Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Windows 7 Random BSOD


24 Aug 2010   #1

MS Windows 7 Home Premium 64-bit
 
 
Windows 7 Random BSOD

Good morning guys you have help me out before lets see if you guys got any ideas
ok so i have i have a 64bit windows 7 system

Specs:
Asus p7p55d
Corsair xms3 4GB
ATI radeon 5570HD
Sata 250 WD hard drive
i7 930

i keep getting random crashes when trying to play games dose not matter what game im in i still crash. now it is very random some days ill go all day without a problem then other days it get the BSOD and i cant seem to get windows debug to work properly says my symbols pack is wrong but i have installed all the right packs and pathed to the right spot. i have attached the last couple of dump files

any ideas??

My System SpecsSystem Spec
.

24 Aug 2010   #2

Windows 7 Ultimate 32 bit
 
 

This will take few minutes to look at the dump files. I will be back shortly. Refresh your page in about ten minutes; I will edit this post.
My System SpecsSystem Spec
24 Aug 2010   #3

MS Windows 7 Home Premium 64-bit
 
 

hehe alright thanks for such a fast response

i really believe this problem to be a memory problem though...
My System SpecsSystem Spec
.


24 Aug 2010   #4

Windows 7 Ultimate 32 bit
 
 

I apologize for the delay. We lost our power (not unusual this time of year) and it was just restored. I will get back on your dumps now.

Your dumps indicate hardware/hardware related problems.
Quote:
STOP 0x0000001A: MEMORY_MANAGEMENT

Usual causes: Device driver, memory, kernel


STOP 0x0000007F: UNEXPECTED_KERNEL_MODE_TRAP

Usual causes: Memory corruption, Hardware (memory in particular), Installing a faulty or mismatched hardware (especially memory) or a failure after installing it, 3rd party firewall, Device drivers, SCSI/network/BIOS updates needed, Improperly seated cards, Incompatible storage devices, Overclocking, Virus scanner, Backup tool, Bad motherboard, Missing Service Pack

STOP 0x00000050: PAGE_FAULT_IN_NONPAGED_AREA

Usual causes: Defective hardware (particularly memory - but not just RAM), Faulty system service, Antivirus, Device driver, NTFS corruption, BIOS


STOP 0x0000004E: PFN_LIST_CORRUPT

Usual causes: Device driver, ?memory
Notice what each of these error codes has in common: memory and driver.

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\080310-15709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
Debug session time: Wed Aug  4 01:30:36.180 2010 (GMT-4)
System Uptime: 0 days 9:07:50.242
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {31, fffffa8005d8f150, fffff88007ff6000, fffff8a00233000c}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+6378 )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: fffffa8005d8f150
Arg3: fffff88007ff6000
Arg4: fffff8a00233000c

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_31

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  PerfTuneServic

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002df6b2d to fffff80002ac5600

STACK_TEXT:  
fffff880`07212848 fffff800`02df6b2d : 00000000`0000001a 00000000`00000031 fffffa80`05d8f150 fffff880`07ff6000 : nt!KeBugCheckEx
fffff880`07212850 fffff800`02dadf45 : fffff880`07ff6000 ffffffff`f8e40000 00000000`004a0000 fffffa80`015122a0 : nt! ?? ::NNGAKEGL::`string'+0x6378
fffff880`072128a0 fffff800`02d9b17c : fffffa80`00000000 fffffa80`05cda060 00000000`00000000 fffffa80`00000000 : nt!MiPerformFixups+0x65
fffff880`072128f0 fffff800`02ab6b4c : fffffa80`015122a0 fffffa80`05ce3d40 00000000`00000000 fffffa80`06acea00 : nt!MiRelocateImagePfn+0x114
fffff880`07212950 fffff800`02ab742b : fffffa80`05ce3c80 fffff880`07212a80 fffffa80`068ccec8 fffff800`02ddc7d7 : nt!MiWaitForInPageComplete+0x89c
fffff880`07212a30 fffff800`02ae079b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff800`00000000 : nt!MiIssueHardFault+0x28b
fffff880`07212ac0 fffff800`02ac36ee : 00000000`00000008 00000000`72cb0000 00000000`b2808e01 00000000`7efdb000 : nt!MmAccessFault+0x14bb
fffff880`07212c20 00000000`7314be2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0030f638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7314be2f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::NNGAKEGL::`string'+6378
fffff800`02df6b2d cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::NNGAKEGL::`string'+6378

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6378

BUCKET_ID:  X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6378

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\080810-14757-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a4c000 PsLoadedModuleList = 0xfffff800`02c89e50
Debug session time: Sun Aug  8 14:53:42.720 2010 (GMT-4)
System Uptime: 0 days 0:28:57.782
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff88005509cab}

*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption

Followup: memory_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff88005509cab

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002abbb69 to fffff80002abc600

