BSOD Crash


  1. Posts : 1
    windows 7 64 bit
       #1

    BSOD Crash


    I'm using windows 7
    - x64 bit ?
    windows 7 ultimate edition
    i purchased it from a retailer

    My laptop is Acer aspire i bought it a week ago
    OS is 1 week old also
      My Computer


  2. Posts : 11,269
    Windows 7 Home Premium 64 Bit
       #2

    Code:
    1. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\010912-16754-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e8fe50 Debug session time: Mon Jan 9 20:36:35.567 2012 (UTC - 7:00) System Uptime: 0 days 0:03:29.566 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80012ea240, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80012ea240 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: WerFault.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002d3626e to fffff80002cc3f00 STACK_TEXT: fffff880`0a7c67e8 fffff800`02d3626e : 00000000`0000001a 00000000`00041790 fffffa80`012ea240 00000000`0000ffff : nt!KeBugCheckEx fffff880`0a7c67f0 fffff800`02cf75d9 : 00000000`00000000 00000000`01ef6fff fffff880`00000000 fffffa80`089bbf90 : nt! ?? ::FNODOBFM::`string'+0x339d6 fffff880`0a7c69b0 fffff800`02fd9e50 : fffffa80`041bd010 0007ffff`00000000 fffffa80`089bbf90 fffffa80`089bbf90 : nt!MiRemoveMappedView+0xd9 fffff880`0a7c6ad0 fffff800`02fda25b : 00000000`00000000 00000000`01e90000 fffffa80`00000001 00000000`01e90001 : nt!MiUnmapViewOfSection+0x1b0 fffff880`0a7c6b90 fffff800`02cc3153 : 00000000`00000000 00000000`00000000 fffffa80`03eb0b30 00000000`77cc72a0 : nt!NtUnmapViewOfSection+0x5f fffff880`0a7c6be0 00000000`77c0015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0013ae38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c0015a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+339d6 fffff800`02d3626e cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6 Followup: MachineOwner ---------
    2. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\010912-30654-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e52e50 Debug session time: Mon Jan 9 21:43:58.398 2012 (UTC - 7:00) System Uptime: 0 days 0:49:55.787 Loading Kernel Symbols ............................................................... ................................................................ .................................. Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41284, 5016001, 0, fffff70001080000} Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3c8 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041284, A PTE or the working set list is corrupt. Arg2: 0000000005016001 Arg3: 0000000000000000 Arg4: fffff70001080000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41284 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: setup.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002cdda63 to fffff80002c86f00 STACK_TEXT: fffff880`0bc1e398 fffff800`02cdda63 : 00000000`0000001a 00000000`00041284 00000000`05016001 00000000`00000000 : nt!KeBugCheckEx fffff880`0bc1e3a0 fffff800`02cb7c15 : fffff700`01080000 00000000`000000a1 fffffa80`043fc5c0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ac3 fffff880`0bc1e3e0 fffff800`02cc8c4a : 00000000`00000000 00000000`05117fff fffffa80`00000000 fffffa80`00000000 : nt!MiDeleteVirtualAddresses+0x4cc fffff880`0bc1e5a0 fffff800`02c86153 : ffffffff`ffffffff fffff880`0bc1e860 fffff880`0bc1e8c8 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`0bc1e690 fffff800`02c826f0 : fffff960`001350f0 00000000`00000001 00000000`00000000 fffff900`c06f6590 : nt!KiSystemServiceCopyEnd+0x13 fffff880`0bc1e828 fffff960`001350f0 : 00000000`00000001 00000000`00000000 fffff900`c06f6590 00000000`00000001 : nt!KiServiceLinkage fffff880`0bc1e830 fffff960`0013d4a9 : 00000000`00000000 00000000`00000001 fffff900`c06f6590 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8 fffff880`0bc1e980 fffff960`00134920 : 00000000`00000b2c 00000000`00000000 fffff900`c0738a00 fffff960`00000000 : win32k!NtGdiCloseProcess+0x2c9 fffff880`0bc1e9e0 fffff960`00134063 : fffffa80`08140600 00000000`00000001 fffffa80`08a11b60 fffff800`02ca0fa0 : win32k!GdiProcessCallout+0x200 fffff880`0bc1ea60 fffff800`02f695e1 : fffffa80`08140640 00000000`00000000 00000000`00000000 fffffa80`08a11b60 : win32k!W32pProcessCallout+0x6b fffff880`0bc1ea90 fffff800`02f42cb8 : 00000000`00000003 00000000`00000001 fffffa80`043fc500 00000000`00000000 : nt!PspExitThread+0x2b1 fffff880`0bc1eb60 fffff800`02c86153 : fffffa80`043fc5c0 00000000`00000003 fffffa80`08a11b60 00000000`7efdb000 : nt!NtTerminateProcess+0x138 fffff880`0bc1ebe0 00000000`76fc017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0023dcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fc017a STACK_COMMAND: kb FOLLOWUP_IP: win32k!SURFACE::bDeleteSurface+3c8 fffff960`001350f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001352a5) SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0 FAILURE_BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8 BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8 Followup: MachineOwner ---------
