Regular BSOD


  1. Posts : 1
    Windows 7
       #1

    Regular BSOD


    Hey guys, Ive had my netbook a couple of years now and installed windows 7 almost a year ago now. Over the last few days it has began to regularly get BSOD or sometimes restarts after giving a message 'A critical error has occurred and windows will restart in 1 minute please save your work now'. I cant think what could be causing the problem. Please could someone take a look?

    Thanks


    Attachment 85208
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Hi and welcome to the forum. Please, in the future upload your dmps to us. We prefer that you not link them.

    Upload your dump files - https://www.sevenforums.com/tutorials...en-forums.html

    Three of your dumps reported a stop error code of 7A and one reported F4. These error codes point to hardware problems
    STOP 0x000000F4: CRITICAL_OBJECT_TERMINATION

    Usual causes:
    This indicates that a process or thread crucial to system operation has unexpectedly exited or been terminated.

    STOP 0x0000007A: KERNEL_DATA_INPAGE_ERROR

    Usual causes: Memory, Paging file corruption, File system, Hard drive, Cabling, Virus infection, Improperly seated cards, BIOS, Bad motherboard, Missing Service Pack
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\Minidump\071310-24312-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c0f000 PsLoadedModuleList = 0x81d57810
    Debug session time: Mon Jul 12 22:00:30.540 2010 (GMT-4)
    System Uptime: 0 days 0:10:05.227
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck F4, {3, 85c78530, 85c7869c, 81e37d50}
    
    Probably caused by : csrss.exe
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CRITICAL_OBJECT_TERMINATION (f4)
    A process or thread crucial to system operation has unexpectedly exited or been
    terminated.
    Several processes and threads are necessary for the operation of the
    system; when they are terminated (for any reason), the system can no
    longer function.
    Arguments:
    Arg1: 00000003, Process
    Arg2: 85c78530, Terminating object
    Arg3: 85c7869c, Process image file name
    Arg4: 81e37d50, Explanatory message (ascii)
    
    Debugging Details:
    ------------------
    
    
    PROCESS_OBJECT: 85c78530
    
    IMAGE_NAME:  csrss.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: csrss
    
    FAULTING_MODULE: 00000000 
    
    PROCESS_NAME:  csrss.exe
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - The instruction at 0x%p referenced memory at 0x%p. The required data was not placed into memory because of an I/O error status of 0x%x.
    
    BUGCHECK_STR:  0xF4_IOERR
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    CURRENT_IRQL:  0
    
    STACK_TEXT:  
    aa3ffc9c 81eeb07b 000000f4 00000003 85c78530 nt!KeBugCheckEx+0x1e
    aa3ffcc0 81e6ee44 81e37d50 85c7869c 85c787a0 nt!PspCatchCriticalBreak+0x71
    aa3ffcf0 81e70cdf 85c78530 86862238 c0000006 nt!PspTerminateAllThreads+0x2d
    aa3ffd24 81c5242a ffffffff c0000006 0216f200 nt!NtTerminateProcess+0x1a2
    aa3ffd24 778764f4 ffffffff c0000006 0216f200 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0216f200 00000000 00000000 00000000 00000000 0x778764f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_NAME:  MachineOwner
    
    FAILURE_BUCKET_ID:  0xF4_IOERR_IMAGE_csrss.exe
    
    BUCKET_ID:  0xF4_IOERR_IMAGE_csrss.exe
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\Minidump\071310-26843-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c07000 PsLoadedModuleList = 0x81d4f810
    Debug session time: Mon Jul 12 21:12:29.494 2010 (GMT-4)
    System Uptime: 0 days 2:40:53.197
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7A, {c0460668, c0000185, 63fff860, 8c0cd000}
    
    GetPointerFromAddress: unable to read from 81d6f700
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_DATA_INPAGE_ERROR (7a)
    The requested page of kernel data could not be read in.  Typically caused by
    a bad block in the paging file or disk controller error. Also see
    KERNEL_STACK_INPAGE_ERROR.
    If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
    it means the disk subsystem has experienced a failure.
    If the error status is 0xC000009A, then it means the request failed because
    a filesystem failed to make forward progress.
    Arguments:
    Arg1: c0460668, lock type that was held (value 1,2,3, or PTE address)
    Arg2: c0000185, error status (normally i/o status code)
    Arg3: 63fff860, current process (virtual address for lock type 3, or PTE)
    Arg4: 8c0cd000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
    
    Debugging Details:
    ------------------
    
    
    ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
    
    DISK_HARDWARE_ERROR: There was error with disk hardware
    
    BUGCHECK_STR:  0x7a_c0000185
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  bb189b64 -- (.trap 0xffffffffbb189b64)
    ErrCode = 00000010
    eax=843af878 ebx=842ae178 ecx=842ae178 edx=842ae254 esi=00000000 edi=84f747c8
    eip=8c0ccffe esp=bb189bd8 ebp=bb189bec iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    afd!AfdSendMessageDispatch+0x17:
    8c0ccffe b8d1000000      mov     eax,0D1h
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 81cbb60a to 81ce3d10
    