STACK_TEXT:  
fffff800`00ba4d28 fffff800`02abbb69 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02aba032 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff880`05509cab : ffff1bf8`890fc085 ffff1bf3`e9e08b44 1c26850f`01487f83 84000180`04e8ffff : nt!KiDoubleFaultAbort+0xb2
fffff880`054d5a0d ffff1bf8`890fc085 : ffff1bf3`e9e08b44 1c26850f`01487f83 84000180`04e8ffff b8ffff1c`19850fc0 : HTTP!UlpSetUrlInfoSpecial+0xb
fffff880`054d5a15 ffff1bf3`e9e08b44 : 1c26850f`01487f83 84000180`04e8ffff b8ffff1c`19850fc0 ff1c12e9`c0000022 : 0xffff1bf8`890fc085
fffff880`054d5a1d 1c26850f`01487f83 : 84000180`04e8ffff b8ffff1c`19850fc0 ff1c12e9`c0000022 1bd4e941`24448aff : 0xffff1bf3`e9e08b44
fffff880`054d5a25 84000180`04e8ffff : b8ffff1c`19850fc0 ff1c12e9`c0000022 1bd4e941`24448aff 8affff1b`e1e9ffff : 0x1c26850f`01487f83
fffff880`054d5a2d b8ffff1c`19850fc0 : ff1c12e9`c0000022 1bd4e941`24448aff 8affff1b`e1e9ffff ed840fc0`84412444 : 0x84000180`04e8ffff
fffff880`054d5a35 ff1c12e9`c0000022 : 1bd4e941`24448aff 8affff1b`e1e9ffff ed840fc0`84412444 0f01fe80`41fffffd : 0xb8ffff1c`19850fc0
fffff880`054d5a3d 1bd4e941`24448aff : 8affff1b`e1e9ffff ed840fc0`84412444 0f01fe80`41fffffd 3abc41ff`ff1beb85 : 0xff1c12e9`c0000022
fffff880`054d5a45 8affff1b`e1e9ffff : ed840fc0`84412444 0f01fe80`41fffffd 3abc41ff`ff1beb85 ffff1be0`e9c00000 : 0x1bd4e941`24448aff
fffff880`054d5a4d ed840fc0`84412444 : 0f01fe80`41fffffd 3abc41ff`ff1beb85 ffff1be0`e9c00000 c418850f`6873394c : 0x8affff1b`e1e9ffff
fffff880`054d5a55 0f01fe80`41fffffd : 3abc41ff`ff1beb85 ffff1be0`e9c00000 c418850f`6873394c 66ffffc3`e9e9ffff : 0xed840fc0`84412444
fffff880`054d5a5d 3abc41ff`ff1beb85 : ffff1be0`e9c00000 c418850f`6873394c 66ffffc3`e9e9ffff c7fa8166`0190ea81 : 0xf01fe80`41fffffd
fffff880`054d5a65 ffff1be0`e9c00000 : c418850f`6873394c 66ffffc3`e9e9ffff c7fa8166`0190ea81 e9ffffc4`57860f00 : 0x3abc41ff`ff1beb85
fffff880`054d5a6d c418850f`6873394c : 66ffffc3`e9e9ffff c7fa8166`0190ea81 e9ffffc4`57860f00 90ea8166`ffffc6ea : 0xffff1be0`e9c00000
fffff880`054d5a75 66ffffc3`e9e9ffff : c7fa8166`0190ea81 e9ffffc4`57860f00 90ea8166`ffffc6ea 860f00c7`fa816601 : 0xc418850f`6873394c
fffff880`054d5a7d c7fa8166`0190ea81 : e9ffffc4`57860f00 90ea8166`ffffc6ea 860f00c7`fa816601 ffc43de9`ffffc6da : 0x66ffffc3`e9e9ffff
fffff880`054d5a85 e9ffffc4`57860f00 : 90ea8166`ffffc6ea 860f00c7`fa816601 ffc43de9`ffffc6da f9833774`01e983ff : 0xc7fa8166`0190ea81
fffff880`054d5a8d 90ea8166`ffffc6ea : 860f00c7`fa816601 ffc43de9`ffffc6da f9833774`01e983ff 00d02484`c7107401 : 0xe9ffffc4`57860f00
fffff880`054d5a95 860f00c7`fa816601 : ffc43de9`ffffc6da f9833774`01e983ff 00d02484`c7107401 b3e9c000`01840000 : 0x90ea8166`ffffc6ea
fffff880`054d5a9d ffc43de9`ffffc6da : f9833774`01e983ff 00d02484`c7107401 b3e9c000`01840000 021c86b7`0fffffc6 : 0x860f00c7`fa816601
fffff880`054d5aa5 f9833774`01e983ff : 00d02484`c7107401 b3e9c000`01840000 021c86b7`0fffffc6 00000081`888d0000 : 0xffc43de9`ffffc6da
fffff880`054d5aad 00d02484`c7107401 : b3e9c000`01840000 021c86b7`0fffffc6 00000081`888d0000 ffffc4ab`830fc83b : 0xf9833774`01e983ff
fffff880`054d5ab5 b3e9c000`01840000 : 021c86b7`0fffffc6 00000081`888d0000 ffffc4ab`830fc83b 000000d0`24ac8944 : 0xd02484`c7107401
