Getting BSOD on HP Pavilion DV6 3180ea


  1. Posts : 6
    Windows 7 Home Premium 64bit
       #1

    Getting BSOD on HP Pavilion DV6 3180ea


    Hi, I am recently getting BSODs on my laptop. Here are the details as per instructions:


    Is Windows 7 . . .
    - x64
    - the original installed OS on the system - Yes
    - an OEM - Yes
    - What is the age of system (hardware)? - 3 Months
    - What is the age of OS installation (have you re-installed the OS?) -3 Months, no

    Please find attached the required dumps and reports.

    Any help is very much appreciated.

    Regards
      My Computer


  2. Posts : 1,039
    Windows 7 Ultimate x64 Service Pack 1 (Build 6.1.7601)
       #2

    Code:
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS:  fffffa7fffffffea 
    
    FAULTING_IP: 
    nt!MiMapPageInHyperSpaceWorker+1b
    fffff800`03102f0f 458a481a        mov     r9b,byte ptr [r8+1Ah]
    
    MM_INTERNAL_CODE:  7
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880097eb820 -- (.trap 0xfffff880097eb820)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000058000000000 rbx=0000000000000000 rcx=ffffffffffffffff
    rdx=fffff880097eba40 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003102f0f rsp=fffff880097eb9b8 rbp=0000058000000000
     r8=fffffa7fffffffd0  r9=0000000000000001 r10=0000000000000002
    r11=fffff880097eb990 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiMapPageInHyperSpaceWorker+0x1b:
    fffff800`03102f0f 458a481a        mov     r9b,byte ptr [r8+1Ah] ds:bc70:fffffa7f`ffffffea=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000314c849 to fffff800030cd740
    
    STACK_TEXT:  
    fffff880`097eb6b8 fffff800`0314c849 : 00000000`00000050 fffffa7f`ffffffea 00000000`00000000 fffff880`097eb820 : nt!KeBugCheckEx
    fffff880`097eb6c0 fffff800`030cb82e : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e0b
    fffff880`097eb820 fffff800`03102f0f : fffff800`0312e2f9 ffffffff`ffffffff 00000000`00068aaa fffffa80`03eec6d0 : nt!KiPageFault+0x16e
    fffff880`097eb9b8 fffff800`0312e2f9 : ffffffff`ffffffff 00000000`00068aaa fffffa80`03eec6d0 00000000`00000000 : nt!MiMapPageInHyperSpaceWorker+0x1b
    fffff880`097eb9c0 fffff800`0338b056 : fffff780`00000000 00000000`00000000 00000000`00000001 fffffa80`03c6db20 : nt! ?? ::FNODOBFM::`string'+0x171d6
    fffff880`097eba40 fffff800`0338ad27 : fffffa80`03eec6d0 00000000`00000008 fffffa80`00000000 fffffa80`00000002 : nt!MmDeleteProcessAddressSpace+0x42
    fffff880`097eba80 fffff800`030d28b4 : 00000000`00000000 fffffa80`03eec6d0 fffffa80`03eec6a0 fffff800`0345ae25 : nt!PspProcessDelete+0x177
    fffff880`097ebae0 fffff800`031d34b9 : fffffa80`03eec6d0 fffffa80`03da3000 fffffa80`03da3ea8 fffffa80`03da3ea0 : nt!ObfDereferenceObject+0xd4
    fffff880`097ebb40 fffff800`0351e6ae : 00000000`0000058c 00000000`00000000 fffffa80`03eec6d0 fffffa80`03da3ea8 : nt!MmFreeAccessPfnBuffer+0x29
    fffff880`097ebb70 fffff800`0353fcd0 : fffffa80`0a19b901 00000000`00000080 fffffa80`03c72890 fffff800`0325b568 : nt!PfpFlushBuffers+0x23e
    fffff880`097ebc10 fffff800`03371c06 : ffffffff`ff676980 fffffa80`0a19b960 fffff880`097ebdb0 fffffa80`0a19b960 : nt!PfTLoggingWorker+0xe0
    fffff880`097ebd40 fffff800`030abc26 : fffff880`034f7180 fffffa80`0a19b960 fffff880`035020c0 fffff880`016402b4 : nt!PspSystemThreadStartup+0x5a
    fffff880`097ebd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiMapPageInHyperSpaceWorker+1b
    fffff800`03102f0f 458a481a        mov     r9b,byte ptr [r8+1Ah]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiMapPageInHyperSpaceWorker+1b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x50_nt!MiMapPageInHyperSpaceWorker+1b
    
    BUCKET_ID:  X64_0x50_nt!MiMapPageInHyperSpaceWorker+1b
    
    Followup: MachineOwner
    ---------
    Start by running Memtest86.com - Memory Diagnostic this blue screen refers to a memery corruption, the other dump files point to system files within windows.

