694b000 96966000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020) 8a620000 8a62b000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89) 915c8000 915d5000 modem modem.sys Mon Jul 13 19:55:24 2009 (4A5BC96C) 96940000 9694b000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286) 90625000 90632000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8a8ce000 8a8e4000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 8a95e000 8a981000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E) 9975e000 99766e00 MpNWMon MpNWMon.sys Sat Mar 20 00:03:24 2010 (4BA4490C) 988c6000 988d8000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4) 988d8000 988fb000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72) 988fb000 98936000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85) 98936000 98951000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B) 8a9ba000 8a9c5000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8a609000 8a611000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 8ab35000 8ab60000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F) 90367000 90371000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 8ae00000 8ae10000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 8ac31000 8ace8000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 90e00000 90e0b000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930) 969d6000 969e6000 ndisuio ndisuio.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 90196000 901b8000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A) 914af000 914c0000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933) 902eb000 902f9000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 90282000 902b4000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 8ace8000 8ad26000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 8a9c5000 8a9d3000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 9035d000 90367000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 82a53000 82e63000 nt ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF) 8aa06000 8ab35000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 8ac1f000 8ac26000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10) 96990000 969d6000 nwifi nwifi.sys Mon Jul 13 19:51:59 2009 (4A5BC89F) 902bb000 902da000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 8a83a000 8a84b000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 8a805000 8a82f000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8a8b9000 8a8c0000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 8a8c0000 8a8ce000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 8abd0000 8abde000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 98969000 98a00000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0) 9686a000 96899000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864) 8a62b000 8a63c000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 9017e000 90196000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939) 901b8000 901d0000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D) 901d0000 901e7000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947) 901e7000 901fe000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951) 9031c000 9035d000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 90000000 9000a000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 8a9a2000 8a9aa000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 8a9aa000 8a9b2000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 8a9b2000 8a9ba000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 8ad4b000 8ad78000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 969e6000 969f9000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0) 90147000 9016c000 Rt86win7 Rt86win7.sys Thu Feb 26 04:04:22 2009 (49A65B16) 98800000 9880a000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528) 8afef000 8aff7000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) 996ec000 9973d000 srv srv.sys Tue Dec 08 03:05:37 2009 (4B1E08D1) 9969d000 996ec000 srv2 srv2.sys Mon Jul 13 19:14:52 2009 (4A5BBFEC) 915d5000 915f6000 srvnet srvnet.sys Tue Dec 08 03:05:06 2009 (4B1E08B2) 90632000 90633380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8ae28000 8af71000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E) 9880a000 98817000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926) 8a9ea000 8a9f5000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 8a9d3000 8a9ea000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 9030c000 9031c000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 98330000 98339000 TSDDD TSDDD.dll unavailable (00000000) 90018000 90039000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 8afea000 8afee180 TVALZ_O TVALZ_O.SYS Thu Nov 08 22:07:46 2007 (4733CF02) 9145d000 9146b000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 968ee000 96905000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883) 915c6000 915c7700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 907c5000 907d4000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 9146b000 914af000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 90770000 9077a000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 9077a000 907c5000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 96929000 96940000 USBSTOR USBSTOR.SYS Mon Jul 13 19:51:19 2009 (4A5BC877) 96905000 96928b00 usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897) 8a82f000 8a83a000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 8abe7000 8abf3000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 8a981000 8a9a2000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 8afa2000 8afaa380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C) 8a85e000 8a86e000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8a86e000 8a8b9000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 8afab000 8afea000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 90766000 90770000 vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2) 902da000 902eb000 vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3) 902f9000 9030c000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 8abf3000 8ac00000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8a731000 8a7a2000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 8a7a2000 8a7b0000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 902b4000 902bb000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 980d0000 9831a000 win32k win32k.sys unavailable (00000000) 8a600000 8a609000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) 96966000 96980000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835) 9973d000 9975d480 WUDFRd WUDFRd.sys Mon Jul 13 19:50:44 2009 (4A5BC854) Unloaded modules: 997a7000 997c6000 cdrom.sys Timestamp: unavailable (00000000) Checksum: 00000000 99633000 9969d000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 8ac00000 8ac1f000 cdrom.sys Timestamp: unavailable (00000000) Checksum: 00000000 98951000 98969000 parport.sys Timestamp: unavailable (00000000) Checksum: 00000000 8ae18000 8ae25000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 8ade0000 8adeb000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 8aff7000 8b000000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 8adeb000 8adfc000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
Using Driver Verifier to identify issues with Drivers
Using Driver Verifier is an iffy proposition. Most times it'll crash and it'll tell you what the driver is. But sometimes it'll crash and won't tell you the driver. Other times it'll crash before you can log in to Windows. If you can't get to Safe Mode, then you'll have to resort to offline editing of the registry to disable Driver Verifier.