fffff880`054d5abd 021c86b7`0fffffc6 : 00000081`888d0000 ffffc4ab`830fc83b 000000d0`24ac8944 86b70fff`ffc691e9 : 0xb3e9c000`01840000
fffff880`054d5ac5 00000081`888d0000 : ffffc4ab`830fc83b 000000d0`24ac8944 86b70fff`ffc691e9 00ab888d`0000021c : 0x21c86b7`0fffffc6
fffff880`054d5acd ffffc4ab`830fc83b : 000000d0`24ac8944 86b70fff`ffc691e9 00ab888d`0000021c c489830f`c83b0000 : 0x81`888d0000
fffff880`054d5ad5 000000d0`24ac8944 : 86b70fff`ffc691e9 00ab888d`0000021c c489830f`c83b0000 00d024ac`8944ffff : 0xffffc4ab`830fc83b
fffff880`054d5add 86b70fff`ffc691e9 : 00ab888d`0000021c c489830f`c83b0000 00d024ac`8944ffff 41ffffc6`6fe90000 : 0xd0`24ac8944
fffff880`054d5ae5 00ab888d`0000021c : c489830f`c83b0000 00d024ac`8944ffff 41ffffc6`6fe90000 45ffffc4`34e9c98b : 0x86b70fff`ffc691e9
fffff880`054d5aed c489830f`c83b0000 : 00d024ac`8944ffff 41ffffc6`6fe90000 45ffffc4`34e9c98b 0f000006`6124b438 : 0xab888d`0000021c
fffff880`054d5af5 00d024ac`8944ffff : 41ffffc6`6fe90000 45ffffc4`34e9c98b 0f000006`6124b438 b70f45ff`ffc43684 : 0xc489830f`c83b0000
fffff880`054d5afd 41ffffc6`6fe90000 : 45ffffc4`34e9c98b 0f000006`6124b438 b70f45ff`ffc43684 45660000`03d02484 : 0xd024ac`8944ffff
fffff880`054d5b05 45ffffc4`34e9c98b : 0f000006`6124b438 b70f45ff`ffc43684 45660000`03d02484 42c18b45`0d76c13b : 0x41ffffc6`6fe90000
fffff880`054d5b0d 0f000006`6124b438 : b70f45ff`ffc43684 45660000`03d02484 42c18b45`0d76c13b ffc41ae9`02094c8d : 0x45ffffc4`34e9c98b
fffff880`054d5b15 b70f45ff`ffc43684 : 45660000`03d02484 42c18b45`0d76c13b ffc41ae9`02094c8d 4c8d42c0`b70f45ff : 0xf000006`6124b438
fffff880`054d5b1d 45660000`03d02484 : 42c18b45`0d76c13b ffc41ae9`02094c8d 4c8d42c0`b70f45ff 45ffffc4`0ce90201 : 0xb70f45ff`ffc43684
fffff880`054d5b25 42c18b45`0d76c13b : ffc41ae9`02094c8d 4c8d42c0`b70f45ff 45ffffc4`0ce90201 0f000006`6c24b438 : 0x45660000`03d02484
fffff880`054d5b2d ffc41ae9`02094c8d : 4c8d42c0`b70f45ff 45ffffc4`0ce90201 0f000006`6c24b438 b70f45ff`ffc40884 : 0x42c18b45`0d76c13b
fffff880`054d5b35 4c8d42c0`b70f45ff : 45ffffc4`0ce90201 0f000006`6c24b438 b70f45ff`ffc40884 45660000`04802484 : 0xffc41ae9`02094c8d
fffff880`054d5b3d 45ffffc4`0ce90201 : 0f000006`6c24b438 b70f45ff`ffc40884 45660000`04802484 42c18b45`0d76c13b : 0x4c8d42c0`b70f45ff
fffff880`054d5b45 0f000006`6c24b438 : b70f45ff`ffc40884 45660000`04802484 42c18b45`0d76c13b ffc3ece9`02094c8d : 0x45ffffc4`0ce90201
fffff880`054d5b4d b70f45ff`ffc40884 : 45660000`04802484 42c18b45`0d76c13b ffc3ece9`02094c8d 4c8d42c0`b70f45ff : 0xf000006`6c24b438
fffff880`054d5b55 45660000`04802484 : 42c18b45`0d76c13b ffc3ece9`02094c8d 4c8d42c0`b70f45ff 45ffffc3`dee90201 : 0xb70f45ff`ffc40884
fffff880`054d5b5d 42c18b45`0d76c13b : ffc3ece9`02094c8d 4c8d42c0`b70f45ff 45ffffc3`dee90201 0f000006`6424b438 : 0x45660000`04802484
fffff880`054d5b65 ffc3ece9`02094c8d : 4c8d42c0`b70f45ff 45ffffc3`dee90201 0f000006`6424b438 b70f41ff`ffc3da84 : 0x42c18b45`0d76c13b
fffff880`054d5b6d 4c8d42c0`b70f45ff : 45ffffc3`dee90201 0f000006`6424b438 b70f41ff`ffc3da84 41660000`04002484 : 0xffc3ece9`02094c8d
fffff880`054d5b75 45ffffc3`dee90201 : 0f000006`6424b438 b70f41ff`ffc3da84 41660000`04002484 c8b70f44`0477c13b : 0x4c8d42c0`b70f45ff
fffff880`054d5b7d 0f000006`6424b438 : b70f41ff`ffc3da84 41660000`04002484 c8b70f44`0477c13b c3bde902`094c8d42 : 0x45ffffc3`dee90201
