Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD

19 Apr 2011   #1

Windows 7 - 64-bit
 
 
BSOD

Hi, I've been recently getting frequent BSOD, just wondering how to fix it.
Specs: x64
Windows 7 home premium (OEM)
It's a Dell Studio Xps running i5, which I bought in August 2010 from the dell website.
OS has NOT been reinstalled.

My System SpecsSystem Spec
.

19 Apr 2011   #2

Windows 7 Pro 64-bit
 
 

Quote   Quote: Originally Posted by bramoule View Post
Hi, I've been recently getting frequent BSOD, just wondering how to fix it.
Specs: x64
Windows 7 home premium (OEM)
It's a Dell Studio Xps running i5, which I bought in August 2010 from the dell website.
OS has NOT been reinstalled.
I will take it you know what this VxD loader is for and if you do then try the following to try and fix the problem.

Solution button: Update Driver

This code means VxD Loader (Vxdldr) returned an unknown result. For example, there could a version mismatch between the device driver and the operating system.

To resolve this issue, follow the recommended solution. If that does not work, try removing the device from Device Manager and then running the Add New Hardware Wizard in Control Panel.

Not sure if this will work or not. If you don't feel comfortable doing this on your own or at all, please contact Microsoft Support and they will walk you through it or may have another fix.


Although at the same time it may not be windows 7 compatible as I have gotten the BSOD because of a program that wasn't windows 7 compatible. I hope this help you out.


RitualJman
My System SpecsSystem Spec
19 Apr 2011   #3

Windows 7 Ultimate 32 bit
 
 

Hi, branmoule; welcome to the forum. I am sorry you hare having a problems. I looked at your five most recent dumps.. All of them either blame memory corruption or indicate memory errors.

To begin, I recommend that you update your OS and install Service Pack 1: http://windows.microsoft.com/en-US/w...ice-pack-1-sp1

Next please enable Driver Verifier carefully following the instructions in this tutorial:
Driver Verifier - Enable and Disable. Use your computer normally while Verifier is running. If Verifier encounters a faulty driver, it will trigger a BSOD. Upload any and all Verifier enabled BSOD's. Hopefully, the dumps will point to the driver(s) causing the conflict.

Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03064000 PsLoadedModuleList = 0xfffff800`032a1e50
Debug session time: Wed Apr 13 23:45:49.025 2011 (GMT-4)
System Uptime: 0 days 12:31:07.492
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {403, fffff6800002d138, f2a000004fed8025, fffff6fc50078b18}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+31ef2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800002d138
Arg3: f2a000004fed8025
Arg4: fffff6fc50078b18

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_403

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800031466c8 to fffff800030d4740

STACK_TEXT:  
fffff880`0512a678 fffff800`031466c8 : 00000000`0000001a 00000000`00000403 fffff680`0002d138 f2a00000`4fed8025 : nt!KeBugCheckEx
fffff880`0512a680 fffff800`03105381 : 00000000`00000000 fffff680`0002dde8 fffffa80`068f8060 cf100000`422c4025 : nt! ?? ::FNODOBFM::`string'+0x31ef2
fffff880`0512a830 fffff800`03107df9 : 00000000`00000000 00000000`05bbdfff fffff880`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x408
fffff880`0512a9f0 fffff800`033eb010 : fffffa80`0675a460 0007ffff`00000000 fffffa80`04fd45e0 fffffa80`04fd45e0 : nt!MiRemoveMappedView+0xd9
fffff880`0512ab10 fffff800`033eb41b : 00000000`00000000 00000000`05820000 fffffa80`00000001 fffff800`03025801 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0512abd0 fffff800`030d3993 : 00000000`00000000 00000000`00005432 fffffa80`068f8060 00000000`e5e4fed2 : nt!NtUnmapViewOfSection+0x5f
fffff880`0512ac20 00000000`7763f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04add7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7763f95a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+31ef2
fffff800`031466c8 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+31ef2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2

BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2

Followup: MachineOwner
---------

Debug session time: Sat Apr 16 10:21:44.043 2011 (GMT-4)
System Uptime: 0 days 21:56:16.230
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41289, 7fefb27d001, 1343, 134400002684}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a49 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 000007fefb27d001
Arg3: 0000000000001343
Arg4: 0000134400002684

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41289

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80003123379 to fffff800030ce740

STACK_TEXT:  
fffff880`02ffe7e8 fffff800`03123379 : 00000000`0000001a 00000000`00041289 000007fe`fb27d001 00000000`00001343 : nt!KeBugCheckEx
fffff880`02ffe7f0 fffff800`03141cc3 : fffffa80`034b2250 b4300001`190b7005 ba200001`191b6005 b9c00000`90913025 : nt! ?? ::FNODOBFM::`string'+0x4a49
fffff880`02ffe830 fffff800`03101df9 : 00000000`00000000 000007fe`fb286fff fffffa80`00000000 fffffa80`07acad98 : nt! ?? ::FNODOBFM::`string'+0x3360b
fffff880`02ffe9f0 fffff800`033e5010 : fffffa80`04450790 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`02ffeb10 fffff800`033e541b : fffff880`00000000 000007fe`fb260000 fffffa80`00000001 fffffa80`06865490 : nt!MiUnmapViewOfSection+0x1b0
fffff880`02ffebd0 fffff800`030cd993 : 00000000`00000001 00000000`693690f0 fffffa80`04448290 fffffa80`00000001 : nt!NtUnmapViewOfSection+0x5f
fffff880`02ffec20 00000000`77b1f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001bf2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b1f95a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4a49
fffff800`03123379 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4a49

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_41289_nt!_??_::FNODOBFM::_string_+4a49

BUCKET_ID:  X64_0x1a_41289_nt!_??_::FNODOBFM::_string_+4a49

Followup: MachineOwner
---------

Debug session time: Tue Apr 19 00:58:22.931 2011 (GMT-4)
System Uptime: 0 days 0:00:38.788
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff800278aab44, 8, fffff800278aab44, 2}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+40ec0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff800278aab44, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff800278aab44, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ac0e0
 fffff800278aab44 

FAULTING_IP: 
+5746952f01a9dd54
fffff800`278aab44 ??              ???

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006133000 -- (.trap 0xfffff88006133000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008b480000 rbx=0000000000000000 rcx=f880012a71fd0000
rdx=fffffa80072ce3e1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800278aab44 rsp=fffff88006133198 rbp=0000000000000043
 r8=fffffa80072ce3e0  r9=fffff800031eee80 r10=fffffa8003c433b0
r11=fffff88006133110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
fffff800`278aab44 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030f38f2 to fffff80003074740

STACK_TEXT:  
fffff880`06132e98 fffff800`030f38f2 : 00000000`00000050 fffff800`278aab44 00000000`00000008 fffff880`06133000 : nt!KeBugCheckEx
fffff880`06132ea0 fffff800`0307282e : 00000000`00000008 fffffa80`07aae5b0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`06133000 fffff800`278aab44 : fffff800`030621fc fffffa80`07aae5b0 fffffa80`07b281f0 00000000`00000043 : nt!KiPageFault+0x16e
fffff880`06133198 fffff800`030621fc : fffffa80`07aae5b0 fffffa80`07b281f0 00000000`00000043 fffff800`031eee80 : 0xfffff800`278aab44
fffff880`061331a0 0000007f`fffffff8 : 00000000`ff3a0000 00000000`00000000 00000000`00000000 00000000`00000008 : nt!MiFlushSectionInternal+0x2cc
fffff880`061333e0 00000000`ff3a0000 : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`ff3a0000 : 0x7f`fffffff8
fffff880`061333e8 00000000`00000000 : 00000000`00000000 00000000`00000008 00000000`ff3a0000 00000000`00000001 : 0xff3a0000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+40ec0
fffff800`030f38f2 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+40ec0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x50_nt!_??_::FNODOBFM::_string_+40ec0