So, I'd suggest that you first backup your stuff and then make sure you've got access to another computer so you can contact us if problems arise. Then make a System Restore point (so you can restore the system using the Vista/Windows 7 Startup Repair feature).
Then, here's the procedure:
- Go to Start and type in "verifier" (without the quotes) and press Enter
- Select "Create custom settings (for code developers)" and click "Next"
- Select "Select individual settings from a full list" and click "Next"
- Select everything EXCEPT FOR "Low Resource Simulation" and click "Next"
- Select "Select driver names from a list" and click "Next"
Then select all drivers NOT provided by Microsoft and click "Next"
- Select "Finish" on the next page.
Reboot the system and wait for it to crash to the Blue Screen. Continue to use your system normally, and if you know what causes the crash, do that repeatedly. The objective here is to get the system to crash because Driver Verifier is stressing the drivers out. If it doesn't crash for you, then let it run for at least 36 hours of continuous operation (an estimate on my part).
Reboot into Windows (after the crash) and turn off Driver Verifier by going back in and selecting "Delete existing settings" on the first page, then locate and zip up the memory dump file and upload it with your next post.
If you can't get into Windows because it crashes too soon, try it in Safe Mode.
If you can't get into Safe Mode, try using System Restore from your installation DVD to set the system back to the previous restore point that you created.
If that doesn't work, post back and we'll have to see about fixing the registry entry off-line.
More info on this at this link: Using Driver Verifier to identify issues with Windows drivers for advanced users
Thank you very much Carl. I have done everything you said, just waiting for my computer to crash now :)
Very good. Post the bsod's when they occur.
I find the following outdated drivers on your system. Generally, Windows 7 does not like older drivers. They can cause conflicts and memory corruption.
AGRSM.sys Mon Nov 10 09:56:37 2008 - SoftModem Device Driver belongs to the software Agere Systems Soft Modem or TOSHIBA V92 Software Modem or Creatix V.92 Data Fax Modem by Agere Systems (www.agere.com). Update this driver or uninstall.
atikmdag.sys Mon Dec 01 16:01:46 2008 - ATI Video driver (remove the Catalyst Control Center and only install the Display Driver)Global Provider of Innovative Graphics, Processors and Media Solutions | AMD
FwLnk.sys Sun Nov 19 09:11:12 2006 - Toshiba Firmware Linkage service system driver (included in the Toshiba Value Added Package) Toshiba Support - Homepage Update the driver or uninstall the package.
GEARAspiWDM.sys Wed Feb 02 00:19:49 2005 - CD-ROM Class Filter Driver by Gear Softwarehttp://www.gearsoftware.com. CDRom Class Filter Driver or Filter Driver for 2k and XP or CD/DVD Class Filter Driver or CD DVD Filter or GEAR ASPI Filter Driver belongs to the software GEAR.wrks or GEAR CDRom Filter or GEARAspi or GEARAspiWDM or Norton Ghost or MixMeister Studio Demo or MixMeister Pro or GEAR 32bit Driver Installer or MixMeister CD-R Drivers or Drive Image or Norton Save and Restore or CD DVD Filter or GearDrvs or iTunes or GEAR ASPI Filter Driver or GEAR driver installer for x by GEAR Software Inc (www.gearsoftware.com). Updatre or uninstall.
Rt86win7.sys Thu Feb 26 04:04:22 2009 - I think this is a Realtek LAN driver. Realtek See if you can update it.
TVALZ_O.SYS Thu Nov 08 22:07:46 2007 - TOSHIBA ACPI-Based Value Added Logical and General Purpose Device Driver Toshiba Support - Homepage update this driver or uninstall the package.
All of the drivers in red are definitely obsolete.
How to update drivers
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
Let us know if you need help.