fffff880`054d5b85 b70f41ff`ffc3da84 : 41660000`04002484 c8b70f44`0477c13b c3bde902`094c8d42 0000d024`8c8bffff : 0xf000006`6424b438
fffff880`054d5b8d 41660000`04002484 : c8b70f44`0477c13b c3bde902`094c8d42 0000d024`8c8bffff ffc3bbe9`c58b4100 : 0xb70f41ff`ffc3da84
fffff880`054d5b95 c8b70f44`0477c13b : c3bde902`094c8d42 0000d024`8c8bffff ffc3bbe9`c58b4100 000000d0`2484c7ff : 0x41660000`04002484
fffff880`054d5b9d c3bde902`094c8d42 : 0000d024`8c8bffff ffc3bbe9`c58b4100 000000d0`2484c7ff ffc5ade9`c000009a : 0xc8b70f44`0477c13b
fffff880`054d5ba5 0000d024`8c8bffff : ffc3bbe9`c58b4100 000000d0`2484c7ff ffc5ade9`c000009a 90fffc64`f415ffff : 0xc3bde902`094c8d42
fffff880`054d5bad ffc3bbe9`c58b4100 : 000000d0`2484c7ff ffc5ade9`c000009a 90fffc64`f415ffff 01e983ff`ffc3f5e9 : 0xd024`8c8bffff
fffff880`054d5bb5 000000d0`2484c7ff : ffc5ade9`c000009a 90fffc64`f415ffff 01e983ff`ffc3f5e9 c7107401`f9834c74 : 0xffc3bbe9`c58b4100
fffff880`054d5bbd ffc5ade9`c000009a : 90fffc64`f415ffff 01e983ff`ffc3f5e9 c7107401`f9834c74 01840000`00d02484 : 0xd0`2484c7ff
fffff880`054d5bc5 90fffc64`f415ffff : 01e983ff`ffc3f5e9 c7107401`f9834c74 01840000`00d02484 48ffffc5`87e9c000 : 0xffc5ade9`c000009a
fffff880`054d5bcd 01e983ff`ffc3f5e9 : c7107401`f9834c74 01840000`00d02484 48ffffc5`87e9c000 b0c9e8cf`8b48d68b : 0x90fffc64`f415ffff
fffff880`054d5bd5 c7107401`f9834c74 : 01840000`00d02484 48ffffc5`87e9c000 b0c9e8cf`8b48d68b 84891578`c085fffb : 0x1e983ff`ffc3f5e9
fffff880`054d5bdd 01840000`00d02484 : 48ffffc5`87e9c000 b0c9e8cf`8b48d68b 84891578`c085fffb 39446600`0000d024 : 0xc7107401`f9834c74
fffff880`054d5be5 48ffffc5`87e9c000 : b0c9e8cf`8b48d68b 84891578`c085fffb 39446600`0000d024 f9850f00`0000b8b7 : 0x1840000`00d02484
fffff880`054d5bed b0c9e8cf`8b48d68b : 84891578`c085fffb 39446600`0000d024 f9850f00`0000b8b7 00000dbd`41ffffc3 : 0x48ffffc5`87e9c000
fffff880`054d5bf5 84891578`c085fffb : 39446600`0000d024 f9850f00`0000b8b7 00000dbd`41ffffc3 0000d024`ac8944c0 : 0xb0c9e8cf`8b48d68b
fffff880`054d5bfd 39446600`0000d024 : f9850f00`0000b8b7 00000dbd`41ffffc3 0000d024`ac8944c0 8b48ffff`c550e900 : 0x84891578`c085fffb
fffff880`054d5c05 f9850f00`0000b8b7 : 00000dbd`41ffffc3 0000d024`ac8944c0 8b48ffff`c550e900 fbadd2e8`cf8b48d6 : 0x39446600`0000d024
fffff880`054d5c0d 00000dbd`41ffffc3 : 0000d024`ac8944c0 8b48ffff`c550e900 fbadd2e8`cf8b48d6 24848915`78c085ff : 0xf9850f00`0000b8b7
fffff880`054d5c15 0000d024`ac8944c0 : 8b48ffff`c550e900 fbadd2e8`cf8b48d6 24848915`78c085ff b7394466`000000d0 : 0xdbd`41ffffc3
fffff880`054d5c1d 8b48ffff`c550e900 : fbadd2e8`cf8b48d6 24848915`78c085ff b7394466`000000d0 c3c2850f`000000b8 : 0xd024`ac8944c0
fffff880`054d5c25 fbadd2e8`cf8b48d6 : 24848915`78c085ff b7394466`000000d0 c3c2850f`000000b8 c000000d`bd41ffff : 0x8b48ffff`c550e900
fffff880`054d5c2d 24848915`78c085ff : b7394466`000000d0 c3c2850f`000000b8 c000000d`bd41ffff 000000d0`24ac8944 : 0xfbadd2e8`cf8b48d6
fffff880`054d5c35 b7394466`000000d0 : c3c2850f`000000b8 c000000d`bd41ffff 000000d0`24ac8944 d68b48ff`ffc519e9 : 0x24848915`78c085ff
fffff880`054d5c3d c3c2850f`000000b8 : c000000d`bd41ffff 000000d0`24ac8944 d68b48ff`ffc519e9 00019f4b`e8cf8b48 : 0xb7394466`000000d0
fffff880`054d5c45 c000000d`bd41ffff : 000000d0`24ac8944 d68b48ff`ffc519e9 00019f4b`e8cf8b48 15ffffff`c3e8e990 : 0xc3c2850f`000000b8