BUCKET_ID:  X64_0x50_nt!_??_::FNODOBFM::_string_+40ec0

Followup: MachineOwner
---------

Debug session time: Tue Apr 19 01:24:30.722 2011 (GMT-4)
System Uptime: 0 days 0:24:22.189
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 9c150, 2, 9c12f}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000009c150, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000009c12f, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  msinfo32.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000351138c to fffff80003481740

STACK_TEXT:  
fffff880`08c60778 fffff800`0351138c : 00000000`0000004e 00000000`00000099 00000000`0009c150 00000000`00000002 : nt!KeBugCheckEx
fffff880`08c60780 fffff800`034f36a9 : 00000000`00000000 fffff680`00041020 00000000`00000000 00000000`000006f8 : nt!MiBadShareCount+0x4c
fffff880`08c607c0 fffff800`034b2381 : 00000000`00000000 fffff680`00041ff8 fffffa80`047d8060 00000000`00132581 : nt! ?? ::FNODOBFM::`string'+0x31ed3
fffff880`08c60970 fffff800`034c30da : 00000000`00000000 00000000`08ce4fff fffffa80`00000000 fffffa80`047d8060 : nt!MiDeleteVirtualAddresses+0x408
fffff880`08c60b30 fffff800`03480993 : ffffffff`ffffffff 00000000`0025e220 00000000`0025e218 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`08c60c20 00000000`7783f89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0025e1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7783f89a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`0351138c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------

Debug session time: Tue Apr 19 00:59:42.416 2011 (GMT-4)
System Uptime: 0 days 0:00:54.273
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck E3, {fffffa8004b98880, fffffa8008034930, 0, 2}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+1a5a8 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: fffffa8004b98880, Address of resource
Arg2: fffffa8008034930, Address of thread
Arg3: 0000000000000000, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xE3

PROCESS_NAME:  uTorrent.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800030e2e2c to fffff8000307f740

STACK_TEXT:  
fffff880`05aad8b8 fffff800`030e2e2c : 00000000`000000e3 fffffa80`04b98880 fffffa80`08034930 00000000`00000000 : nt!KeBugCheckEx
fffff880`05aad8c0 fffff880`012acd5e : fffffa80`07fa3800 fffff8a0`039c03e0 fffff8a0`04685b0c fffff880`026e1004 : nt! ?? ::FNODOBFM::`string'+0x1a5a8
fffff880`05aad920 fffff880`01216aa9 : fffff880`02956308 fffffa80`071db4d0 fffff880`026e1210 fffffa80`08034930 : Ntfs!NtfsCommonCleanup+0x571d
fffff880`05aadd30 fffff800`030775c7 : fffff880`026e1210 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`05aadd60 fffff800`03077581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`026e10e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+1a5a8
fffff800`030e2e2c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+1a5a8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xE3_nt!_??_::FNODOBFM::_string_+1a5a8