    Code:
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035050e0
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiFindNodeOrParent+0
    fffff800`0330f518 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  chrome.exe
    
    TRAP_FRAME:  fffff8800ba4b600 -- (.trap 0xfffff8800ba4b600)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000330f518 rsp=fffff8800ba4b798 rbp=0000000000000000
     r8=fffff8800ba4b7e0  r9=0000000000000000 r10=fffffa8003c9fbe0
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!MiFindNodeOrParent:
    fffff800`0330f518 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:25f0:00000000`00000028=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032ccca9 to fffff800032cd740
    
    STACK_TEXT:  
    fffff880`0ba4b4b8 fffff800`032ccca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0ba4b4c0 fffff800`032cb920 : fffffa80`04dcfde0 fffffa80`03c9fc28 fffff880`0ba4b6b0 fffff880`014f132e : nt!KiBugCheckDispatch+0x69
    fffff880`0ba4b600 fffff800`0330f518 : fffff800`033132d7 fffffa80`03ea25f0 fffffa80`06cf0180 fffff880`00000001 : nt!KiPageFault+0x260
    fffff880`0ba4b798 fffff800`033132d7 : fffffa80`03ea25f0 fffffa80`06cf0180 fffff880`00000001 fffff880`00000002 : nt!MiFindNodeOrParent
    fffff880`0ba4b7a0 fffff800`0331325d : 00000000`00000000 fffffa80`07c31ad0 fffff8a0`0315ac70 00000000`00000000 : nt!MiLocateAddressInTree+0x17
    fffff880`0ba4b7d0 fffff800`03313368 : 00000000`00000000 00000000`00000000 fffffa80`03c9fc98 fffffa80`03c9fc98 : nt!MiGetSharedProtosAtDpcLevel+0xbd
    fffff880`0ba4b820 fffff800`0326b1cb : fffff700`01080000 fffffa80`01472b20 fffff680`00374840 fffffa80`03e933f8 : nt!MiGetSharedProtos+0x18
    fffff880`0ba4b850 fffff800`0333c7ee : 00000000`00000a25 fffffa80`0a38b580 00000000`00000000 fffffa80`096e7060 : nt! ?? ::FNODOBFM::`string'+0x927b
    fffff880`0ba4b880 fffff800`032f3b83 : 22500000`6d0e6025 00000000`6d0e6121 fffffa80`04dcfde0 fffffa80`03ea6010 : nt! ?? ::FNODOBFM::`string'+0x29895
    fffff880`0ba4b910 fffff800`032e95be : 00000000`00000000 00000000`6e908038 fffff680`00374840 fffffa80`03e933f8 : nt!MiResolveProtoPteFault+0x1d3
    fffff880`0ba4b9b0 fffff800`032e7743 : 00000000`00000000 00000000`6e908038 00000000`0026f278 00000000`00000000 : nt!MiDispatchFault+0x1de
    fffff880`0ba4bac0 fffff800`032cb82e : 00000000`00000000 00000000`004f2528 00000000`7efdb001 fffffa80`c0000034 : nt!MmAccessFault+0x343
    fffff880`0ba4bc20 00000000`7766c819 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`0026f1ec 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7766c819
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiFindNodeOrParent+0
    fffff800`0330f518 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiFindNodeOrParent+0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0
    
    BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0
    
    Followup: MachineOwner
    ---------
    This one is pointing to "chrome.exe" fromt he results I have searched its a virus, so you should so a virus scan and see how you go.
      My Computer


  3. Posts : 28,845
    Win 8 Release candidate 8400
       #3

    hegde19 said:
    Hi, I am recently getting BSODs on my laptop. Here are the details as per instructions:


    Is Windows 7 . . .
    - x64
    - the original installed OS on the system - Yes
    - an OEM - Yes
    - What is the age of system (hardware)? - 3 Months
    - What is the age of OS installation (have you re-installed the OS?) -3 Months, no

    Please find attached the required dumps and reports.

    Any help is very much appreciated.

    Regards
    First I noticed that there are 5 files that have no reference in google or anywhere in English

    That is usually an indication of malware. These files include the following
    a8nv3z0r.SYS
    a6r5ih6x.SYS
    a78izq5d.SYS

    Please download and run malwarebytes in safe mode and let us know the results


    BTW you have a file sptd.sys that is a huge casue of BSOD's

    Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads

    You can use MagicDisc as an alternative.

    Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
      My Computer


  4. Posts : 6
    Windows 7 Home Premium 64bit
    Thread Starter
       #4

    Thank you very much for your responses guys.. Uninstalled stpd using method mentioned. Now running full scan with malwarebytes. I will do a memory test as well once the malware scan completes and post the result of both.

    I am planning to use the built in system heath checker to check the hardware (pre installed by HP)

    Thanks again..

    Regards
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 00:26.
Find Us