New
#1
BSOD Getting worse over months
I have been getting the BSOD almost every time i use my laptop. Been getting worse over the last few months. Any help would be appreciated!!
I have zipped and attached the dump files..
I have been getting the BSOD almost every time i use my laptop. Been getting worse over the last few months. Any help would be appreciated!!
I have zipped and attached the dump files..
Hello and Welcome !
Seems like the Dumps are pointing to igdkmd64.sys i.e. Intel Graphics Kernel Mode Drive go to this website and download appropriate drivers including chip set drivers and install it http://downloadcenter.intel.com/Default.aspx.
Run a Hardware Diagnostic (Memory and Hard Drive) follow this link for instructions Hardware Diagnostic !! « Captain Debugger
Run SFC /SCANNOW Command - System File Checker
Update the Following Drivers:
Bugcheck:Code:SiSRaid2.sys Wed Sep 24 23:58:20 2008 nfrd960.sys Wed Jun 07 02:41:48 2006 mdmxsdk.sys Tue Jun 20 02:57:26 2006 lsi_fc.sys Wed Dec 10 04:16:09 2008 arc.sys Fri May 25 02:57:55 2007 adpu320.sys Wed Feb 28 05:34:15 2007 adpahci.sys Tue May 01 23:00:09 2007 adp94xx.sys Sat Dec 06 05:24:42 2008
Hope this helps,Code:INTERRUPT_EXCEPTION_NOT_HANDLED (3d) Arguments: Arg1: fffff80000b9c0c0 Arg2: 0000000000000000 Arg3: 0000000000000000 Arg4: fffff880044b8f59 Debugging Details: ------------------ CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3D PROCESS_NAME: System CURRENT_IRQL: 8 EXCEPTION_RECORD: fffff80000b9c858 -- (.exr 0xfffff80000b9c858) ExceptionAddress: fffff880044b8f59 (igdkmd64+0x00000000000b3f59) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff80000b9c900 -- (.trap 0xfffff80000b9c900) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00b9cb70fffffa80 rbx=0000000000000000 rcx=0000000000000002 rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000 rip=fffff880044b8f59 rsp=fffff80000b9ca90 rbp=fffff80000b9cc30 r8=0000000000000000 r9=0000000000000000 r10=fffffa8006530bd0 r11=fffff80000b9c7e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc igdkmd64+0xb3f59: fffff880`044b8f59 8b4008 mov eax,dword ptr [rax+8] ds:00b9cb70`fffffa88=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002cceca9 to fffff80002ccf740 STACK_TEXT: fffff800`00b9b808 fffff800`02cceca9 : 00000000`0000003d fffff800`00b9c0c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx fffff800`00b9b810 fffff800`02ccafe9 : fffffa80`03d4bc30 fffff880`052df07c fffff800`00b9c0c0 fffff800`02cfc668 : nt!KiBugCheckDispatch+0x69 fffff800`00b9b950 fffff800`02cf540d : fffff880`04dbdf28 fffff880`04c9570c fffff880`04405000 fffff800`00b9c858 : nt!KiInterruptHandler+0x29 fffff800`00b9b980 fffff800`02cfca90 : fffff800`02e1e91c fffff800`00b9b9f8 fffff800`00b9c858 fffff800`02c5f000 : nt!RtlpExecuteHandlerForException+0xd fffff800`00b9b9b0 fffff800`02d099ef : fffff800`00b9c858 fffff800`00b9c0c0 fffff800`00000000 fffff800`00b9cadc : nt!RtlDispatchException+0x410 fffff800`00b9c090 fffff800`02cced82 : fffff800`00b9c858 fffff800`02e49e80 fffff800`00b9c900 fffff800`00b9cb68 : nt!KiDispatchException+0x16f fffff800`00b9c720 fffff800`02ccd68a : fffffa80`00000001 00000000`0012c5b3 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff800`00b9c900 fffff880`044b8f59 : fffffa80`051bb000 fffff800`00b9cb58 fffffa80`00000000 fffffa80`03cf5be0 : nt!KiGeneralProtectionFault+0x10a fffff800`00b9ca90 fffffa80`051bb000 : fffff800`00b9cb58 fffffa80`00000000 fffffa80`03cf5be0 fffff800`00000001 : igdkmd64+0xb3f59 