BUCKET_ID:  X64_0xE3_nt!_??_::FNODOBFM::_string_+1a5a8

Followup: MachineOwner
---------

2: kd> llmtsmn
       ^ Syntax error in 'llmtsmn'
2: kd> lmtsmn
start             end                 module name
fffff880`04056000 fffff880`04094000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ef7000 fffff880`00f4e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03ca1000 fffff880`03d2b000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05519000 fffff880`0552f000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`011c1000 fffff880`011cc000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`01173000 fffff880`0117c000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0117c000 fffff880`011a6000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`05481000 fffff880`054a2000   AtiHdmi  AtiHdmi.sys  Wed Sep 30 09:54:46 2009 (4AC36326)
fffff880`00e00000 fffff880`00e2c000   atikmpag atikmpag.sys Fri Jan 22 08:07:54 2010 (4B59A32A)
fffff880`0465c000 fffff880`04ca0000   atipmdag atipmdag.sys Fri Jan 22 08:46:46 2010 (4B59AC46)
fffff880`00fb2000 fffff880`00fbe000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`065c9000 fffff880`065d2000   BCM42RLY BCM42RLY.sys Tue Dec 08 11:12:34 2009 (4B1E7AF2)
fffff880`0409d000 fffff880`0438b000   bcmwl664 bcmwl664.sys Tue Dec 08 11:10:06 2009 (4B1E7A5E)
fffff880`01641000 fffff880`01648000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c44000 fffff880`03c55000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04575000 fffff880`04593000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00630000 fffff960`00657000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`015bd000 fffff880`015e7000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d02000 fffff880`00dc2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`055e4000 fffff880`055f6000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`017ce000 fffff880`017fe000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ca4000 fffff880`00d02000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043f9000 fffff880`043fd500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`0143d000 fffff880`014b0000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fa9000 fffff880`00fb2000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`03ea2000 fffff880`03eb2000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0593d000 fffff880`0594b000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`054e8000 fffff880`055122a0   CtClsFlt CtClsFlt.sys Mon Jun 15 01:06:41 2009 (4A35D6E1)
fffff880`03c26000 fffff880`03c44000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c17000 fffff880`03c26000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`017b8000 fffff880`017ce000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04622000 fffff880`04644000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0594b000 fffff880`05957000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05962000 fffff880`05975000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05957000 fffff880`05962000   dump_msahci dump_msahci.sys Fri Nov 13 23:36:50 2009 (4AFE33E2)
fffff880`05992000 fffff880`0599e000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04ca0000 fffff880`04d94000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04d94000 fffff880`04dda000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`03fc1000 fffff880`03ffa000   facap    facap.sys    Wed Sep 24 22:34:31 2008 (48DAF8B7)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`014c1000 fffff880`014cb000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0177e000 fffff880`017b8000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`00c00000 fffff880`00c4a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03e5a000 fffff880`03e67000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`035ec000 fffff800`03635000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04dda000 fffff880`04dfe000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05900000 fffff880`05919000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`058ef000 fffff880`05900000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`05919000 fffff880`05921080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`059cc000 fffff880`059da000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`044a3000 fffff880`0456b000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01775000 fffff880`0177e000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`043ca000 fffff880`043e8000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03e67000 fffff880`03e8be00   Impcd    Impcd.sys    Mon Oct 12 22:00:51 2009 (4AD3DF53)
fffff880`03e8c000 fffff880`03ea2000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03f65000 fffff880`03fc1000   itecir   itecir.sys   Mon Mar 09 04:58:47 2009 (49B4DA47)
fffff880`03f14000 fffff880`03f65000   k57nd60a k57nd60a.sys Sun Jun 07 03:36:34 2009 (4A2B6E02)
fffff880`043e8000 fffff880`043f7000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05922000 fffff880`05930000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc7000 fffff800`00bd1000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`054a5000 fffff880`054e8000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013a8000 fffff880`013c2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`016aa000 fffff880`016d5000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05513000 fffff880`05518200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05844000 fffff880`05859000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05800000 fffff880`05823000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c4c000 fffff880`00c90000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`059da000 fffff880`059e8000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e4b000 fffff880`03e5a000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05930000 fffff880`0593d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`01159000 fffff880`01173000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01400000 fffff880`01431000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`04593000 fffff880`045ab000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`045ab000 fffff880`045d8000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`05e66000 fffff880`05eb4000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`05eb4000 fffff880`05ed7000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`011a6000 fffff880`011b1000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2)