    3. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\010912-28844-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c14000 PsLoadedModuleList = 0xfffff800`02e51e50 Debug session time: Mon Jan 9 22:14:26.241 2012 (UTC - 7:00) System Uptime: 0 days 0:30:00.256 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80012ea2a0, ffff, 0} Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3c8 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80012ea2a0 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: setup.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002cf826e to fffff80002c85f00 STACK_TEXT: fffff880`0b616268 fffff800`02cf826e : 00000000`0000001a 00000000`00041790 fffffa80`012ea2a0 00000000`0000ffff : nt!KeBugCheckEx fffff880`0b616270 fffff800`02cc7c4a : 00000000`00000000 00000000`05377fff fffffa80`00000000 fffffa80`08212060 : nt! ?? ::FNODOBFM::`string'+0x339d6 fffff880`0b616430 fffff800`02c85153 : ffffffff`ffffffff fffff880`0b6166f0 fffff880`0b616758 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`0b616520 fffff800`02c816f0 : fffff960`000d50f0 00000000`00000001 00000000`00000000 fffff900`c21c6690 : nt!KiSystemServiceCopyEnd+0x13 fffff880`0b6166b8 fffff960`000d50f0 : 00000000`00000001 00000000`00000000 fffff900`c21c6690 00000000`00000001 : nt!KiServiceLinkage fffff880`0b6166c0 fffff960`000dd4a9 : 00000000`00000000 fffff880`00000001 fffff900`c21c6690 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8 fffff880`0b616810 fffff960`000d4920 : 00000000`00000454 fffff880`0b616b00 fffff900`c2109ce0 fffffa80`00000000 : win32k!NtGdiCloseProcess+0x2c9 fffff880`0b616870 fffff960`000d4063 : fffffa80`083c9600 fffff880`0b616be0 00000000`00000000 fffff880`0b616be0 : win32k!GdiProcessCallout+0x200 fffff880`0b6168f0 fffff800`02f685e1 : fffffa80`083c96d0 00000000`00000000 00000000`00000000 fffffa80`03afbb60 : win32k!W32pProcessCallout+0x6b fffff880`0b616920 fffff800`02f42b3d : 00000000`cfffffff 00001f80`00000201 fffff880`78457300 fffffa80`08911b60 : nt!PspExitThread+0x2b1 fffff880`0b6169f0 fffff800`02c62a43 : 00000000`0b616c60 fffffa80`088da450 00000000`006de310 00000000`00000000 : nt!PsExitSpecialApc+0x1d fffff880`0b616a20 fffff800`02c62e80 : 00000000`02e6f93c fffff880`0b616aa0 fffff800`02f43710 00000000`00000001 : nt!KiDeliverApc+0x2eb fffff880`0b616aa0 fffff800`02c851f7 : fffffa80`03afbb60 00000000`7efd5000 fffff880`000000c0 00000000`7efd5000 : nt!KiInitiateUserApc+0x70 fffff880`0b616be0 00000000`76e317ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`006de2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e317ba STACK_COMMAND: kb FOLLOWUP_IP: win32k!SURFACE::bDeleteSurface+3c8 fffff960`000d50f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`000d52a5) SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0 FAILURE_BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3c8 BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3c8 Followup: MachineOwner ---------
    4. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\010912-22370-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50 Debug session time: Tue Jan 10 00:39:16.119 2012 (UTC - 7:00) System Uptime: 0 days 1:23:05.508 Loading Kernel Symbols ............................................................... ................................................................ .................................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41284, 3936001, 0, fffff70001080000} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041284, A PTE or the working set list is corrupt. Arg2: 0000000003936001 Arg3: 0000000000000000 Arg4: fffff70001080000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41284 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: RecoverMyFiles CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002cd3a63 to fffff80002c7cf00 STACK_TEXT: fffff880`03a21838 fffff800`02cd3a63 : 00000000`0000001a 00000000`00041284 00000000`03936001 00000000`00000000 : nt!KeBugCheckEx fffff880`03a21840 fffff800`02cadc15 : fffff700`01080000 00000000`00000021 fffffa80`030e8110 00000000`73534000 : nt! ?? ::FNODOBFM::`string'+0x4ac3 fffff880`03a21880 fffff800`02c50487 : ffffffff`00000000 00000000`03a1ffff fffffa80`00000000 fffffa80`03e14b60 : nt!MiDeleteVirtualAddresses+0x4cc fffff880`03a21a40 fffff800`02f5f7af : fffff8a0`083c6060 00000000`00000001 00000000`00000000 fffffa80`03e14b60 : nt!MmCleanProcessAddressSpace+0x62f fffff880`03a21a90 fffff800`02f38cb8 : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x47f fffff880`03a21b60 fffff800`02c7c153 : fffffa80`03e51320 00000000`00000000 fffffa80`03e14b60 00000000`0008e3b8 : nt!NtTerminateProcess+0x138 fffff880`03a21be0 00000000`76f8017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f8017a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4ac3 fffff800`02cd3a63 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4ac3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3 BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3 Followup: MachineOwner ---------
