Windows 7 Random BSOD

Page 1 of 6 123 ... LastLast

  1. Posts : 33
    MS Windows 7 Home Premium 64-bit
       #1

    Windows 7 Random BSOD


    Good morning guys you have help me out before lets see if you guys got any ideas
    ok so i have i have a 64bit windows 7 system

    Specs:
    Asus p7p55d
    Corsair xms3 4GB
    ATI radeon 5570HD
    Sata 250 WD hard drive
    i7 930

    i keep getting random crashes when trying to play games dose not matter what game im in i still crash. now it is very random some days ill go all day without a problem then other days it get the BSOD and i cant seem to get windows debug to work properly says my symbols pack is wrong but i have installed all the right packs and pathed to the right spot. i have attached the last couple of dump files

    any ideas??
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    This will take few minutes to look at the dump files. I will be back shortly. Refresh your page in about ten minutes; I will edit this post.
      My Computer


  3. Posts : 33
    MS Windows 7 Home Premium 64-bit
    Thread Starter
       #3

    hehe alright thanks for such a fast response

    i really believe this problem to be a memory problem though...
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    I apologize for the delay. We lost our power (not unusual this time of year) and it was just restored. I will get back on your dumps now.

    Your dumps indicate hardware/hardware related problems.
    STOP 0x0000001A: MEMORY_MANAGEMENT

    Usual causes: Device driver, memory, kernel


    STOP 0x0000007F: UNEXPECTED_KERNEL_MODE_TRAP

    Usual causes: Memory corruption, Hardware (memory in particular), Installing a faulty or mismatched hardware (especially memory) or a failure after installing it, 3rd party firewall, Device drivers, SCSI/network/BIOS updates needed, Improperly seated cards, Incompatible storage devices, Overclocking, Virus scanner, Backup tool, Bad motherboard, Missing Service Pack

    STOP 0x00000050: PAGE_FAULT_IN_NONPAGED_AREA

    Usual causes: Defective hardware (particularly memory - but not just RAM), Faulty system service, Antivirus, Device driver, NTFS corruption, BIOS


    STOP 0x0000004E: PFN_LIST_CORRUPT

    Usual causes: Device driver, ?memory
    Notice what each of these error codes has in common: memory and driver.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\080310-15709-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
    Debug session time: Wed Aug  4 01:30:36.180 2010 (GMT-4)
    System Uptime: 0 days 9:07:50.242
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {31, fffffa8005d8f150, fffff88007ff6000, fffff8a00233000c}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+6378 )
    
    Followup: MachineOwner
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000031, The subtype of the bugcheck.
    Arg2: fffffa8005d8f150
    Arg3: fffff88007ff6000
    Arg4: fffff8a00233000c
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_31
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  PerfTuneServic
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002df6b2d to fffff80002ac5600
    
    STACK_TEXT:  
    fffff880`07212848 fffff800`02df6b2d : 00000000`0000001a 00000000`00000031 fffffa80`05d8f150 fffff880`07ff6000 : nt!KeBugCheckEx
    fffff880`07212850 fffff800`02dadf45 : fffff880`07ff6000 ffffffff`f8e40000 00000000`004a0000 fffffa80`015122a0 : nt! ?? ::NNGAKEGL::`string'+0x6378
    fffff880`072128a0 fffff800`02d9b17c : fffffa80`00000000 fffffa80`05cda060 00000000`00000000 fffffa80`00000000 : nt!MiPerformFixups+0x65
    fffff880`072128f0 fffff800`02ab6b4c : fffffa80`015122a0 fffffa80`05ce3d40 00000000`00000000 fffffa80`06acea00 : nt!MiRelocateImagePfn+0x114
    fffff880`07212950 fffff800`02ab742b : fffffa80`05ce3c80 fffff880`07212a80 fffffa80`068ccec8 fffff800`02ddc7d7 : nt!MiWaitForInPageComplete+0x89c
    fffff880`07212a30 fffff800`02ae079b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff800`00000000 : nt!MiIssueHardFault+0x28b
    fffff880`07212ac0 fffff800`02ac36ee : 00000000`00000008 00000000`72cb0000 00000000`b2808e01 00000000`7efdb000 : nt!MmAccessFault+0x14bb
    fffff880`07212c20 00000000`7314be2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`0030f638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7314be2f
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::NNGAKEGL::`string'+6378
    fffff800`02df6b2d cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+6378
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    FAILURE_BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6378
    
    BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6378
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\080810-14757-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a4c000 PsLoadedModuleList = 0xfffff800`02c89e50
    Debug session time: Sun Aug  8 14:53:42.720 2010 (GMT-4)
    System Uptime: 0 days 0:28:57.782
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff88005509cab}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff88005509cab
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002abbb69 to fffff80002abc600
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02abbb69 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02aba032 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff880`05509cab : ffff1bf8`890fc085 ffff1bf3`e9e08b44 1c26850f`01487f83 84000180`04e8ffff : nt!KiDoubleFaultAbort+0xb2
    fffff880`054d5a0d ffff1bf8`890fc085 : ffff1bf3`e9e08b44 1c26850f`01487f83 84000180`04e8ffff b8ffff1c`19850fc0 : HTTP!UlpSetUrlInfoSpecial+0xb
    fffff880`054d5a15 ffff1bf3`e9e08b44 : 1c26850f`01487f83 84000180`04e8ffff b8ffff1c`19850fc0 ff1c12e9`c0000022 : 0xffff1bf8`890fc085
    fffff880`054d5a1d 1c26850f`01487f83 : 84000180`04e8ffff b8ffff1c`19850fc0 ff1c12e9`c0000022 1bd4e941`24448aff : 0xffff1bf3`e9e08b44
    fffff880`054d5a25 84000180`04e8ffff : b8ffff1c`19850fc0 ff1c12e9`c0000022 1bd4e941`24448aff 8affff1b`e1e9ffff : 0x1c26850f`01487f83
    fffff880`054d5a2d b8ffff1c`19850fc0 : ff1c12e9`c0000022 1bd4e941`24448aff 8affff1b`e1e9ffff ed840fc0`84412444 : 0x84000180`04e8ffff
    fffff880`054d5a35 ff1c12e9`c0000022 : 1bd4e941`24448aff 8affff1b`e1e9ffff ed840fc0`84412444 0f01fe80`41fffffd : 0xb8ffff1c`19850fc0
    fffff880`054d5a3d 1bd4e941`24448aff : 8affff1b`e1e9ffff ed840fc0`84412444 0f01fe80`41fffffd 3abc41ff`ff1beb85 : 0xff1c12e9`c0000022
    fffff880`054d5a45 8affff1b`e1e9ffff : ed840fc0`84412444 0f01fe80`41fffffd 3abc41ff`ff1beb85 ffff1be0`e9c00000 : 0x1bd4e941`24448aff
    fffff880`054d5a4d ed840fc0`84412444 : 0f01fe80`41fffffd 3abc41ff`ff1beb85 ffff1be0`e9c00000 c418850f`6873394c : 0x8affff1b`e1e9ffff
    fffff880`054d5a55 0f01fe80`41fffffd : 3abc41ff`ff1beb85 ffff1be0`e9c00000 c418850f`6873394c 66ffffc3`e9e9ffff : 0xed840fc0`84412444
    fffff880`054d5a5d 3abc41ff`ff1beb85 : ffff1be0`e9c00000 c418850f`6873394c 66ffffc3`e9e9ffff c7fa8166`0190ea81 : 0xf01fe80`41fffffd
    fffff880`054d5a65 ffff1be0`e9c00000 : c418850f`6873394c 66ffffc3`e9e9ffff c7fa8166`0190ea81 e9ffffc4`57860f00 : 0x3abc41ff`ff1beb85
    fffff880`054d5a6d c418850f`6873394c : 66ffffc3`e9e9ffff c7fa8166`0190ea81 e9ffffc4`57860f00 90ea8166`ffffc6ea : 0xffff1be0`e9c00000
    fffff880`054d5a75 66ffffc3`e9e9ffff : c7fa8166`0190ea81 e9ffffc4`57860f00 90ea8166`ffffc6ea 860f00c7`fa816601 : 0xc418850f`6873394c
    fffff880`054d5a7d c7fa8166`0190ea81 : e9ffffc4`57860f00 90ea8166`ffffc6ea 860f00c7`fa816601 ffc43de9`ffffc6da : 0x66ffffc3`e9e9ffff
    fffff880`054d5a85 e9ffffc4`57860f00 : 90ea8166`ffffc6ea 860f00c7`fa816601 ffc43de9`ffffc6da f9833774`01e983ff : 0xc7fa8166`0190ea81
    fffff880`054d5a8d 90ea8166`ffffc6ea : 860f00c7`fa816601 ffc43de9`ffffc6da f9833774`01e983ff 00d02484`c7107401 : 0xe9ffffc4`57860f00