Thanks again for your help Carl, I really appreciate it. However I am not really tech savy and was wondering, how would I go about uninstalling a driver such as GEARAspiWDM.sys, TVALZ_O.SYS, AGRSM.sys and the Catalyst control panel (I tried searching for the CP on my laptop with no success).
Thanks!
My system has also just crashed so I have deleted driver verifiers settings. Attached to this post is the dump file that was generated.
Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\Dump Files\072910-34819-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.x86fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0x82a42000 PsLoadedModuleList = 0x82b8a810 Debug session time: Thu Jul 29 15:39:38.557 2010 (GMT-4) System Uptime: 0 days 0:00:14.695 Loading Kernel Symbols ............................................................... ......................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000008E, {c0000005, 4, 87b23404, 0} Unable to load image \SystemRoot\System32\drivers\dxgkrnl.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for dxgkrnl.sys *** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys Probably caused by : dxgkrnl.sys ( dxgkrnl+5861e ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 00000004, The address that the exception occurred at Arg3: 87b23404, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: +5861e 00000004 ?? ??? TRAP_FRAME: 87b23404 -- (.trap 0xffffffff87b23404) ErrCode = 00000010 eax=00000000 ebx=00000000 ecx=82ae455e edx=0000ae39 esi=00000000 edi=87b234b8 eip=00000004 esp=87b23478 ebp=00000000 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 00000004 ?? ??? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0x8E PROCESS_NAME: System CURRENT_IRQL: 1 LAST_CONTROL_TRANSFER: from 87b234b8 to 00000004 SYMBOL_ON_RAW_STACK: 1 STACK_ADDR_RAW_STACK_SYMBOL: ffffffff87b23754 STACK_COMMAND: dds 87B23754-0x20 ; kb STACK_TEXT: 87b23734 00000000 87b23738 a1ce1f13 87b2373c 87b237b8 87b23740 82c311e9 nt!IoGetDeviceProperty+0x1be 87b23744 87de6b60 87b23748 852241b0 watchdog!WdLogEvent5 87b2374c 8522407e watchdog!WdLogNewEntry5 87b23750 8d4af61e dxgkrnl+0x5861e 87b23754 87b23810 87b23758 87de6b60 87b2375c 0000005c 87b23760 00010040 87b23764 00000000 87b23768 ffffffff 87b2376c ffffffff 87b23770 00000000 87b23774 00000000 87b23778 00000000 87b2377c 00000000 87b23780 00000000 87b23784 00000000 87b23788 00000000 87b2378c 00000000 87b23790 00000000 87b23794 00000000 87b23798 00000000 87b2379c 00000000 87b237a0 8522407e watchdog!WdLogNewEntry5 87b237a4 8d4af61e dxgkrnl+0x5861e 87b237a8 00000000 87b237ac 87b23798 87b237b0 00000008 FOLLOWUP_IP: dxgkrnl+5861e 8d4af61e ?? ??? SYMBOL_NAME: dxgkrnl+5861e FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ac54de1 FAILURE_BUCKET_ID: 0x8E_VRF_dxgkrnl+5861e BUCKET_ID: 0x8E_VRF_dxgkrnl+5861e Followup: MachineOwner --------- 0: kd> lmtsmn start end module name 85239000 85281000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 8b62e000 8b688000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 8d441000 8d453000 amdk8 amdk8.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 8539d000 853a6000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 85371000 8537a000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8537a000 8539d000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 8dc0b000 8e1f3000 atikmdag atikmdag.sys Mon Dec 01 16:01:46 2008 (493450BA) 852e0000 852eb000 BATTC BATTC.SYS Mon Jul 13 19:19:15 2009 (4A5BC0F3) 855e5000 855ec000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 8b600000 8b60e000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8504f000 85057000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 85611000 85630000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 85099000 85144000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 857b6000 857db000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 85057000 85099000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 8d453000 8d456700 CmBatt CmBatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6) 85571000 855ce000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 852d8000 852e0000 compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6) 857db000 857e8000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 8b783000 8b7e7000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 8b7e7000 8b7ff000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 8b777000 8b783000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 85818000 85829000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 857f3000 857fc000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 857e8000 857f3000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 85600000 85611000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 8d457000 8d50e000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1) 8d50e000 8d547000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 853da000 853eb000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 853a6000 853da000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 855dc000 855e5000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 85784000 857b6000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55) 8d439000 8d441000 FwLnk FwLnk.sys Sun Nov 19 09:11:12 2006 (45606600) 85974000 859a5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 82a0b000 82a42000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 85810000 85818000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 80bb7000 80bbf000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 8555e000 85571000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 85732000 85757000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 85033000 8503e000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89) 8535b000 85371000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 85200000 85223000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E) 853f3000 853fe000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8528a000 