New
#11
The 2 minidump files you just posted didn't tell me much
Third-party internet security programs are notorious for causing crashes, and Bit-defender is no exception. I would recommend to remove bit-defender just for testing before making any further analysis.
Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\TUANTR~1\AppData\Local\Temp\Rar$DI00.450\061810-17518-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02a4c000 PsLoadedModuleList = 0xfffff800`02c89e50 Debug session time: Fri Jun 18 01:51:04.079 2010 (UTC + 7:00) System Uptime: 0 days 1:09:28.515 Loading Kernel Symbols ............................................................... ................................................................ ................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa800376eed0, ffff, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa800376eed0 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002b2fede to fffff80002abc600 STACK_TEXT: fffff880`089d0828 fffff800`02b2fede : 00000000`0000001a 00000000`00041790 fffffa80`0376eed0 00000000`0000ffff : nt!KeBugCheckEx fffff880`089d0830 fffff800`02aefcc9 : 00000000`00000000 00000000`0bf8ffff fffffa80`00000000 fffffa80`00000000 : nt! ?? ::FNODOBFM::`string'+0x33946 fffff880`089d09f0 fffff800`02dd6170 : fffffa80`0752bcc0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`089d0b10 fffff800`02dd657b : 00000980`00000000 00000000`09780000 fffffa80`00000001 fffffa80`07fd2e60 : nt!MiUnmapViewOfSection+0x1b0 fffff880`089d0bd0 fffff800`02abb853 : 00000000`00000000 00000000`00008001 fffffa80`091e54e0 fffffa80`09cc8ca0 : nt!NtUnmapViewOfSection+0x5f fffff880`089d0c20 00000000`7771015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0327db28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7771015a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946 fffff800`02b2fede cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946 BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946 Followup: MachineOwner ---------