    fffff880`054d5a95 860f00c7`fa816601 : ffc43de9`ffffc6da f9833774`01e983ff 00d02484`c7107401 b3e9c000`01840000 : 0x90ea8166`ffffc6ea
    fffff880`054d5a9d ffc43de9`ffffc6da : f9833774`01e983ff 00d02484`c7107401 b3e9c000`01840000 021c86b7`0fffffc6 : 0x860f00c7`fa816601
    fffff880`054d5aa5 f9833774`01e983ff : 00d02484`c7107401 b3e9c000`01840000 021c86b7`0fffffc6 00000081`888d0000 : 0xffc43de9`ffffc6da
    fffff880`054d5aad 00d02484`c7107401 : b3e9c000`01840000 021c86b7`0fffffc6 00000081`888d0000 ffffc4ab`830fc83b : 0xf9833774`01e983ff
    fffff880`054d5ab5 b3e9c000`01840000 : 021c86b7`0fffffc6 00000081`888d0000 ffffc4ab`830fc83b 000000d0`24ac8944 : 0xd02484`c7107401
    fffff880`054d5abd 021c86b7`0fffffc6 : 00000081`888d0000 ffffc4ab`830fc83b 000000d0`24ac8944 86b70fff`ffc691e9 : 0xb3e9c000`01840000
    fffff880`054d5ac5 00000081`888d0000 : ffffc4ab`830fc83b 000000d0`24ac8944 86b70fff`ffc691e9 00ab888d`0000021c : 0x21c86b7`0fffffc6
    fffff880`054d5acd ffffc4ab`830fc83b : 000000d0`24ac8944 86b70fff`ffc691e9 00ab888d`0000021c c489830f`c83b0000 : 0x81`888d0000
    fffff880`054d5ad5 000000d0`24ac8944 : 86b70fff`ffc691e9 00ab888d`0000021c c489830f`c83b0000 00d024ac`8944ffff : 0xffffc4ab`830fc83b
    fffff880`054d5add 86b70fff`ffc691e9 : 00ab888d`0000021c c489830f`c83b0000 00d024ac`8944ffff 41ffffc6`6fe90000 : 0xd0`24ac8944
    fffff880`054d5ae5 00ab888d`0000021c : c489830f`c83b0000 00d024ac`8944ffff 41ffffc6`6fe90000 45ffffc4`34e9c98b : 0x86b70fff`ffc691e9
    fffff880`054d5aed c489830f`c83b0000 : 00d024ac`8944ffff 41ffffc6`6fe90000 45ffffc4`34e9c98b 0f000006`6124b438 : 0xab888d`0000021c
    fffff880`054d5af5 00d024ac`8944ffff : 41ffffc6`6fe90000 45ffffc4`34e9c98b 0f000006`6124b438 b70f45ff`ffc43684 : 0xc489830f`c83b0000
    fffff880`054d5afd 41ffffc6`6fe90000 : 45ffffc4`34e9c98b 0f000006`6124b438 b70f45ff`ffc43684 45660000`03d02484 : 0xd024ac`8944ffff
    fffff880`054d5b05 45ffffc4`34e9c98b : 0f000006`6124b438 b70f45ff`ffc43684 45660000`03d02484 42c18b45`0d76c13b : 0x41ffffc6`6fe90000
    fffff880`054d5b0d 0f000006`6124b438 : b70f45ff`ffc43684 45660000`03d02484 42c18b45`0d76c13b ffc41ae9`02094c8d : 0x45ffffc4`34e9c98b
    fffff880`054d5b15 b70f45ff`ffc43684 : 45660000`03d02484 42c18b45`0d76c13b ffc41ae9`02094c8d 4c8d42c0`b70f45ff : 0xf000006`6124b438
    fffff880`054d5b1d 45660000`03d02484 : 42c18b45`0d76c13b ffc41ae9`02094c8d 4c8d42c0`b70f45ff 45ffffc4`0ce90201 : 0xb70f45ff`ffc43684
    fffff880`054d5b25 42c18b45`0d76c13b : ffc41ae9`02094c8d 4c8d42c0`b70f45ff 45ffffc4`0ce90201 0f000006`6c24b438 : 0x45660000`03d02484
    fffff880`054d5b2d ffc41ae9`02094c8d : 4c8d42c0`b70f45ff 45ffffc4`0ce90201 0f000006`6c24b438 b70f45ff`ffc40884 : 0x42c18b45`0d76c13b
    fffff880`054d5b35 4c8d42c0`b70f45ff : 45ffffc4`0ce90201 0f000006`6c24b438 b70f45ff`ffc40884 45660000`04802484 : 0xffc41ae9`02094c8d
    fffff880`054d5b3d 45ffffc4`0ce90201 : 0f000006`6c24b438 b70f45ff`ffc40884 45660000`04802484 42c18b45`0d76c13b : 0x4c8d42c0`b70f45ff
    fffff880`054d5b45 0f000006`6c24b438 : b70f45ff`ffc40884 45660000`04802484 42c18b45`0d76c13b ffc3ece9`02094c8d : 0x45ffffc4`0ce90201
    fffff880`054d5b4d b70f45ff`ffc40884 : 45660000`04802484 42c18b45`0d76c13b ffc3ece9`02094c8d 4c8d42c0`b70f45ff : 0xf000006`6c24b438
