Welcome to the forum, mistermiff. I will take a look at your dmp file(s).
All but one dmp is reporting the stop error code, 4E. One dump reported an error code of 1A. Both of these codes point to memory errors and/or device driver problems.
STOP 0x0000004E: PFN_LIST_CORRUPT
Usual causes: Device driver, ?memory
BSOD Index
STOP 0x0000001A: MEMORY_MANAGEMENT
Usual causes: Device driver, memory, kernel
BSOD Index
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\Seven Forums\062010-18860-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
Debug session time: Sun Jun 20 21:19:28.257 2010 (GMT-4)
System Uptime: 0 days 7:03:11.192
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BugCheck 4E, {7, e17a, e14e, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+16dc6 )
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 000000000000e17a, page frame number
Arg3: 000000000000e14e, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002ae1949 to fffff80002a7f600
STACK_TEXT:
fffff880`085f0228 fffff800`02ae1949 : 00000000`0000004e 00000000`00000007 00000000`0000e17a 00000000`0000e14e : nt!KeBugCheckEx
fffff880`085f0230 fffff800`02a6166c : 00000000`0000e17a 00000000`0000042c fffff8a0`032a91a8 fffff8a0`032a91a8 : nt! ?? ::FNODOBFM::`string'+0x16dc6
fffff880`085f0270 fffff800`02d67ea1 : fffffa80`07239c30 fffff6fc`40054c98 fffff8a0`00000002 00000000`00000000 : nt!MiValidateImagePages+0x3ac
fffff880`085f0310 fffff800`02d675b0 : ffffffff`ffffffff 00000000`00000001 fffff8a0`032af000 00000000`00000015 : nt!MiSwitchBaseAddress+0x61
fffff880`085f0340 fffff800`02d7b3ae : 00000000`00000004 00000000`01000000 00000000`00000000 00000000`00000000 : nt!MiRelocateImageAgain+0x100
fffff880`085f0390 fffff800`02d70b83 : fffff880`085f05f0 00000000`00000000 fffff880`085f0698 fffff880`085f05e8 : nt!MmCreateSection+0x302
fffff880`085f05a0 fffff800`02edd0e3 : 00000000`00000000 fffff8a0`0a77fde8 00000000`00000000 00000000`00000001 : nt!NtCreateSection+0x162
fffff880`085f0620 fffff800`02edd671 : 00000000`00000000 fffff8a0`0a77fde8 fffffa80`0674ba30 fffff880`00000060 : nt!PfpFileBuildReadSupport+0x163
fffff880`085f0710 fffff800`02ee578e : fffff8a0`00000000 fffff8a0`0000000c fffff8a0`00000044 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x121
fffff880`085f0810 fffff800`02ee6327 : 00000000`00000000 fffff880`085f0ca0 fffff880`085f0a08 fffff8a0`018a3060 : nt!PfpPrefetchRequestPerform+0x30e
fffff880`085f0960 fffff800`02ef28fe : fffff880`085f0a08 00000000`00000001 fffffa80`0708a1a0 00000000`00000000 : nt!PfpPrefetchRequest+0x176
fffff880`085f09d0 fffff800`02ef702e : 00000000`00000000 00000000`019cf580 00000000`0000004f fffffa80`064abb01 : nt!PfSetSuperfetchInformation+0x1ad
fffff880`085f0ab0 fffff800`02a7e853 : fffffa80`0413fa60 00000000`00000000 00000000`00000001 00000000`00000001 : nt!NtSetSystemInformation+0xb91
fffff880`085f0c20 00000000`77ba15aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`019cf558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ba15aa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+16dc6
fffff800`02ae1949 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+16dc6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+16dc6
BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+16dc6
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 000000000000e17a, page frame number
Arg3: 000000000000e14e, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002ae1949 to fffff80002a7f600
STACK_TEXT:
fffff880`085f0228 fffff800`02ae1949 : 00000000`0000004e 00000000`00000007 00000000`0000e17a 00000000`0000e14e : nt!KeBugCheckEx
fffff880`085f0230 fffff800`02a6166c : 00000000`0000e17a 00000000`0000042c fffff8a0`032a91a8 fffff8a0`032a91a8 : nt! ?? ::FNODOBFM::`string'+0x16dc6
fffff880`085f0270 fffff800`02d67ea1 : fffffa80`07239c30 fffff6fc`40054c98 fffff8a0`00000002 00000000`00000000 : nt!MiValidateImagePages+0x3ac
fffff880`085f0310 fffff800`02d675b0 : ffffffff`ffffffff 00000000`00000001 fffff8a0`032af000 00000000`00000015 : nt!MiSwitchBaseAddress+0x61
fffff880`085f0340 fffff800`02d7b3ae : 00000000`00000004 00000000`01000000 00000000`00000000 00000000`00000000 : nt!MiRelocateImageAgain+0x100
fffff880`085f0390 fffff800`02d70b83 : fffff880`085f05f0 00000000`00000000 fffff880`085f0698 fffff880`085f05e8 : nt!MmCreateSection+0x302