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !HTTP
255 errors : !HTTP (fffff88005509002-fffff88005509fba)
fffff88005509000  b9  c5 *b0  00  c0  ff  15  b5  36  f9 *66  41  f6  42  0a  05 ........6.fA.B..
fffff88005509010  74  06 *ea  8b  42  18  eb  1c  44  89 *ca  24  28  44  89  74 t...B...D..$(D.t
fffff88005509020  24  20 *83  33  c9  33  d2  45  8d  41 *fa  49  8b  ca  ff  15 $ .3.3.E.A.I....
fffff88005509030  1c  31 *7a  ff  48  89  84  24  80  00 *58  00  49  3b  c6  75 .1z.H..$..X.I;.u
...
fffff88005509080  64  36 *dd  ff  48  8b  4b  08  8a  41 *1e  02  41  20  a8  03 d6..H.K..A..A ..
fffff88005509090  74  0b *0a  c5  02  00  c0  ff  15  23 *40  f9  ff  f6  41  0a t........#@...A.
fffff880055090a0  05  74 *f5  48  8b  41  18  eb  19  44 *5a  74  24  28  44  89 .t.H.A...DZt$(D.
fffff880055090b0  74  24 *33  45  33  c9  33  d2  45  8d *b9  01  ff  15  8e  30 t$3E3.3.E......0
...
fffff88005509100  39  57 *6f  72  70  48  8b  cb  ff  15 *7b  35  f9  ff  48  8b 9WorpH....{5..H.
fffff88005509110  4b  08 *46  41  2c  02  41  20  a8  03 *b1  0b  b9  c5  02  00 K.FA,.A ........
fffff88005509120  c0  ff *d5  99  35  f9  ff  f6  41  0a *97  74  06  48  8b  41 ....5...A..t.H.A
fffff88005509130  18  eb *91  44  89  74  24  28  44  89 *d4  24  20  45  33  c9 ...D.t$(D..$ E3.
...
fffff88005509180  3c  35 *15  ff  4c  39  73  08  0f  84 *4c  00  00  00  39  57 <5..L9s...L...9W
fffff88005509190  08  0f *ec  9f  00  00  00  48  8b  cb *07  15  48  35  f9  ff .......H....H5..
fffff880055091a0  48  8b *f2  08  8a  41  2c  02  41  20 *a6  03  74  0b  b9  c5 H....A,.A ..t...
fffff880055091b0  02  00 *1a  ff  15  07  35  f9  ff  f6 *2a  0a  05  74  06  48 ......5...*..t.H
...
fffff88005509200  00  00 *65  8d  8c  24  88  00  00  00 *62  89  4c  24  20  4c ..e..$....b.L$ L
fffff88005509210  8b  c0 *38  8b  55  00  49  8b  cc  e8 *4f  f8  ff  ff  8b  f8 ..8.U.I...O.....
fffff88005509220  89  44 *6f  30  41  3b  c6  7c  0b  8b *f5  24  88  00  00  00 .Do0A;.|...$....
fffff88005509230  48  89 *f8  38  eb  4a  48  89  53  38 *d5  05  00  00  80  ff H..8.JH.S8......
...
fffff88005509280  81  ff *30  01  00  00  74  0e  89  7b *80  33  d2  48  8b  cb ..0...t..{.3.H..
fffff88005509290  ff  15 *6a  34  f9  ff  8b  c7  48  83 *81  40  41  5e  41  5d ..j4....H..@A^A]
fffff880055092a0  41  5c *4b  5b  c3  90  90  90  90  90 *8c  90  90  90  90  90 A\K[............
fffff880055092b0  48  89 *75  24  10  48  89  4c  24  08 *6c  57  41  54  48  83 H.u$.H.L$.lWATH.
...
fffff88005509300  0b  b9 *de  00  00  c0  ff  15  b4  33 *81  ff  4c  8b  61  18 .........3..L.a.
fffff88005509310  4d  85 *af  75  0b  b9  0d  00  00  c0 *4d  15  a0  33  f9  ff M..u......M..3..