    fffff880`054d5b55 45660000`04802484 : 42c18b45`0d76c13b ffc3ece9`02094c8d 4c8d42c0`b70f45ff 45ffffc3`dee90201 : 0xb70f45ff`ffc40884
    fffff880`054d5b5d 42c18b45`0d76c13b : ffc3ece9`02094c8d 4c8d42c0`b70f45ff 45ffffc3`dee90201 0f000006`6424b438 : 0x45660000`04802484
    fffff880`054d5b65 ffc3ece9`02094c8d : 4c8d42c0`b70f45ff 45ffffc3`dee90201 0f000006`6424b438 b70f41ff`ffc3da84 : 0x42c18b45`0d76c13b
    fffff880`054d5b6d 4c8d42c0`b70f45ff : 45ffffc3`dee90201 0f000006`6424b438 b70f41ff`ffc3da84 41660000`04002484 : 0xffc3ece9`02094c8d
    fffff880`054d5b75 45ffffc3`dee90201 : 0f000006`6424b438 b70f41ff`ffc3da84 41660000`04002484 c8b70f44`0477c13b : 0x4c8d42c0`b70f45ff
    fffff880`054d5b7d 0f000006`6424b438 : b70f41ff`ffc3da84 41660000`04002484 c8b70f44`0477c13b c3bde902`094c8d42 : 0x45ffffc3`dee90201
    fffff880`054d5b85 b70f41ff`ffc3da84 : 41660000`04002484 c8b70f44`0477c13b c3bde902`094c8d42 0000d024`8c8bffff : 0xf000006`6424b438
    fffff880`054d5b8d 41660000`04002484 : c8b70f44`0477c13b c3bde902`094c8d42 0000d024`8c8bffff ffc3bbe9`c58b4100 : 0xb70f41ff`ffc3da84
    fffff880`054d5b95 c8b70f44`0477c13b : c3bde902`094c8d42 0000d024`8c8bffff ffc3bbe9`c58b4100 000000d0`2484c7ff : 0x41660000`04002484
    fffff880`054d5b9d c3bde902`094c8d42 : 0000d024`8c8bffff ffc3bbe9`c58b4100 000000d0`2484c7ff ffc5ade9`c000009a : 0xc8b70f44`0477c13b
    fffff880`054d5ba5 0000d024`8c8bffff : ffc3bbe9`c58b4100 000000d0`2484c7ff ffc5ade9`c000009a 90fffc64`f415ffff : 0xc3bde902`094c8d42
    fffff880`054d5bad ffc3bbe9`c58b4100 : 000000d0`2484c7ff ffc5ade9`c000009a 90fffc64`f415ffff 01e983ff`ffc3f5e9 : 0xd024`8c8bffff
    fffff880`054d5bb5 000000d0`2484c7ff : ffc5ade9`c000009a 90fffc64`f415ffff 01e983ff`ffc3f5e9 c7107401`f9834c74 : 0xffc3bbe9`c58b4100
    fffff880`054d5bbd ffc5ade9`c000009a : 90fffc64`f415ffff 01e983ff`ffc3f5e9 c7107401`f9834c74 01840000`00d02484 : 0xd0`2484c7ff
    fffff880`054d5bc5 90fffc64`f415ffff : 01e983ff`ffc3f5e9 c7107401`f9834c74 01840000`00d02484 48ffffc5`87e9c000 : 0xffc5ade9`c000009a
    fffff880`054d5bcd 01e983ff`ffc3f5e9 : c7107401`f9834c74 01840000`00d02484 48ffffc5`87e9c000 b0c9e8cf`8b48d68b : 0x90fffc64`f415ffff
    fffff880`054d5bd5 c7107401`f9834c74 : 01840000`00d02484 48ffffc5`87e9c000 b0c9e8cf`8b48d68b 84891578`c085fffb : 0x1e983ff`ffc3f5e9
    fffff880`054d5bdd 01840000`00d02484 : 48ffffc5`87e9c000 b0c9e8cf`8b48d68b 84891578`c085fffb 39446600`0000d024 : 0xc7107401`f9834c74
    fffff880`054d5be5 48ffffc5`87e9c000 : b0c9e8cf`8b48d68b 84891578`c085fffb 39446600`0000d024 f9850f00`0000b8b7 : 0x1840000`00d02484
    fffff880`054d5bed b0c9e8cf`8b48d68b : 84891578`c085fffb 39446600`0000d024 f9850f00`0000b8b7 00000dbd`41ffffc3 : 0x48ffffc5`87e9c000
    fffff880`054d5bf5 84891578`c085fffb : 39446600`0000d024 f9850f00`0000b8b7 00000dbd`41ffffc3 0000d024`ac8944c0 : 0xb0c9e8cf`8b48d68b
    fffff880`054d5bfd 39446600`0000d024 : f9850f00`0000b8b7 00000dbd`41ffffc3 0000d024`ac8944c0 8b48ffff`c550e900 : 0x84891578`c085fffb
    fffff880`054d5c05 f9850f00`0000b8b7 : 00000dbd`41ffffc3 0000d024`ac8944c0 8b48ffff`c550e900 fbadd2e8`cf8b48d6 : 0x39446600`0000d024
    fffff880`054d5c0d 00000dbd`41ffffc3 : 0000d024`ac8944c0 8b48ffff`c550e900 fbadd2e8`cf8b48d6 24848915`78c085ff : 0xf9850f00`0000b8b7