fffff880`010cb000 fffff880`010d6000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f57000 fffff880`00f61000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0106d000 fffff880`010cb000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c0c000 fffff880`03c17000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01763000 fffff880`01775000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014cb000 fffff880`015bd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05553000 fffff880`0555f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04478000 fffff880`0448b000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0555f000 fffff880`0558e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0546c000 fffff880`05481000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d70000 fffff880`03d7f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03c5c000 fffff880`03ca1000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0164a000 fffff880`016aa000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`065d2000 fffff880`065e7000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`010d6000 fffff880`010e7000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c00000 fffff880`03c0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0300f000 fffff800`035ec000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01205000 fffff880`013a8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01638000 fffff880`01641000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04425000 fffff880`04478000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03d34000 fffff880`03d5a000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f94000 fffff880`00fa9000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f61000 fffff880`00f94000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011b1000 fffff880`011c1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014b0000 fffff880`014c1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05ed7000 fffff880`05f7d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`00dc2000 fffff880`00dff000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c90000 fffff880`00ca4000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01060000 fffff880`0106c040   PxHlpa64 PxHlpa64.sys Tue Oct 20 14:08:42 2009 (4ADDFCAA)
fffff880`0552f000 fffff880`05553000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0558e000 fffff880`055a9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`055a9000 fffff880`055ca000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`055ca000 fffff880`055e4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03dae000 fffff880`03dff000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`015f5000 fffff880`015fe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01431000 fffff880`0143a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f7000 fffff880`01400000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01729000 fffff880`01763000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`043b1000 fffff880`043ca000   rimspe64 rimspe64.sys Wed Jul 01 19:54:49 2009 (4A4BF749)
fffff880`04398000 fffff880`043b1000   risdpe64 risdpe64.sys Wed Jul 01 05:31:57 2009 (4A4B2D0D)
fffff880`04000000 fffff880`04056000   rixdpe64 rixdpe64.sys Sat Jul 04 06:27:00 2009 (4A4F2E74)
fffff880`0448b000 fffff880`044a3000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05f7d000 fffff880`05f88000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`01721000 fffff880`01729000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06534000 fffff880`065c9000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`064cd000 fffff880`06534000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`05f88000 fffff880`05fb5000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`05fb5000 fffff880`05fbd000   SSPORT   SSPORT.sys   Thu Aug 11 19:07:32 2005 (42FBDA34)
fffff880`04611000 fffff880`04621d00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA)
fffff880`05870000 fffff880`058ef000   stwrt64  stwrt64.sys  Thu Jan 21 05:15:11 2010 (4B58292F)
fffff880`03e00000 fffff880`03e4b000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1)
fffff880`02a00000 fffff880`02bfd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05fbd000 fffff880`05fcf000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011ea000 fffff880`011f7000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011cc000 fffff880`011ea000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03d9a000 fffff880`03dae000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00500000 fffff960`0050a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`00fd3000 fffff880`00ff9000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05400000 fffff880`05412000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05975000 fffff880`05992000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`043f7000 fffff880`043f8f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04600000 fffff880`04611000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
fffff880`05412000 fffff880`0546c000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF)
fffff880`03ebe000 fffff880`03f14000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0599e000 fffff880`059cb200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`015e7000 fffff880`015f5000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`013c2000 fffff880`013e7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fbe000 fffff880`00fd3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010fd000 fffff880`01159000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`016d5000 fffff880`01721000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0438b000 fffff880`04398000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`03d5a000 fffff880`03d70000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0456b000 fffff880`04575000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`03d7f000 fffff880`03d9a000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`013e7000 fffff880`013f7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e44000 fffff880`00ee8000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ee8000 fffff880`00ef7000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d2b000 fffff880`03d34000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`04094000 fffff880`0409d000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f4e000 fffff880`00f57000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05823000 fffff880`05844000   WudfPf   WudfPf.sys   Fri Jan 15 02:32:54 2010 (4B501A26)