fffff88005509320  49  8b *b0  24  08  33  d2  44  8d  42 *24  49  8b  cc  e8  2d I..$.3.D.B$I...-
fffff88005509330  69  f6 *01  4c  8d  44  24  60  48  8b *0f  48  8b  ce  e8  9d i..L.D$`H..H....
...
fffff88005509380  75  0d *ed  fb  05  00  00  80  74  05 *7b  0d  00  00  c0  89 u.......t.{.....
fffff88005509390  5c  24 *2e  48  8b  7c  24  50  81  fb *76  01  00  00  74  0e \$.H.|$P..v...t.
fffff880055093a0  89  5f *5a  33  d2  48  8b  cf  ff  15 *b0  33  f9  ff  8b  c3 ._Z3.H.....3....
fffff880055093b0  48  8b *e3  24  58  48  83  c4  30  41 *b3  5f  5e  c3  90  90 H..$XH..0A._^...
...
fffff88005509400  01  00 *f0  3b  15  3b  d6  fa  ff  0f *32  2c  01  00  00  44 ...;.;....2,...D
fffff88005509410  38  25 *61  c2  fa  ff  74  63  ff  15 *15  33  f9  ff  f0  48 8%a...tc...3...H
fffff88005509420  0f  ba *24  20  31  fa  ff  00  73  0d *09  8d  0d  17  31  fa ..$ 1...s.....1.
fffff88005509430  ff  ff *18  09  33  f9  ff  48  8d  0d *1a  31  fa  ff  4c  8b ....3..H...1..L.
...
fffff88005509480  ff  33 *e4  44  8d  68  11  f0  4c  0f *23  2d  b8  30  fa  ff .3.D.h..L.#-.0..
fffff88005509490  74  0d *52  8d  0d  af  30  fa  ff  ff *91  b9  32  f9  ff  48 t.R...0.....2..H
fffff880055094a0  8d  0d *90  30  fa  ff  4c  8b  c5  8b *7a  e8  70  3b  fe  ff ...0..L...z.p;..
fffff880055094b0  8b  f0 *9a  8b  c5  f0  4c  0f  b1  25 *f4  30  fa  ff  74  0d ......L..%.0..t.
...
fffff88005509500  ff  4c *db  c5  8b  d7  e8  05  f1  ff *da  48  83  ca  ff  8b .L.........H....
fffff88005509510  f0  f0 *6f  0f  c1  15  2e  30  fa  ff *d9  c2  02  74  12  f6 ..o....0.....t..
fffff88005509520  c2  04 *a5  0d  48  8d  0d  1d  30  fa *a6  ff  15  07  32  f9 ....H...0.....2.
fffff88005509530  ff  ff *fc  11  32  f9  ff  8b  c6  eb *92  b8  0d  00  00  c0 ....2...........
...
fffff88005509580  54  48 *64  ec  e0  04  00  00  48  8b *94  71  fb  f9  ff  48 THd.....H..q...H
fffff88005509590  33  c4 *e6  89  84  24  d0  04  00  00 *c2  ff  48  8b  d9  8d 3....$......H...
fffff880055095a0  47  01 *c2  bc  24  90  00  00  00  89 *8b  24  98  00  00  00 G...$......$....
fffff880055095b0  89  84 *bd  94  00  00  00  e8  74  c1 *18  ff  40  3a  c7  75 ........t...@:.u
...
fffff88005509600  31  fa *bd  ff  15  4f  31  f9  ff  f6 *1f  70  31  fa  ff  08 1....O1....p1...
fffff88005509610  41  bc *69  00  00  00  75  64  ff  15 *a5  31  f9  ff  f0  48 A.i...ud...1...H
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\081510-16161-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
Debug session time: Sun Aug 15 13:56:39.102 2010 (GMT-4)
System Uptime: 0 days 0:38:46.424
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a00cb2bea4, 0, fffff88004820cf7, 2}


Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a00cb2bea4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004820cf7, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ea80e0
 fffff8a00cb2bea4 

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
fffff880`04820cf7 0fba63540d      bt      dword ptr [rbx+54h],0Dh

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880059b7750 -- (.trap 0xfffff880059b7750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00c003c20 rbx=0000000000000000 rcx=fffffa8005bb4000
rdx=fffffa800457d930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004820cf7 rsp=fffff880059b78e0 rbp=fffffa800528f488
 r8=fffffa8004e97601  r9=0000000000000000 r10=0000000000000000
r11=00000000000000e2 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x2b:
fffff880`04820cf7 0fba63540d      bt      dword ptr [rbx+54h],0Dh ds:3770:00000000`00000054=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cef8f2 to fffff80002c70740

STACK_TEXT:  
fffff880`059b75e8 fffff800`02cef8f2 : 00000000`00000050 fffff8a0`0cb2bea4 00000000`00000000 fffff880`059b7750 : nt!KeBugCheckEx
fffff880`059b75f0 fffff800`02c6e82e : 00000000`00000000 fffff8a0`0cb2be50 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`059b7750 fffff880`04820cf7 : 00000000`ffffd978 00000000`0000000f fffffa80`05bac000 fffffa80`05bad0d0 : nt!KiPageFault+0x16e
fffff880`059b78e0 fffff880`0481ded3 : 00000000`00000000 fffffa80`051dd180 00000000`000000b2 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x2b
fffff880`059b7910 fffff880`0483865d : 00000000`00000000 fffff8a0`07ff1270 fffffa80`00000000 fffffa80`04e97690 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
fffff880`059b7ae0 fffff880`04838398 : fffff880`009ef040 fffff880`04837d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`059b7cd0 fffff880`04837e96 : 00000000`00000000 fffffa80`0458e0a0 00000000`00000080 fffffa80`05b94010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`059b7d00 fffff800`02f14c06 : 00000000`02041b46 fffffa80`05bb3770 fffffa80`03c71b30 fffffa80`05bb3770 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`059b7d40 fffff800`02c4ec26 : fffff880`009ea180 fffffa80`05bb3770 fffff880`009f50c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`059b7d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
fffff880`04820cf7 0fba63540d      bt      dword ptr [rbx+54h],0Dh

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b

BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\082310-14398-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02e9ae50
Debug session time: Tue Aug 24 00:47:25.277 2010 (GMT-4)
System Uptime: 0 days 2:35:04.323
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {2, 3c9f3, 13ffff, 1}

Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8e )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 000000000003c9f3, entry in list being removed
Arg3: 000000000013ffff, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  SearchProtocol

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002cee6be to fffff80002ccd740

STACK_TEXT:  
fffff880`08c86e98 fffff800`02cee6be : 00000000`0000004e 00000000`00000002 00000000`0003c9f3 00000000`0013ffff : nt!KeBugCheckEx
fffff880`08c86ea0 fffff800`02cbbba1 : fffffa80`04d35b10 fffffa80`00000000 00000000`00000000 fffff8a0`03094838 : nt!MiUnlinkPageFromLockedList+0x8e
fffff880`08c86f30 fffff800`02cb9954 : fffff8a0`03094010 fffff8a0`03094838 fffffa80`04d35b90 fffffa80`04d35b90 : nt!MiFlushSectionInternal+0xc78
fffff880`08c87170 fffff800`02cb042c : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x1f4
fffff880`08c87230 fffff800`02fc879a : 00000000`00000000 00000000`00000006 00000000`01000000 00000000`00000000 : nt!MiFlushDataSection+0x190
fffff880`08c872a0 fffff800`02fbe013 : fffff880`08c87500 00000000`00000000 fffff880`08c875a8 fffff880`08c874f8 : nt!MmCreateSection+0x2ce
fffff880`08c874b0 fffff800`031296b5 : fffff8a0`0a34fd30 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
fffff880`08c87530 fffff800`03129a67 : 00000000`00000010 fffff8a0`0a1c2ad0 fffff880`08c876c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
fffff880`08c87620 fffff800`03129e97 : fffff880`08c87740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
fffff880`08c87710 fffff800`0312a2bf : 00000001`d42d60d5 fffffa80`06348520 fffff8a0`042a5000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187
fffff880`08c87980 fffff800`02f226df : 00000000`00000000 00000000`0cb8cade fffffa80`03e26aa0 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
fffff880`08c87a50 fffff800`02f9b2fc : fffffa80`05239550 fffffa80`03e26aa0 00000000`14050800 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x50100
fffff880`08c87a80 fffff800`02cabd55 : fffff880`009b1180 00000000`00000000 fffff800`02f9b200 fffffa80`05239550 : nt!PspUserThreadStartup+0xfc
fffff880`08c87ae0 fffff800`02cabcd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`08c87c20 00000000`77423000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`000bff18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77423000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiUnlinkPageFromLockedList+8e
fffff800`02cee6be cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiUnlinkPageFromLockedList+8e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e

BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e

Followup: MachineOwner
---------
Memory corruption is blamed in three of the four dumps and DirectX is blames in one dump. Most likely DirectX is not the problem, but rather a video driver or card.