    fffff880`054d5c15 0000d024`ac8944c0 : 8b48ffff`c550e900 fbadd2e8`cf8b48d6 24848915`78c085ff b7394466`000000d0 : 0xdbd`41ffffc3
    fffff880`054d5c1d 8b48ffff`c550e900 : fbadd2e8`cf8b48d6 24848915`78c085ff b7394466`000000d0 c3c2850f`000000b8 : 0xd024`ac8944c0
    fffff880`054d5c25 fbadd2e8`cf8b48d6 : 24848915`78c085ff b7394466`000000d0 c3c2850f`000000b8 c000000d`bd41ffff : 0x8b48ffff`c550e900
    fffff880`054d5c2d 24848915`78c085ff : b7394466`000000d0 c3c2850f`000000b8 c000000d`bd41ffff 000000d0`24ac8944 : 0xfbadd2e8`cf8b48d6
    fffff880`054d5c35 b7394466`000000d0 : c3c2850f`000000b8 c000000d`bd41ffff 000000d0`24ac8944 d68b48ff`ffc519e9 : 0x24848915`78c085ff
    fffff880`054d5c3d c3c2850f`000000b8 : c000000d`bd41ffff 000000d0`24ac8944 d68b48ff`ffc519e9 00019f4b`e8cf8b48 : 0xb7394466`000000d0
    fffff880`054d5c45 c000000d`bd41ffff : 000000d0`24ac8944 d68b48ff`ffc519e9 00019f4b`e8cf8b48 15ffffff`c3e8e990 : 0xc3c2850f`000000b8
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -db !HTTP
    255 errors : !HTTP (fffff88005509002-fffff88005509fba)
    fffff88005509000  b9  c5 *b0  00  c0  ff  15  b5  36  f9 *66  41  f6  42  0a  05 ........6.fA.B..
    fffff88005509010  74  06 *ea  8b  42  18  eb  1c  44  89 *ca  24  28  44  89  74 t...B...D..$(D.t
    fffff88005509020  24  20 *83  33  c9  33  d2  45  8d  41 *fa  49  8b  ca  ff  15 $ .3.3.E.A.I....
    fffff88005509030  1c  31 *7a  ff  48  89  84  24  80  00 *58  00  49  3b  c6  75 .1z.H..$..X.I;.u
    ...
    fffff88005509080  64  36 *dd  ff  48  8b  4b  08  8a  41 *1e  02  41  20  a8  03 d6..H.K..A..A ..
    fffff88005509090  74  0b *0a  c5  02  00  c0  ff  15  23 *40  f9  ff  f6  41  0a t........#@...A.
    fffff880055090a0  05  74 *f5  48  8b  41  18  eb  19  44 *5a  74  24  28  44  89 .t.H.A...DZt$(D.
    fffff880055090b0  74  24 *33  45  33  c9  33  d2  45  8d *b9  01  ff  15  8e  30 t$3E3.3.E......0
    ...
    fffff88005509100  39  57 *6f  72  70  48  8b  cb  ff  15 *7b  35  f9  ff  48  8b 9WorpH....{5..H.
    fffff88005509110  4b  08 *46  41  2c  02  41  20  a8  03 *b1  0b  b9  c5  02  00 K.FA,.A ........
    fffff88005509120  c0  ff *d5  99  35  f9  ff  f6  41  0a *97  74  06  48  8b  41 ....5...A..t.H.A
    fffff88005509130  18  eb *91  44  89  74  24  28  44  89 *d4  24  20  45  33  c9 ...D.t$(D..$ E3.
    ...
    fffff88005509180  3c  35 *15  ff  4c  39  73  08  0f  84 *4c  00  00  00  39  57 <5..L9s...L...9W
    fffff88005509190  08  0f *ec  9f  00  00  00  48  8b  cb *07  15  48  35  f9  ff .......H....H5..
    fffff880055091a0  48  8b *f2  08  8a  41  2c  02  41  20 *a6  03  74  0b  b9  c5 H....A,.A ..t...
    fffff880055091b0  02  00 *1a  ff  15  07  35  f9  ff  f6 *2a  0a  05  74  06  48 ......5...*..t.H
    ...
    fffff88005509200  00  00 *65  8d  8c  24  88  00  00  00 *62  89  4c  24  20  4c ..e..$....b.L$ L
    fffff88005509210  8b  c0 *38  8b  55  00  49  8b  cc  e8 *4f  f8  ff  ff  8b  f8 ..8.U.I...O.....
    fffff88005509220  89  44 *6f  30  41  3b  c6  7c  0b  8b *f5  24  88  00  00  00 .Do0A;.|...$....
    fffff88005509230  48  89 *f8  38  eb  4a  48  89  53  38 *d5  05  00  00  80  ff H..8.JH.S8......
    ...