    STACK_TEXT:  
    bb1899bc 81cbb60a 0000007a c0460668 c0000185 nt!KeBugCheckEx+0x1e
    bb189a30 81cb30d5 842d239c bb189a88 81d3b540 nt!MiWaitForInPageComplete+0x2fd
    bb189ac4 81c8ee3f 81d3b540 8c0cd000 842d2308 nt!MiIssueHardFault+0x3b2
    bb189b4c 81c4d5f8 00000008 8c0cd000 00000000 nt!MmAccessFault+0x2656
    bb189b4c 8c0ccffe 00000008 8c0cd000 00000000 nt!KiTrap0E+0xdc
    bb189bec 8c0d3504 843af878 84dca310 bb189c14 afd!AfdSendMessageDispatch+0x17
    bb189bfc 81c434bc 84dca310 842ae178 842ae178 afd!AfdDispatchDeviceControl+0x3b
    bb189c14 81e44eee 843af878 842ae178 842ae254 nt!IofCallDriver+0x63
    bb189c34 81e61cd1 84dca310 843af878 00000000 nt!IopSynchronousServiceTail+0x1f8
    bb189cd0 81e644ac 84dca310 842ae178 00000000 nt!IopXxxControlFile+0x6aa
    bb189d04 81c4a42a 000004a8 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
    bb189d04 77a364f4 000004a8 00000000 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    02f8f5cc 00000000 00000000 00000000 00000000 0x77a364f4
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !afd
        8c0cd000 - afd!AfdSendMessageDispatch+19
        [ af:00 ]
        8c0cd003-8c0cd021  31 bytes - afd!AfdSendMessageDispatch+1c (+0x03)
        [ 89 75 fc 66 39 07 75 70:00 00 00 00 00 00 00 00 ]
        8c0cd024-8c0cd02d  10 bytes - afd!AfdSendMessageDispatch+3d (+0x21)
        [ c0 50 56 56 56 56 57 68:00 00 00 00 00 00 00 00 ]
        8c0cd030-8c0cd050  33 bytes - afd!AfdSendMessageDispatch+49 (+0x0c)
        [ eb 5d 8d 45 fc 50 52 53:00 00 00 00 00 00 00 00 ]
        8c0cd053-8c0cd061  15 bytes - afd!AfdSendMessageDispatch+6c (+0x23)
        [ eb 3d 33 c9 8d 47 20 41:00 00 00 00 00 00 00 00 ]
        8c0cd063 - afd!AfdSendMessageDispatch+7c (+0x10)
        [ 02:00 ]
        8c0cd066-8c0cd080  27 bytes - afd!AfdSendMessageDispatch+7f (+0x03)
        [ ff 75 fc 57 53 74 07 e8:00 00 00 00 00 00 00 00 ]
        8c0cd083-8c0cd08c  10 bytes - afd!AfdSendMessageDispatch+9c (+0x1d)
        [ c0 50 56 56 56 56 57 68:00 00 00 00 00 00 00 00 ]
        8c0cd08f-8c0cd0bd  47 bytes - afd!AfdSendMessageDispatch+a8 (+0x0c)
        [ 89 45 f8 56 e8 37 79 fe:00 00 00 00 00 00 00 00 ]
        8c0cd0bf-8c0cd0cb  13 bytes - afd!AfdTPacketsApcKernelRoutine+b (+0x30)
        [ 8b 45 18 ff 30 8b 45 14:00 00 00 00 00 00 00 00 ]
        8c0cd0cd-8c0cd0ed  33 bytes - afd!AfdTPacketsApcKernelRoutine+19 (+0x0e)
        [ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 df ]
        8c0cd0ef-8c0cd0fa  12 bytes - afd!AfdTPacketsApcRundownRoutine+1d (+0x22)
        [ 6a 01 50 ff 15 a8 12 0c:00 00 00 00 00 00 00 00 ]
        8c0cd0fc-8c0cd11f  36 bytes - afd!AfdTPacketsApcRundownRoutine+2a (+0x0d)
        [ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 00 ]
        8c0cd121-8c0cd129  9 bytes - afd!AfdComputeTpInfoSize+20 (+0x25)
        [ 83 e1 f8 8d 04 41 5d c2:00 00 00 00 00 00 00 00 ]
        8c0cd12b-8c0cd14a  32 bytes - afd!AfdComputeTpInfoSize+2a (+0x0a)
        [ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 00 ]
        8c0cd14e-8c0cd15d  16 bytes - afd!AfdMdlReadComplete+1e (+0x23)
        [ 57 53 ff 15 94 12 0c 8c:00 00 00 00 00 00 dd ba ]
        8c0cd15f-8c0cd16d  15 bytes - afd!AfdMdlReadComplete+2f (+0x11)