Unloaded modules:
fffff880`01600000 fffff880`0160e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0160e000 fffff880`0161a000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0161a000 fffff880`01625000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01625000 fffff880`01638000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
.


20 Apr 2011   #4

Windows 7 - 64-bit
 
 

Hi Carl, thanks for the help. I tried installing SP1 but when I use Windows Update to download it, it fails half way through the download. I set up Driver Verifier and have since had a few BSOD so I've attached these dumps.
My System SpecsSystem Spec
20 Apr 2011   #5

Windows 7 Ultimate 32 bit
 
 

Good job. You uploaded three Driver Verifier enabled dumps. The first one blames mouclass.sys which is a Windows system driver. The second dump blames vwififlt.sys, which is another Windows system driver. The third dump blames a Windows system core file, ntkrnlmp.exe. Each of the three dumps shows a different error or bugcheck code. This tends to rule out third party drivers as the cause of the crashes. Now we need to look at hardware problems and hardware and software compatibility.

I recommend that you run Memtest86 and test your RAM. Follow the instructions in this tutorial: RAM - Test with Memtest86+. Let Memtest run for a minimum of seven passes; this will take six to eight hours. Any errors will show on your screen in red. If you see an error, you can stop the test. Post back with your results and we will go from there.

Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03003000 PsLoadedModuleList = 0xfffff800`03240e50
Debug session time: Wed Apr 20 13:32:08.115 2011 (GMT-4)
System Uptime: 0 days 1:05:46.614
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff98013962d08, 2, 1, fffff880040425cd}

Probably caused by : mouclass.sys ( mouclass!MouseClassHandleRead+59 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff98013962d08, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880040425cd, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ab0e0
 fffff98013962d08 

CURRENT_IRQL:  2

FAULTING_IP: 
mouclass!MouseClassHandleRead+59
fffff880`040425cd 4c8900          mov     qword ptr [rax],r8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xD1

PROCESS_NAME:  csrss.exe

DEVICE_OBJECT: fffffa8006d42db0

TRAP_FRAME:  fffff88001fdd080 -- (.trap 0xfffff88001fdd080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff98013962d08 rbx=0000000000000000 rcx=fffffa80069ae240
rdx=fffffa80069ae248 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880040425cd rsp=fffff88001fdd210 rbp=0000000000000000
 r8=fffff98013c62d08  r9=0000000000000000 r10=000000000000001c
r11=fffff88001fdd230 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
mouclass!MouseClassHandleRead+0x59:
fffff880`040425cd 4c8900          mov     qword ptr [rax],r8 ds:4510:fffff980`13962d08=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003072ca9 to fffff80003073740

STACK_TEXT:  
fffff880`01fdcf38 fffff800`03072ca9 : 00000000`0000000a fffff980`13962d08 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`01fdcf40 fffff800`03071920 : 00000000`00000000 fffff980`13c62c60 00000000`00000000 fffff800`034fdec4 : nt!KiBugCheckDispatch+0x69
fffff880`01fdd080 fffff880`040425cd : 00000000`00000103 fffff880`040410a0 fffffa80`069ae1b0 fffff980`13c62c60 : nt!KiPageFault+0x260
fffff880`01fdd210 fffff880`040427bd : 00000000`00000103 00000000`00000002 fffffa80`069ae1b0 fffffa80`069ae1b0 : mouclass!MouseClassHandleRead+0x59
fffff880`01fdd260 fffff800`0351ac16 : fffff980`13c62c60 fffffa80`069ae060 fffffa80`04d1aa40 00000000`00000028 : mouclass!MouseClassRead+0xf1
fffff880`01fdd2a0 fffff800`03387ae9 : 00000000`00000000 fffffa80`06d42db0 00000000`00000000 fffffa80`04d1aa40 : nt!IovCallDriver+0x566
fffff880`01fdd300 fffff800`0338f2e3 : fffffa80`06d42db0 00000000`00000000 fffffa80`06d42db0 00000384`00000600 : nt!IopSynchronousServiceTail+0xf9
fffff880`01fdd370 fffff800`03072993 : fffffa80`001784d0 00000000`00000000 fffff960`001c7dac fffff900`c0813df0 : nt!NtReadFile+0x631
fffff880`01fdd460 fffff800`0306ef30 : fffff960`00223563 fffff900`c0813df0 00000026`000005e1 fffffa80`003c386e : nt!KiSystemServiceCopyEnd+0x13
fffff880`01fdd668 fffff960`00223563 : fffff900`c0813df0 00000026`000005e1 fffffa80`003c386e 00000000`0001003d : nt!KiServiceLinkage
fffff880`01fdd670 fffff960`001c7e30 : fffff900`c0813df0 00000000`00000000 00000000`00000000 00000000`00000286 : win32k!StartDeviceRead+0x1df
fffff880`01fdd6d0 fffff800`030500f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!InputApc+0x84
fffff880`01fdd700 fffff800`0307ab9d : fffffa80`06d77b60 00000000`00000000 fffff960`001c7dac 00000000`00000000 : nt!KiDeliverApc+0x211
fffff880`01fdd780 fffff800`03076d4b : fffff880`01fdd7f8 00000000`00000000 fffff960`00000000 fffff880`01fdd810 : nt!KiCommitThreadWait+0x3dd
fffff880`01fdd810 fffff960`00168870 : fffff900`00000002 fffffa80`05e29ab0 fffff900`00000001 fffff880`0000000d : nt!KeWaitForMultipleObjects+0x271
fffff880`01fddac0 fffff960`00169844 : 00000000`00000000 fffff900`c016c4d0 fffff960`003b2340 fffff900`c0166010 : win32k!xxxMsgWaitForMultipleObjects+0x108
fffff880`01fddb40 fffff960`00124568 : fffffa80`00000001 fffffa80`0000000c fffffa80`06d77b60 fffff6fc`4000fdb8 : win32k!xxxDesktopThread+0x254
fffff880`01fddbc0 fffff960`001a419a : fffffa80`00000001 fffff960`003b2340 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x64
fffff880`01fddbf0 fffff800`03072993 : fffffa80`06d77b60 00000000`00000004 000007ff`fffae000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`01fddc20 000007fe`fcc63d5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0164fcf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fcc63d5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
mouclass!MouseClassHandleRead+59
fffff880`040425cd 4c8900          mov     qword ptr [rax],r8