    fffff88005509280  81  ff *30  01  00  00  74  0e  89  7b *80  33  d2  48  8b  cb ..0...t..{.3.H..
    fffff88005509290  ff  15 *6a  34  f9  ff  8b  c7  48  83 *81  40  41  5e  41  5d ..j4....H..@A^A]
    fffff880055092a0  41  5c *4b  5b  c3  90  90  90  90  90 *8c  90  90  90  90  90 A\K[............
    fffff880055092b0  48  89 *75  24  10  48  89  4c  24  08 *6c  57  41  54  48  83 H.u$.H.L$.lWATH.
    ...
    fffff88005509300  0b  b9 *de  00  00  c0  ff  15  b4  33 *81  ff  4c  8b  61  18 .........3..L.a.
    fffff88005509310  4d  85 *af  75  0b  b9  0d  00  00  c0 *4d  15  a0  33  f9  ff M..u......M..3..
    fffff88005509320  49  8b *b0  24  08  33  d2  44  8d  42 *24  49  8b  cc  e8  2d I..$.3.D.B$I...-
    fffff88005509330  69  f6 *01  4c  8d  44  24  60  48  8b *0f  48  8b  ce  e8  9d i..L.D$`H..H....
    ...
    fffff88005509380  75  0d *ed  fb  05  00  00  80  74  05 *7b  0d  00  00  c0  89 u.......t.{.....
    fffff88005509390  5c  24 *2e  48  8b  7c  24  50  81  fb *76  01  00  00  74  0e \$.H.|$P..v...t.
    fffff880055093a0  89  5f *5a  33  d2  48  8b  cf  ff  15 *b0  33  f9  ff  8b  c3 ._Z3.H.....3....
    fffff880055093b0  48  8b *e3  24  58  48  83  c4  30  41 *b3  5f  5e  c3  90  90 H..$XH..0A._^...
    ...
    fffff88005509400  01  00 *f0  3b  15  3b  d6  fa  ff  0f *32  2c  01  00  00  44 ...;.;....2,...D
    fffff88005509410  38  25 *61  c2  fa  ff  74  63  ff  15 *15  33  f9  ff  f0  48 8%a...tc...3...H
    fffff88005509420  0f  ba *24  20  31  fa  ff  00  73  0d *09  8d  0d  17  31  fa ..$ 1...s.....1.
    fffff88005509430  ff  ff *18  09  33  f9  ff  48  8d  0d *1a  31  fa  ff  4c  8b ....3..H...1..L.
    ...
    fffff88005509480  ff  33 *e4  44  8d  68  11  f0  4c  0f *23  2d  b8  30  fa  ff .3.D.h..L.#-.0..
    fffff88005509490  74  0d *52  8d  0d  af  30  fa  ff  ff *91  b9  32  f9  ff  48 t.R...0.....2..H
    fffff880055094a0  8d  0d *90  30  fa  ff  4c  8b  c5  8b *7a  e8  70  3b  fe  ff ...0..L...z.p;..
    fffff880055094b0  8b  f0 *9a  8b  c5  f0  4c  0f  b1  25 *f4  30  fa  ff  74  0d ......L..%.0..t.
    ...
    fffff88005509500  ff  4c *db  c5  8b  d7  e8  05  f1  ff *da  48  83  ca  ff  8b .L.........H....
    fffff88005509510  f0  f0 *6f  0f  c1  15  2e  30  fa  ff *d9  c2  02  74  12  f6 ..o....0.....t..
    fffff88005509520  c2  04 *a5  0d  48  8d  0d  1d  30  fa *a6  ff  15  07  32  f9 ....H...0.....2.
    fffff88005509530  ff  ff *fc  11  32  f9  ff  8b  c6  eb *92  b8  0d  00  00  c0 ....2...........
    ...
    fffff88005509580  54  48 *64  ec  e0  04  00  00  48  8b *94  71  fb  f9  ff  48 THd.....H..q...H
    fffff88005509590  33  c4 *e6  89  84  24  d0  04  00  00 *c2  ff  48  8b  d9  8d 3....$......H...
    fffff880055095a0  47  01 *c2  bc  24  90  00  00  00  89 *8b  24  98  00  00  00 G...$......$....
    fffff880055095b0  89  84 *bd  94  00  00  00  e8  74  c1 *18  ff  40  3a  c7  75 ........t...@:.u
    ...
    fffff88005509600  31  fa *bd  ff  15  4f  31  f9  ff  f6 *1f  70  31  fa  ff  08 1....O1....p1...
    fffff88005509610  41  bc *69  00  00  00  75  64  ff  15 *a5  31  f9  ff  f0  48 A.i...ud...1...H
    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  STRIDE
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE
    