85292000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 85533000 8555e000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F) 8b76d000 8b777000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 85800000 85810000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 8563d000 856f4000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 8b6f1000 8b6ff000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 8b688000 8b6ba000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 856f4000 85732000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 851e4000 851f2000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 8b763000 8b76d000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 82a42000 82e52000 nt ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF) 85404000 85533000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 85630000 85637000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10) 8b6c1000 8b6e0000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 852c7000 852d8000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 85292000 852bc000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 85346000 8534d000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 8534d000 8535b000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 855ce000 855dc000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 8503e000 8504f000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 8b722000 8b763000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 855f8000 85600000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 85230000 85238000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 853eb000 853f3000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 85757000 85784000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 859f2000 859fa000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) 8582b000 85974000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E) 85017000 85022000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 85000000 85017000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 8b712000 8b722000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 8d418000 8d439000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 859ed000 859f1100 TVALZ_O TVALZ_O.SYS Mon Jul 13 22:19:21 2009 (4A5BEB29) 852bc000 852c7000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 855ec000 855f8000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 851c3000 851e4000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 859a5000 859ad380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C) 852eb000 852fb000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 852fb000 85346000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 859ae000 859ed000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 8b6e0000 8b6f1000 vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3) 8b6ff000 8b712000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 85223000 85230000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 85144000 851b5000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 851b5000 851c3000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8b6ba000 8b6c1000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 85281000 8528a000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)This is a hardware or hardware related error. It could still be caused by drivers. Even though Driver Verifier was enabled, the dump does not point to a specific driver.STOP 0x0000008E: KERNEL_MODE_EXCEPTION_NOT_HANDLED
Usual causes: Insufficient disk space, Device driver, Video card, BIOS, Breakpoint in startup without having a debugger attached, Hardware incompatibility, Faulty system service, 3rd party remote control, Memory
So at this point, lets start testing hardware.
Download a copy of Memtest86+ - Advanced Memory Diagnostic Tool and burn the ISO to a CD using http://isorecorder.alexfeinman.com/W7. Boot from the CD, and leave it running for at least 7 passes. Let us know the results.
Now to your driver questions. I am assuming that you looked in the Control Panel for any program in the lists I gave you? Did you go to the manufacturers' websites and try to update any of them?
You can try renaming them. If you do this, the software and/or hardware associated with these drivers will not work. Only do this with the drivers in red font for now.
To rename them, first create a system restore point. Then using Windows Explorer, navigate to c:\Windows\System32\Drivers and look for the specific driver. Right click on the driver and select Rename. Change the extension from sys to bak leaving the rest of the name intact. This makes it easy to re-enable them.
By the way, it would help us if you would please use this procedure for uploading Dump files. We prefer that you not use rar. https://www.sevenforums.com/tutorials...en-forums.html
Please feel free to post any questions and ask for any help you need.
Actually, if you look closely, it most certainly does - it doesn't name the driver, but we can easily infer which is a problem. The raw stack shows a call to IoGetDeviceProperty after going through the directx kernel, and this would indicate a call to the video driver to get hardware info from the card (and watchdog is there because it watches for timeouts and crashes the box if these occur). That would indicate either the video driver is bad, or the hardware device it was talking to is.
Do you have another video card you can test with?
I suspect your ATI drivers are the cause. They are way outdated:Please install the latest drivers from here: Global Provider of Innovative Graphics, Processors and Media Solutions | AMDCode:Timestamp: Mon Dec 01 16:01:46 2008 (493450BA)
I tried that already from Carl's previous post and I ended up going here: 737-28041SupportforATIMobility
I then went to Toshiba Support and tried to find the required driver but it wasn't there (so no can-do).
Carl - Thanks again for the help, I'll post my results tomorrow seeing as I don't have enough time to do the 7 passes today.