Here is a definite cause of BSOD's - ASACPI.sys Sun Mar 27 22:30:36 2005.
Quote:
The 2005 version of this driver is a known BSOD cause.
Please visit this link: ASUSTeK Computer Inc.-Support- download_item_mkt
Scroll down to the Utilities category, then scroll down to the "ATK0110 driver for WindowsXP/Vista/Windows 7 32&64-bit " (it's about the 8th item down).

Download and install it.

Go to C:\Windows\System32\drivers to check and make sure that the ASACPI.sys file is date stamped from 2009 or 2010 (NOT 2005).
Uninstall Avira. Avira is known to cause crashes on some Win 7 systems and you can see that one of the error codes mentions antivirus programs. Uese this tool to uninstall Avira > Info > Tool. Install Microsoft Security Essentials and make sure Windows Firewall is turned on. If you want to reinstall Avira after you get your system running smoothly, you can try it. But I do not recommend doing so.

You also have some other out of date drivers. Win 7 does not like older drivers. They can and do cause memory corruption and crashes. I can see that you have been updating drivers. Very good.
Quote:
intelsmb.sys Wed May 13 03:31:00 2009
IOCBIOS.SYS Thu Jul 09 13:47:22 2009
If you need help with the drivers, please post. Once you update these drivers, especially ASACPI.sys, uninstall Avira, install MSE, reboot and run your system. Hopefully, you will have fixed the problem. If not, we will test your RAM. If you get another BSOD after these changes, please post and upload your latest BSOD.
My System SpecsSystem Spec
24 Aug 2010   #5

MS Windows 7 Home Premium 64-bit
 
 

wow great stuff man! ok well let me just say this i had a asus Gforce 260 installed in it and i was still having the problems so i switched the graphics card out for an ati 5570HD and im still getting the problems i have updated many drivers with no change. i have also reformatted the computer multiple times. im really thinking its a memory problem thanks for all the help man much appreciated. i have been pulling my hair out over this problem ugh!
My System SpecsSystem Spec
24 Aug 2010   #6

Windows 7 Ultimate 32 bit
 
 

Thank you. That is what we are for. Refresh your page; I have completed the initial analysis.
My System SpecsSystem Spec
24 Aug 2010   #7

MS Windows 7 Home Premium 64-bit
 
 

ok so i uninstalled avira installed MSE my driver ASACPI.sys is from 2005 i updated this driver


how would i go about obtaining
intelsmb.sys
iocbios.sys


thank you!
My System SpecsSystem Spec
24 Aug 2010   #8

MS Windows 7 Home Premium 64-bit
 
 

i checked intel's website for the drivers i downloaded them but there even later versions then what i have installed on the computer...
My System SpecsSystem Spec
24 Aug 2010   #9

MS Windows 7 Home Premium 64-bit
 
 

Allright so i was playing MW2 when i got another BSOD so i dont think avira and or that asacpi.sys was our problem i have uploaded my new dump log thank you
My System SpecsSystem Spec
24 Aug 2010   #10

Windows 7 Professional x64
 
 

Please remove your Intel Tuning program.

If BSODs persist, enable verifier: Driver Verifier - Enable and Disable

Wait for a few crashes, then follow these directions: http://www.sevenforums.com/crashes-d...tructions.html

...Summary of the Dumps:
Code:

Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Debug session time: Tue Aug 24 14:49:43.350 2010 (UTC - 4:00)
System Uptime: 0 days 1:13:23.286
BugCheck 50, {fffff8802fe98560, 1, fffff880055420fb, 2}
Probably caused by : memory_corruption
BUGCHECK_STR:  0x50
PROCESS_NAME:  svchost.exe
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
My System SpecsSystem Spec
Reply

 Windows 7 Random BSOD




Thread Tools



Similar help and support threads for2: Windows 7 Random BSOD
Thread Forum
Solved Random BSOD Windows 7 x64 BSOD Help and Support
Solved Random BSOD on windows. BSOD Help and Support
random bsod on windows 7 - f4 03 BSOD Help and Support
Random BSOD - Windows 7 x64 BSOD Help and Support
Windows 7 Random BSOD BSOD Help and Support
Random Windows 7 BSOD BSOD Help and Support
Windows 7 64 Bit Random BSOD BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd

All times are GMT -5. The time now is 08:40 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33