    5. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\011012-17113-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c51000 PsLoadedModuleList = 0xfffff800`02e8ee50 Debug session time: Tue Jan 10 01:03:16.089 2012 (UTC - 7:00) System Uptime: 0 days 0:19:39.104 Loading Kernel Symbols ............................................................... ................................................................ ................................. Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41284, dc06001, 0, fffff70001080000} Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041284, A PTE or the working set list is corrupt. Arg2: 000000000dc06001 Arg3: 0000000000000000 Arg4: fffff70001080000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41284 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002d19a63 to fffff80002cc2f00 STACK_TEXT: fffff880`08f35358 fffff800`02d19a63 : 00000000`0000001a 00000000`00041284 00000000`0dc06001 00000000`00000000 : nt!KeBugCheckEx fffff880`08f35360 fffff800`02cf3c15 : fffff700`01080000 00000000`000000a1 e3c00000`6514dc6e fffff700`01080000 : nt! ?? ::FNODOBFM::`string'+0x4ac3 fffff880`08f353a0 fffff800`02d04c4a : 00000000`00000000 00000000`0dedffff fffffa80`00000000 fffffa80`08a1a4b0 : nt!MiDeleteVirtualAddresses+0x4cc fffff880`08f35560 fffff800`02cc2153 : ffffffff`ffffffff fffff8a0`0441d358 fffff8a0`0441d380 fffffa80`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`08f35650 fffff800`02cbe6f0 : fffff880`0fe354b2 fffff8a0`02bd85f0 fffffa80`08a1a4b0 fffffa80`08a2ebf0 : nt!KiSystemServiceCopyEnd+0x13 fffff880`08f357e8 fffff880`0fe354b2 : fffff8a0`02bd85f0 fffffa80`08a1a4b0 fffffa80`08a2ebf0 fffff8a0`0441d350 : nt!KiServiceLinkage fffff880`08f357f0 fffff880`0fe20b5a : 00000000`00000000 fffff8a0`022d19b0 00000000`00000001 00000000`00000050 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0xa2 fffff880`08f35820 fffff880`0fe1b523 : fffffa80`0773ac60 00000000`00000001 fffff8a0`02bd85f0 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x112 fffff880`08f358d0 fffff880`0fe01ecc : 00000000`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b fffff880`08f359a0 fffff880`10b2bc10 : 00000000`00000000 fffff8a0`0231f000 fffff8a0`0231f000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44 fffff880`08f359d0 fffff880`10b2b54b : 00000000`40000201 00000000`00000000 80000000`00000000 00000000`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248 fffff880`08f35ac0 fffff880`10b3f289 : fffff880`08f35c60 fffff8a0`024a0e00 fffff880`08f35c60 00000000`01e7af50 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0xa3 fffff880`08f35b10 fffff880`10b3c35a : 00000000`00000000 fffffa80`088426d0 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyContext+0xb1 fffff880`08f35b40 fffff960`001ab31a : 00000000`00000020 fffffa80`088426d0 00000000`000007f8 00000000`00000000 : dxgkrnl!DxgkDestroyContext+0x1a6 fffff880`08f35bb0 fffff800`02cc2153 : 00000000`00000000 00000000`055361cc 00000000`00000001 fffffa80`089f21c0 : win32k!NtGdiDdDDIDestroyContext+0x12 fffff880`08f35be0 000007fe`fdf6bf0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0768f0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdf6bf0a STACK_COMMAND: kb FOLLOWUP_IP: dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 fffff880`0fe354b2 488b0e mov rcx,qword ptr [rsi] SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578 FAILURE_BUCKET_ID: X64_0x1a_41284_dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 BUCKET_ID: X64_0x1a_41284_dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 Followup: MachineOwner ---------
    6. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\011312-16192-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50 Debug session time: Fri Jan 13 11:51:07.262 2012 (UTC - 7:00) System Uptime: 0 days 0:02:58.651 Loading Kernel Symbols ............................................................... ................................................................ ............................ Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41284, 67a96001, 0, fffff70001080000} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041284, A PTE or the working set list is corrupt. Arg2: 0000000067a96001 Arg3: 0000000000000000 Arg4: fffff70001080000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41284 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002d13a63 to fffff80002cbcf00 STACK_TEXT: fffff880`0b5237a8 fffff800`02d13a63 : 00000000`0000001a 00000000`00041284 00000000`67a96001 00000000`00000000 : nt!KeBugCheckEx fffff880`0b5237b0 fffff800`02d2ef93 : fffffa80`00000000 00000000`00000001 00000000`00000000 3de00000`a1622025 : nt! ?? ::FNODOBFM::`string'+0x4ac3 fffff880`0b5237f0 fffff800`02cf05d9 : 00000000`00000000 00000000`687a5fff fffffa80`00000000 fffff800`00000000 : nt! ?? ::FNODOBFM::`string'+0x336db fffff880`0b5239b0 fffff800`02fd2e50 : fffffa80`08725d90 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`0b523ad0 fffff800`02fd325b : 00000980`00000000 00000000`66bc0000 fffffa80`00000001 fffffa80`08561250 : nt!MiUnmapViewOfSection+0x1b0 fffff880`0b523b90 fffff800`02cbc153 : 00000000`00000008 fffffa80`03bf8060 fffffa80`03bb5630 00000000`7efdb000 : nt!NtUnmapViewOfSection+0x5f fffff880`0b523be0 00000000`7716015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`000ce098 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7716015a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4ac3 fffff800`02d13a63 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4ac3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3 BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3 Followup: MachineOwner ---------
    7. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\011412-15553-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50 Debug session time: Sat Jan 14 08:36:50.209 2012 (UTC - 7:00) System Uptime: 0 days 0:04:34.223 Loading Kernel Symbols ............................................................... ................................................................ ............................ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80012ea2d0, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80012ea2d0 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: wmpnscfg.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002cf526e to fffff80002c82f00 STACK_TEXT: fffff880`0b1fb928 fffff800`02cf526e : 00000000`0000001a 00000000`00041790 fffffa80`012ea2d0 00000000`0000ffff : nt!KeBugCheckEx fffff880`0b1fb930 fffff800`02cc4c4a : 00000000`00000000 00000000`0030ffff fffffa80`00000000 fffff680`00001070 : nt! ?? ::FNODOBFM::`string'+0x339d6 fffff880`0b1fbaf0 fffff800`02c82153 : ffffffff`ffffffff 00000000`0020f030 00000000`0020f020 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`0b1fbbe0 00000000`76e6009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0020efc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e6009a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+339d6 fffff800`02cf526e cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6 Followup: MachineOwner ---------
    8. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\011612-19234-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e52e50 Debug session time: Mon Jan 16 13:05:55.625 2012 (UTC - 7:00) System Uptime: 0 days 3:16:57.999 Loading Kernel Symbols ............................................................... ................................................................ ........................ Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, 20, 8, 20} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+460da ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: 0000000000000020, The address that the exception occurred at Arg3: 0000000000000008, Parameter 0 of the exception Arg4: 0000000000000020, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: +3630373937663764 00000000`00000020 ?? ??? EXCEPTION_PARAMETER1: 0000000000000008 EXCEPTION_PARAMETER2: 0000000000000020 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ebd0e0 0000000000000020 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. BUGCHECK_STR: 0x1E_c0000005 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8800a6307e0 -- (.trap 0xfffff8800a6307e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000100 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa8007ebd1c1 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000020 rsp=fffff8800a630978 rbp=0000000000000000 r8=fffffa8007e8a890 r9=0000000000000004 r10=fffffa80039b23b0 r11=fffffa8004085010 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00000000`00000020 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002cc6a17 to fffff80002c86f00 STACK_TEXT: fffff880`0a62ff58 fffff800`02cc6a17 : 00000000`0000001e ffffffff`c0000005 00000000`00000020 00000000`00000008 : nt!KeBugCheckEx fffff880`0a62ff60 fffff800`02c86542 : fffff880`0a630738 00000000`00000001 fffff880`0a6307e0 fffffa80`06666c20 : nt! ?? ::FNODOBFM::`string'+0x460da fffff880`0a630600 fffff800`02c850ba : 00000000`00000008 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2 fffff880`0a6307e0 00000000`00000020 : fffffa80`040851b8 fffffa80`083277f0 fffffa80`06666c20 00000000`00000001 : nt!KiPageFault+0x23a fffff880`0a630978 fffffa80`040851b8 : fffffa80`083277f0 fffffa80`06666c20 00000000`00000001 00000000`00000001 : 0x20 fffff880`0a630980 fffffa80`083277f0 : fffffa80`06666c20 00000000`00000001 00000000`00000001 00000000`00000103 : 0xfffffa80`040851b8 fffff880`0a630988 fffffa80`06666c20 : 00000000`00000001 00000000`00000001 00000000`00000103 fffffa80`04085018 : 0xfffffa80`083277f0 fffff880`0a630990 00000000`00000001 : 00000000`00000001 00000000`00000103 fffffa80`04085018 fffffa80`083277f0 : 0xfffffa80`06666c20 fffff880`0a630998 00000000`00000001 : 00000000`00000103 fffffa80`04085018 fffffa80`083277f0 fffff880`0a630c60 : 0x1 fffff880`0a6309a0 00000000`00000103 : fffffa80`04085018 fffffa80`083277f0 fffff880`0a630c60 fffffa80`08327888 : 0x1 fffff880`0a6309a8 fffffa80`04085018 : fffffa80`083277f0 fffff880`0a630c60 fffffa80`08327888 fffff800`02f9fafa : 0x103 fffff880`0a6309b0 fffffa80`083277f0 : fffff880`0a630c60 fffffa80`08327888 fffff800`02f9fafa fffffa80`08327700 : 0xfffffa80`04085018 fffff880`0a6309b8 fffff880`0a630c60 : fffffa80`08327888 fffff800`02f9fafa fffffa80`08327700 fffff880`00000000 : 0xfffffa80`083277f0 fffff880`0a6309c0 fffffa80`08327888 : fffff800`02f9fafa fffffa80`08327700 fffff880`00000000 fffffa80`04085201 : 0xfffff880`0a630c60 fffff880`0a6309c8 fffff800`02f9fafa : fffffa80`08327700 fffff880`00000000 fffffa80`04085201 fffffa80`04085000 : 0xfffffa80`08327888 fffff880`0a6309d0 fffff800`02f9fc06 : fffff880`0a630bb8 00000000`000000e4 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd57 fffff880`0a630b00 fffff800`02c86153 : fffff880`0a630c60 fffffa80`07eb9fe0 fffff880`0a630bb8 fffff800`02f9a000 : nt!NtDeviceIoControlFile+0x56 fffff880`0a630b70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+460da fffff800`02cc6a17 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+460da FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!_??_::FNODOBFM::_string_+460da BUCKET_ID: X64_0x1E_c0000005_nt!_??_::FNODOBFM::_string_+460da Followup: MachineOwner ---------
    9. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\randyrhandz\errors\Windows_NT6_BSOD_jcgriff2\011612-18751-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c07000 PsLoadedModuleList = 0xfffff800`02e44e50 Debug session time: Mon Jan 16 22:15:46.994 2012 (UTC - 7:00) System Uptime: 0 days 2:21:54.384 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80012ea270, ffff, 0} Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3c8 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80012ea270 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002ceb26e to fffff80002c78f00 STACK_TEXT: fffff880`0bc843d8 fffff800`02ceb26e : 00000000`0000001a 00000000`00041790 fffffa80`012ea270 00000000`0000ffff : nt!KeBugCheckEx fffff880`0bc843e0 fffff800`02cbac4a : 00000000`00000000 00000000`0842afff fffffa80`00000000 fffffa80`03c32060 : nt! ?? ::FNODOBFM::`string'+0x339d6 fffff880`0bc845a0 fffff800`02c78153 : ffffffff`ffffffff fffff880`0bc84860 fffff880`0bc848c8 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`0bc84690 fffff800`02c746f0 : fffff960`001750f0 00000000`00000001 00000000`00000000 fffff900`c01372f0 : nt!KiSystemServiceCopyEnd+0x13 fffff880`0bc84828 fffff960`001750f0 : 00000000`00000001 00000000`00000000 fffff900`c01372f0 00000000`00000001 : nt!KiServiceLinkage fffff880`0bc84830 fffff960`0017d4a9 : 00000000`00000000 00000000`00000001 fffff900`c01372f0 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8 fffff880`0bc84980 fffff960`00174920 : 00000000`000003f4 00000000`00000000 fffff900`c20e8010 00000000`00000000 : win32k!NtGdiCloseProcess+0x2c9 fffff880`0bc849e0 fffff960`00174063 : fffffa80`08428800 00000000`00000001 fffffa80`040e5900 00000000`00000001 : win32k!GdiProcessCallout+0x200 fffff880`0bc84a60 fffff800`02f5b5e1 : fffffa80`08428840 00000000`00000000 00000000`00000000 fffffa80`040e5900 : win32k!W32pProcessCallout+0x6b fffff880`0bc84a90 fffff800`02f34cb8 : 00000000`c0000005 00000000`00000001 fffffa80`03c32000 fffffa80`03beca10 : nt!PspExitThread+0x2b1 fffff880`0bc84b60 fffff800`02c78153 : fffffa80`03c32060 00000000`c0000005 fffffa80`040e5900 00000000`00000080 : nt!NtTerminateProcess+0x138 fffff880`0bc84be0 00000000`771f017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`001ddd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771f017a STACK_COMMAND: kb FOLLOWUP_IP: win32k!SURFACE::bDeleteSurface+3c8 fffff960`001750f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001752a5) SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0 FAILURE_BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3c8 BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3c8 Followup: MachineOwner ---------
    You had a number of MEMORY_MANAGEMENT crashes. You are also missing a number of Windows Updates (including Service Pack 1).