    Followup: memory_corruption
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\081510-16161-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
    Debug session time: Sun Aug 15 13:56:39.102 2010 (GMT-4)
    System Uptime: 0 days 0:38:46.424
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8a00cb2bea4, 0, fffff88004820cf7, 2}
    
    
    Could not read faulting driver name
    Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a00cb2bea4, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff88004820cf7, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ea80e0
     fffff8a00cb2bea4 
    
    FAULTING_IP: 
    dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
    fffff880`04820cf7 0fba63540d      bt      dword ptr [rbx+54h],0Dh
    
    MM_INTERNAL_CODE:  2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880059b7750 -- (.trap 0xfffff880059b7750)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a00c003c20 rbx=0000000000000000 rcx=fffffa8005bb4000
    rdx=fffffa800457d930 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88004820cf7 rsp=fffff880059b78e0 rbp=fffffa800528f488
     r8=fffffa8004e97601  r9=0000000000000000 r10=0000000000000000
    r11=00000000000000e2 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x2b:
    fffff880`04820cf7 0fba63540d      bt      dword ptr [rbx+54h],0Dh ds:3770:00000000`00000054=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cef8f2 to fffff80002c70740
    
    STACK_TEXT:  
    fffff880`059b75e8 fffff800`02cef8f2 : 00000000`00000050 fffff8a0`0cb2bea4 00000000`00000000 fffff880`059b7750 : nt!KeBugCheckEx
    fffff880`059b75f0 fffff800`02c6e82e : 00000000`00000000 fffff8a0`0cb2be50 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ec0
    fffff880`059b7750 fffff880`04820cf7 : 00000000`ffffd978 00000000`0000000f fffffa80`05bac000 fffffa80`05bad0d0 : nt!KiPageFault+0x16e
    fffff880`059b78e0 fffff880`0481ded3 : 00000000`00000000 fffffa80`051dd180 00000000`000000b2 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x2b
    fffff880`059b7910 fffff880`0483865d : 00000000`00000000 fffff8a0`07ff1270 fffffa80`00000000 fffffa80`04e97690 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
    fffff880`059b7ae0 fffff880`04838398 : fffff880`009ef040 fffff880`04837d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
    fffff880`059b7cd0 fffff880`04837e96 : 00000000`00000000 fffffa80`0458e0a0 00000000`00000080 fffffa80`05b94010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
    fffff880`059b7d00 fffff800`02f14c06 : 00000000`02041b46 fffffa80`05bb3770 fffffa80`03c71b30 fffffa80`05bb3770 : dxgmms1!VidSchiWorkerThread+0xd6
    fffff880`059b7d40 fffff800`02c4ec26 : fffff880`009ea180 fffffa80`05bb3770 fffff880`009f50c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`059b7d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
    fffff880`04820cf7 0fba63540d      bt      dword ptr [rbx+54h],0Dh
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578
    
    FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
    
    BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\082310-14398-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02e9ae50
    Debug session time: Tue Aug 24 00:47:25.277 2010 (GMT-4)
    System Uptime: 0 days 2:35:04.323
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {2, 3c9f3, 13ffff, 1}
    
    Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8e )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000002, A list entry was corrupt
    Arg2: 000000000003c9f3, entry in list being removed
    Arg3: 000000000013ffff, highest physical page number
    Arg4: 0000000000000001, reference count of entry being removed
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  SearchProtocol
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002cee6be to fffff80002ccd740
    
    STACK_TEXT:  
    fffff880`08c86e98 fffff800`02cee6be : 00000000`0000004e 00000000`00000002 00000000`0003c9f3 00000000`0013ffff : nt!KeBugCheckEx
    fffff880`08c86ea0 fffff800`02cbbba1 : fffffa80`04d35b10 fffffa80`00000000 00000000`00000000 fffff8a0`03094838 : nt!MiUnlinkPageFromLockedList+0x8e
    fffff880`08c86f30 fffff800`02cb9954 : fffff8a0`03094010 fffff8a0`03094838 fffffa80`04d35b90 fffffa80`04d35b90 : nt!MiFlushSectionInternal+0xc78
    fffff880`08c87170 fffff800`02cb042c : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x1f4
    fffff880`08c87230 fffff800`02fc879a : 00000000`00000000 00000000`00000006 00000000`01000000 00000000`00000000 : nt!MiFlushDataSection+0x190
    fffff880`08c872a0 fffff800`02fbe013 : fffff880`08c87500 00000000`00000000 fffff880`08c875a8 fffff880`08c874f8 : nt!MmCreateSection+0x2ce
    fffff880`08c874b0 fffff800`031296b5 : fffff8a0`0a34fd30 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
    fffff880`08c87530 fffff800`03129a67 : 00000000`00000010 fffff8a0`0a1c2ad0 fffff880`08c876c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
    fffff880`08c87620 fffff800`03129e97 : fffff880`08c87740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
    fffff880`08c87710 fffff800`0312a2bf : 00000001`d42d60d5 fffffa80`06348520 fffff8a0`042a5000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187
    fffff880`08c87980 fffff800`02f226df : 00000000`00000000 00000000`0cb8cade fffffa80`03e26aa0 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
    fffff880`08c87a50 fffff800`02f9b2fc : fffffa80`05239550 fffffa80`03e26aa0 00000000`14050800 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x50100
    fffff880`08c87a80 fffff800`02cabd55 : fffff880`009b1180 00000000`00000000 fffff800`02f9b200 fffffa80`05239550 : nt!PspUserThreadStartup+0xfc
    fffff880`08c87ae0 fffff800`02cabcd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
    fffff880`08c87c20 00000000`77423000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
    00000000`000bff18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77423000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiUnlinkPageFromLockedList+8e
    fffff800`02cee6be cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiUnlinkPageFromLockedList+8e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
    
    BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
    
    Followup: MachineOwner
    ---------
    Memory corruption is blamed in three of the four dumps and DirectX is blames in one dump. Most likely DirectX is not the problem, but rather a video driver or card.

    Here is a definite cause of BSOD's - ASACPI.sys Sun Mar 27 22:30:36 2005.
    The 2005 version of this driver is a known BSOD cause.
    Please visit this link: ASUSTeK Computer Inc.-Support- download_item_mkt
    Scroll down to the Utilities category, then scroll down to the "ATK0110 driver for WindowsXP/Vista/Windows 7 32&64-bit " (it's about the 8th item down).

    Download and install it.

    Go to C:\Windows\System32\drivers to check and make sure that the ASACPI.sys file is date stamped from 2009 or 2010 (NOT 2005).
    Uninstall Avira. Avira is known to cause crashes on some Win 7 systems and you can see that one of the error codes mentions antivirus programs. Uese this tool to uninstall Avira > Info > Tool. Install Microsoft Security Essentials and make sure Windows Firewall is turned on. If you want to reinstall Avira after you get your system running smoothly, you can try it. But I do not recommend doing so.

    You also have some other out of date drivers. Win 7 does not like older drivers. They can and do cause memory corruption and crashes. I can see that you have been updating drivers. Very good.
    intelsmb.sys Wed May 13 03:31:00 2009
    IOCBIOS.SYS Thu Jul 09 13:47:22 2009
    If you need help with the drivers, please post. Once you update these drivers, especially ASACPI.sys, uninstall Avira, install MSE, reboot and run your system. Hopefully, you will have fixed the problem. If not, we will test your RAM. If you get another BSOD after these changes, please post and upload your latest BSOD.
    Last edited by CarlTR6; 24 Aug 2010 at 11:52.
      My Computer


  5. Posts : 33
    MS Windows 7 Home Premium 64-bit
    Thread Starter
       #5

    wow great stuff man! ok well let me just say this i had a asus Gforce 260 installed in it and i was still having the problems so i switched the graphics card out for an ati 5570HD and im still getting the problems i have updated many drivers with no change. i have also reformatted the computer multiple times. im really thinking its a memory problem thanks for all the help man much appreciated. i have been pulling my hair out over this problem ugh!
      My Computer


  6. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #6

    Thank you. That is what we are for. :) Refresh your page; I have completed the initial analysis.
      My Computer


  7. Posts : 33
    MS Windows 7 Home Premium 64-bit
    Thread Starter
       #7

    ok so i uninstalled avira installed MSE my driver ASACPI.sys is from 2005 i updated this driver


    how would i go about obtaining
    intelsmb.sys
    iocbios.sys


    thank you!
    Last edited by CyberArena; 24 Aug 2010 at 12:43.
      My Computer


  8. Posts : 33
    MS Windows 7 Home Premium 64-bit
    Thread Starter
       #8

    i checked intel's website for the drivers i downloaded them but there even later versions then what i have installed on the computer...
      My Computer


  9. Posts : 33
    MS Windows 7 Home Premium 64-bit
    Thread Starter
       #9

    Allright so i was playing MW2 when i got another BSOD so i dont think avira and or that asacpi.sys was our problem i have uploaded my new dump log thank you
      My Computer


  10. Posts : 13,354
    Windows 7 Professional x64
       #10

    Please remove your Intel Tuning program.

    If BSODs persist, enable verifier: Driver Verifier - Enable and Disable

    Wait for a few crashes, then follow these directions: https://www.sevenforums.com/crashes-d...tructions.html

    ...Summary of the Dumps:
    Code:
    
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Debug session time: Tue Aug 24 14:49:43.350 2010 (UTC - 4:00)
    System Uptime: 0 days 1:13:23.286
    BugCheck 50, {fffff8802fe98560, 1, fffff880055420fb, 2}
    Probably caused by : memory_corruption
    BUGCHECK_STR:  0x50
    PROCESS_NAME:  svchost.exe
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
    
      My Computer


 
Page 1 of 6 123 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd
All times are GMT -5. The time now is 16:39.
Find Us