fffff880`085f05a0 fffff800`02edd0e3 : 00000000`00000000 fffff8a0`0a77fde8 00000000`00000000 00000000`00000001 : nt!NtCreateSection+0x162
fffff880`085f0620 fffff800`02edd671 : 00000000`00000000 fffff8a0`0a77fde8 fffffa80`0674ba30 fffff880`00000060 : nt!PfpFileBuildReadSupport+0x163
fffff880`085f0710 fffff800`02ee578e : fffff8a0`00000000 fffff8a0`0000000c fffff8a0`00000044 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x121
fffff880`085f0810 fffff800`02ee6327 : 00000000`00000000 fffff880`085f0ca0 fffff880`085f0a08 fffff8a0`018a3060 : nt!PfpPrefetchRequestPerform+0x30e
fffff880`085f0960 fffff800`02ef28fe : fffff880`085f0a08 00000000`00000001 fffffa80`0708a1a0 00000000`00000000 : nt!PfpPrefetchRequest+0x176
fffff880`085f09d0 fffff800`02ef702e : 00000000`00000000 00000000`019cf580 00000000`0000004f fffffa80`064abb01 : nt!PfSetSuperfetchInformation+0x1ad
fffff880`085f0ab0 fffff800`02a7e853 : fffffa80`0413fa60 00000000`00000000 00000000`00000001 00000000`00000001 : nt!NtSetSystemInformation+0xb91
fffff880`085f0c20 00000000`77ba15aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`019cf558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ba15aa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+16dc6
fffff800`02ae1949 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+16dc6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+16dc6
BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+16dc6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\Seven Forums\061810-28735-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Invalid directory table base value 0x0
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
Debug session time: Fri Jun 18 19:26:59.217 2010 (GMT-4)
System Uptime: 2 days 18:57:46.121
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41201, fffff680002de6b0, ca3000000e17a867, fffffa80079d5420}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+13bb2 )
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff680002de6b0
Arg3: ca3000000e17a867
Arg4: fffffa80079d5420
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41201
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b2b57e to fffff80002acb600
STACK_TEXT:
fffff880`07d549b8 fffff800`02b2b57e : 00000000`0000001a 00000000`00041201 fffff680`002de6b0 ca300000`0e17a867 : nt!KeBugCheckEx
fffff880`07d549c0 fffff800`02a99ace : 00000000`00000010 00000000`00000282 fffff880`07d54a28 ca300000`0e17a867 : nt! ?? ::FNODOBFM::`string'+0x13bb2
fffff880`07d54a00 fffff800`02a9976a : fffffa80`079d5420 fffffa80`068ae930 fffffa80`068ae930 00000000`5bcd6000 : nt!MiQueryAddressState+0x2ae
fffff880`07d54a50 fffff800`02db3ac8 : fffff880`00000004 00000000`5bcd7000 fffffa80`079d5420 00000000`00000000 : nt!MiQueryAddressSpan+0xaa
fffff880`07d54ac0 fffff800`02aca853 : 00000000`00000344 fffffa80`076c8b60 00000000`00001f80 00000000`06f0e798 : nt!NtQueryVirtualMemory+0x386
fffff880`07d54bb0 00000000`772a00ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`06f0e778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772a00ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+13bb2
fffff800`02b2b57e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+13bb2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
Followup: MachineOwner
---------
I only posted your last two dmp files, one for each code.
In looking through your drivers, I see that you have AVG anti virus installed. AVG is known to cause BSOD, on some systems. I suggest that you uninstall it while trouble shooting using the uninstall tool > Info > Tool (32bit) - Tool (64 bit). If you have AVG Identity Protection installed, uninstall it also >Info > Tool. I recommend that you install MSE and make sure Windows Firewall is turned on.
I also found the following old drivers. Windows 7 does not like older drivers. Update these drivers and recommend that you uninstall Razor.
How To Find Drivers:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
pcouffin.sys Tue Dec 05 09:39:30 2006 (457584A2)
Razerlow.sys Mon Nov 07 01:33:11 2005 (436EF527)
RTCore64.sys Wed May 25 02:39:12 2005 (42941D90)
After you have uninstalled AVG and updated these drivers, run your system and we will go from there. The next step will be to test your RAM.