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  mouclass!MouseClassHandleRead+59

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mouclass

IMAGE_NAME:  mouclass.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc116

FAILURE_BUCKET_ID:  X64_0xD1_VRF_mouclass!MouseClassHandleRead+59

BUCKET_ID:  X64_0xD1_VRF_mouclass!MouseClassHandleRead+59

Followup: MachineOwner
---------

Debug session time: Wed Apr 20 13:58:51.463 2011 (GMT-4)
System Uptime: 0 days 0:03:23.039
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff98010d22eb0, fffff98010d22199, d74158, 23}

Unable to load image \SystemRoot\system32\DRIVERS\bcmwl664.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for bcmwl664.sys
*** ERROR: Module load completed but symbols could not be loaded for bcmwl664.sys
Probably caused by : vwififlt.sys ( vwififlt!FilterSendNetBufferListsComplete+151 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff98010d22eb0, address trying to free
Arg2: fffff98010d22199, address where bits are corrupted
Arg3: 0000000000d74158, (reserved)
Arg4: 0000000000000023, caller is freeing an address where nearby bytes within the same page have been corrupted

Debugging Details:
------------------


BUGCHECK_STR:  0xC1_23

SPECIAL_POOL_CORRUPTION_TYPE:  23

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8000310060a to fffff80003070740