fffff800`00b9ca98 fffff800`00b9cb58 : fffffa80`00000000 fffffa80`03cf5be0 fffff800`00000001 00000000`00000000 : 0xfffffa80`051bb000 fffff800`00b9caa0 fffffa80`00000000 : fffffa80`03cf5be0 fffff800`00000001 00000000`00000000 00000000`00000000 : 0xfffff800`00b9cb58 fffff800`00b9caa8 fffffa80`03cf5be0 : fffff800`00000001 00000000`00000000 00000000`00000000 00000000`00000002 : 0xfffffa80`00000000 fffff800`00b9cab0 fffff800`00000001 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : 0xfffffa80`03cf5be0 fffff800`00b9cab8 00000000`00000000 : 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`00000000 : 0xfffff800`00000001 STACK_COMMAND: kb FOLLOWUP_IP: igdkmd64+b3f59 fffff880`044b8f59 8b4008 mov eax,dword ptr [rax+8] SYMBOL_STACK_INDEX: 8 SYMBOL_NAME: igdkmd64+b3f59 FOLLOWUP_NAME: MachineOwner MODULE_NAME: igdkmd64 IMAGE_NAME: igdkmd64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4bcf417f FAILURE_BUCKET_ID: X64_0x3D_igdkmd64+b3f59 BUCKET_ID: X64_0x3D_igdkmd64+b3f59
Captain
Thanks Captain, I will definatly try all of this, and will respond with a outcome...
Captain, I have done all the recommended suggestions, updated drivers- i believe, ran sfc/scannow-ok, memtest86+ -ok, chkdsk-ok. No errors found. In the last 6 hours I have gotten aprox 10 BSOD. My system seems to be getting worse. I will attach the .dmp files for the last day to see if there is other conflicts, thanks and any help will be aprecciated.
Hello,
The dumps are poinitnig to NETw5s64.sys i.e. your WiFi Network card. Try to remove the Drivers completely and download a new version of website and install it.
Here is the link Software & Driver Downloads HP G60-120US Notebook PC - HP Customer Care (United States - English)
Bugcheck:
Hope this helps,Code:DRIVER_VERIFIER_DETECTED_VIOLATION (c4) A device driver attempting to corrupt the system has been caught. This is because the driver was specified in the registry as being suspect (by the administrator) and the kernel has enabled substantial checking of this driver. If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will be among the most commonly seen crashes. Arguments: Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by the operating system. The only supported way to extend a kernel mode stack is by using KeExpandKernelStackAndCallout. Arg2: 0000000000000002 Arg3: fffff80002e05c40 Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc4_91 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80002ce395d to fffff80002c7d740 STACK_TEXT: fffff800`04845e78 fffff800`02ce395d : 00000000`000000c4 00000000`00000091 00000000`00000002 fffff800`02e05c40 : nt!KeBugCheckEx fffff800`04845e80 fffff880`02075882 : fffff880`02075d80 fffff800`04845f90 00000000`00000002 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x1e30d fffff800`04845f60 fffff880`01f010eb : fffffa80`06910470 00000000`00000000 fffffa80`052861a0 fffffa80`052861a0 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff800`04845fd0 fffff880`01ecafc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff800`04846040 fffff880`01e4da24 : fffffa80`052861a0 00000000`00000002 00000000`00000001 fffffa80`071593c0 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff800`048464c0 fffff880`01e4d9e9 : 00000000`00000000 00000000`00000000 fffffa80`068fa810 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff800`04846500 fffff880`01e4d980 : fffff880`04db05c0 fffffa80`06896010 fffffa80`068fa810 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff800`04846540 