    Run the boot version of Memtest86+ paying close attention to Parts 2 and 3 of the tutorial. Also, in case Memtest86+ misses anything and comes up with no errors, run the extended version of the Windows Memory Diagnostics Tool for at least five passes. These you may want to run overnight since they take a long time to complete (run them an hour before bed each of the next two nights and check before going to sleep that they are still running).

    Install all Windows Updates and driver updates. Use Driver Reference Table - sysnative.com - MVP,
    Drivers and Downloads,
    Installing and updating drivers in 7,
    Driver Install - Add Hardware Wizard,
    and Driver Install - Device Manager
    as references for finding drivers, driver manufacturers, updating driver procedures, installation procedures through the hardware wizard, and installation procedures through device manager respectively.

    Update to SP1
    Links to Service Pack 1 (SP1) and preparation for SP1 courtesy of JMH


    You had a KMODE_EXCEPTION_NOT_HANDLED crash

    Run Disk Check with both boxes checked for all HDDs and with Automatically fix file system errors checked for all SSDs. Post back your logs for the checks after finding them using Check Disk (chkdsk) - Read Event Viewer Log

    Run SFC /SCANNOW Command - System File Checker up to three times to fix all errors.

    Check for viruses.
    Download and install the free version of Malwarebytes : Free anti-malware, anti-virus and spyware removal download (do not start the trial) and make sure it is updated. Do not run a scan yet.
    Download VIPRE Rescue - VIPRE Computer Recovery Solution from Sunbelt Software but do not unzip it yet
    Download the Fakerean removal tool but do not run it yet.
    Start your computer in Safe Mode
    Unzip VIPRE Rescue and let it run.
    Run a full scan with Malwarebytes.
    Run the fakerean removal tool.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:53.
Find Us