STACK_TEXT:  
fffff880`02f9a8f8 fffff800`0310060a : 00000000`000000c1 fffff980`10d22eb0 fffff980`10d22199 00000000`00d74158 : nt!KeBugCheckEx
fffff880`02f9a900 fffff800`031776a3 : 00000000`00000003 fffff880`03cf6110 00000000`00000293 fffff800`03504dfe : nt!MiCheckSpecialPoolSlop+0x9a
fffff880`02f9a940 fffff800`031a3356 : fffff800`03000000 00000000`46465756 ffffffff`ffff6c30 fffff980`10d22ed0 : nt!MmFreeSpecialPool+0x1d3
fffff880`02f9aa70 fffff880`016845f5 : 00000000`00000100 00000000`00000100 fffff980`0388ed00 fffff980`0388ea00 : nt!ExDeferredFreePool+0xf13
fffff880`02f9ab20 fffff880`03cef201 : fffff980`0388ad78 00000000`00000000 00000000`00000000 fffff980`10cf8eb0 : ndis!NdisFreeCloneNetBufferList+0x175
fffff880`02f9ab50 fffff880`017395ad : fffffa80`0640c1a0 00000000`00000000 00000000`00000000 fffff980`035f8e60 : vwififlt!FilterSendNetBufferListsComplete+0x151
fffff880`02f9aba0 fffff880`04f131e3 : fffffa80`065bd000 fffff800`032155a0 fffff980`03594f80 fffff980`10d22ed0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff880`02f9abe0 fffffa80`065bd000 : fffff800`032155a0 fffff980`03594f80 fffff980`10d22ed0 fffffa80`03ba1368 : bcmwl664+0x221e3
fffff880`02f9abe8 fffff800`032155a0 : fffff980`03594f80 fffff980`10d22ed0 fffffa80`03ba1368 00000000`00000000 : 0xfffffa80`065bd000
fffff880`02f9abf0 fffff980`03594f80 : fffff980`10d22ed0 fffffa80`03ba1368 00000000`00000000 fffffa80`03ba1368 : nt!ExWorkerQueue
fffff880`02f9abf8 fffff980`10d22ed0 : fffffa80`03ba1368 00000000`00000000 fffffa80`03ba1368 fffff880`04f0418f : 0xfffff980`03594f80
fffff880`02f9ac00 fffffa80`03ba1368 : 00000000`00000000 fffffa80`03ba1368 fffff880`04f0418f fffffa80`065bd000 : 0xfffff980`10d22ed0
fffff880`02f9ac08 00000000`00000000 : fffffa80`03ba1368 fffff880`04f0418f fffffa80`065bd000 fffffa80`065bd000 : 0xfffffa80`03ba1368


STACK_COMMAND:  kb

FOLLOWUP_IP: 
vwififlt!FilterSendNetBufferListsComplete+151
fffff880`03cef201 488b0d086f0000  mov     rcx,qword ptr [vwififlt!WPP_GLOBAL_Control (fffff880`03cf6110)]

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  vwififlt!FilterSendNetBufferListsComplete+151

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: vwififlt

IMAGE_NAME:  vwififlt.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc3a

FAILURE_BUCKET_ID:  X64_0xC1_23_VRF_vwififlt!FilterSendNetBufferListsComplete+151

BUCKET_ID:  X64_0xC1_23_VRF_vwififlt!FilterSendNetBufferListsComplete+151

Followup: MachineOwner
---------

Debug session time: Wed Apr 20 13:54:54.979 2011 (GMT-4)
System Uptime: 0 days 0:22:18.555
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {403, fffff6800003f1a8, e9000000092c1867, fffff68000027f30}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+31ef2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800003f1a8
Arg3: e9000000092c1867
Arg4: fffff68000027f30

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_403

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  msinfo32.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800030e86c8 to fffff80003076740

STACK_TEXT:  
fffff880`08da77b8 fffff800`030e86c8 : 00000000`0000001a 00000000`00000403 fffff680`0003f1a8 e9000000`092c1867 : nt!KeBugCheckEx
fffff880`08da77c0 fffff800`030a7381 : 00000000`00000000 fffff680`0003fff8 fffffa80`04eac5c0 00000000`00047476 : nt! ?? ::FNODOBFM::`string'+0x31ef2
fffff880`08da7970 fffff800`030b80da : 00000000`00000000 00000000`08664fff fffffa80`00000000 fffffa80`04eac5c0 : nt!MiDeleteVirtualAddresses+0x408
fffff880`08da7b30 fffff800`03075993 : ffffffff`ffffffff 00000000`0020dd40 00000000`0020dd38 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`08da7c20 00000000`774ff89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0020dd08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774ff89a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+31ef2
fffff800`030e86c8 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+31ef2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_403_VRF_nt!_??_::FNODOBFM::_string_+31ef2

BUCKET_ID:  X64_0x1a_403_VRF_nt!_??_::FNODOBFM::_string_+31ef2

Followup: MachineOwner
---------
My System SpecsSystem Spec
09 Sep 2011   #6

Windows 7 - 64-bit
 
 

Hi, I know my thread is very old now. I finally got around to running that Memtest. I immediately found errors. Now I see that the next step is to manually check each stick of RAM separately. How do I go about doing this with a laptop?
My System SpecsSystem Spec
Reply

 BSOD




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 01:18 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33