fffff880`04d797ee : fffffa80`06896010 00000000`00000000 fffffa80`071593c0 fffff880`04db05c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff800`04846580 fffff880`01e4d9e9 : fffffa80`05efd100 00000000`00000000 00000000`00000001 fffffa80`04d7b9c0 : nwifi!Pt6Receive+0x296 fffff800`048465e0 fffff880`01e4d980 : 00000000`00000001 fffff880`035140bc fffffa80`05f01328 fffff880`0446ffc2 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff800`04846620 fffff880`035109c0 : fffff880`03517110 00000000`00000001 00000000`00000001 fffffa80`05f01d78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff800`04846660 fffff880`01e652b7 : fffffa80`052861a0 fffffa80`03f81030 fffffa80`03f81030 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158 fffff800`048466c0 fffff880`044665f3 : fffffa80`056ac010 00000000`00000001 fffffa80`03f81030 00000000`00000001 : ndis! ?? ::FNODOBFM::`string'+0xccef fffff800`04846710 fffffa80`056ac010 : 00000000`00000001 fffffa80`03f81030 00000000`00000001 fffffa80`00000001 : NETw5s64+0xc5f3 fffff800`04846718 00000000`00000001 : fffffa80`03f81030 00000000`00000001 fffffa80`00000001 fffffa80`03e5f340 : 0xfffffa80`056ac010 fffff800`04846720 fffffa80`03f81030 : 00000000`00000001 fffffa80`00000001 fffffa80`03e5f340 fffffa80`00000001 : 0x1 fffff800`04846728 00000000`00000001 : fffffa80`00000001 fffffa80`03e5f340 fffffa80`00000001 fffffa80`04d7b870 : 0xfffffa80`03f81030 fffff800`04846730 fffffa80`00000001 : fffffa80`03e5f340 fffffa80`00000001 fffffa80`04d7b870 fffffa80`03f81030 : 0x1 fffff800`04846738 fffffa80`03e5f340 : fffffa80`00000001 fffffa80`04d7b870 fffffa80`03f81030 00000000`00000000 : 0xfffffa80`00000001 fffff800`04846740 fffffa80`00000001 : fffffa80`04d7b870 fffffa80`03f81030 00000000`00000000 00000000`00000000 : 0xfffffa80`03e5f340 fffff800`04846748 fffffa80`04d7b870 : fffffa80`03f81030 00000000`00000000 00000000`00000000 fffff880`04642844 : 0xfffffa80`00000001 fffff800`04846750 fffffa80`03f81030 : 00000000`00000000 00000000`00000000 fffff880`04642844 00000000`00000000 : 0xfffffa80`04d7b870 fffff800`04846758 00000000`00000000 : 00000000`00000000 fffff880`04642844 00000000`00000000 fffffa80`03e5f340 : 0xfffffa80`03f81030 STACK_COMMAND: kb FOLLOWUP_IP: nwifi!Pt6Receive+296 fffff880`04d797ee 83a3e010000000 and dword ptr [rbx+10E0h],0 SYMBOL_STACK_INDEX: 8 SYMBOL_NAME: nwifi!Pt6Receive+296 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nwifi IMAGE_NAME: nwifi.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b FAILURE_BUCKET_ID: X64_0xc4_91_nwifi!Pt6Receive+296 BUCKET_ID: X64_0xc4_91_nwifi!Pt6Receive+296 Followup: MachineOwner --------- 0: kd> lmvm nwifi start end module name fffff880`04d70000 fffff880`04dc3000 nwifi (pdb symbols) c:\symcache\nwifi.pdb\019E6C79A43F4BF687EB4758B35DBD8E1\nwifi.pdb Loaded symbol image file: nwifi.sys Mapped memory image file: c:\symcache\nwifi.sys\4A5BCC3B53000\nwifi.sys Image path: \SystemRoot\system32\DRIVERS\nwifi.sys Image name: nwifi.sys Timestamp: Tue Jul 14 05:37:23 2009 (4A5BCC3B) CheckSum: 00057B55 ImageSize: 00053000 File version: 6.1.7600.16385 Product version: 6.1.7600.16385 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.6 Driver File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: NWiFi.SYS OriginalFilename: NWiFi.SYS ProductVersion: 6.1.7600.16385 FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255) FileDescription: NativeWiFi Miniport Driver LegalCopyright: © Microsoft Corporation. All rights reserved.
Captain