        [ 50 ff 15 90 10 0c 8c 8b:00 00 00 00 00 00 00 00 ]
        8c0cd170-8c0cd182  19 bytes - afd!AfdMdlReadComplete+40 (+0x11)
        [ c0 eb 75 8b 45 0c 56 8b:00 00 00 00 00 00 00 00 ]
        8c0cd184-8c0cd19a  23 bytes - afd!AfdMdlReadComplete+54 (+0x14)
        [ c6 06 03 c6 46 01 06 85:00 00 00 00 00 00 00 00 ]
        8c0cd19c-8c0cd1b0  21 bytes - afd!AfdMdlReadComplete+6c (+0x18)
        [ 89 45 0c 85 c0 75 ee 8b:00 00 00 00 00 00 00 00 ]
        8c0cd1b2-8c0cd1e4  51 bytes - afd!AfdMdlReadComplete+82 (+0x16)
        [ 8b cb 89 46 10 ff 15 b4:00 00 00 00 00 00 00 00 ]
        8c0cd1e7-8c0cd1ec  6 bytes - afd!AfdMdlReadComplete+b7 (+0x35)
        [ 5e 5f 5b 5d c2 0c:00 00 00 00 00 00 ]
        8c0cd1ee-8c0cd238  75 bytes - afd!AfdMdlReadComplete+be (+0x07)
        [ 90 90 90 90 90 0f b6 05:00 00 00 00 00 00 00 00 ]
        8c0cd23a-8c0cd294  91 bytes - afd!AfdTdiGetTpInfo+47 (+0x4c)
        [ 83 48 2c ff 8d 48 0c 89:00 00 00 00 00 00 00 00 ]
        8c0cd298-8c0cd29f  8 bytes - afd!AfdLRProcessFileMdlList+34 (+0x5e)
        [ 8b 45 f8 8b f0 83 7e 24:00 00 00 00 00 00 00 00 ]
        8c0cd2a1 - afd!AfdLRProcessFileMdlList+3d (+0x09)
        [ 8b:00 ]
        8c0cd2a3-8c0cd2c4  34 bytes - afd!AfdLRProcessFileMdlList+3f (+0x02)
        [ 8b 7e 18 89 45 f8 8d 46:00 00 00 00 00 00 00 00 ]
        8c0cd2c7-8c0cd2c8  2 bytes - afd!AfdLRProcessFileMdlList+63 (+0x24)
        [ 57 e8:00 00 ]
        8c0cd2ca-8c0cd2e4  27 bytes - afd!AfdLRProcessFileMdlList+66 (+0x03)
        [ 64 fe ff eb 51 8b 46 1c:00 00 00 00 00 00 00 00 ]
        8c0cd2e6-8c0cd2f5  16 bytes - afd!AfdLRProcessFileMdlList+82 (+0x1c)
        [ 8b 46 1c 8b 4e 24 89 48:00 00 00 00 00 00 00 00 ]
        8c0cd2f8-8c0cd307  16 bytes - afd!AfdLRProcessFileMdlList+94 (+0x12)
        [ 8d 47 20 83 c9 ff f0 0f:00 00 00 00 00 00 00 00 ]
        8c0cd30a-8c0cd322  25 bytes - afd!AfdLRProcessFileMdlList+a6 (+0x12)
        [ eb 14 8b d6 b9 60 3d 0c:00 00 00 00 00 00 00 00 ]
        8c0cd324-8c0cd336  19 bytes - afd!AfdLRProcessFileMdlList+c0 (+0x1a)
        [ 0f 85 6e ff ff ff 8a 45:00 00 00 00 00 00 00 00 ]
        8c0cd338-8c0cd352  27 bytes - afd!AfdLRProcessFileMdlList+d4 (+0x14)
        [ 90 90 90 90 90 6a 0c 68:00 00 00 00 00 00 00 00 ]
        8c0cd355-8c0cd3c4  112 bytes - afd!AfdTliGetTpInfo+18 (+0x1d)
        [ 50 e8 ae 62 fe ff 8b f0:00 00 00 00 00 00 00 00 ]
        8c0cd3c6-8c0cd400  59 bytes - afd!AfdTliGetTpInfo+89 (+0x71)
        [ 33 f6 c7 45 fc fe ff ff:00 00 00 00 00 00 00 00 ]
        8c0cd402-8c0cd404  3 bytes - afd!AfdLRMdlReadComplete+26 (+0x3c)
        [ 5d c2 04:00 00 00 ]
        8c0cd406-8c0cd446  65 bytes - afd!AfdLRMdlReadComplete+2a (+0x04)
        [ 90 90 90 90 90 8b ff 53:00 00 00 00 00 00 00 00 ]
        8c0cd448-8c0cd44f  8 bytes - afd!AfdDoMdlReadComplete+3d (+0x42)
        [ 13 0c 8c 8b 46 1c 83 20:00 00 00 00 00 00 00 00 ]
        8c0cd451-8c0cd460  16 bytes - afd!AfdDoMdlReadComplete+46 (+0x09)
        [ 8b 46 1c 8b 4e 24 89 48:00 00 00 00 00 00 00 00 ]
        8c0cd463-8c0cd472  16 bytes - afd!AfdDoMdlReadComplete+58 (+0x12)
        [ 8d 47 20 83 c9 ff f0 0f:00 00 00 00 00 00 00 00 ]
        8c0cd475-8c0cd486  18 bytes - afd!AfdDoMdlReadComplete+6a (+0x12)
        [ eb 06 56 e8 5f ff ff ff:00 00 00 00 00 00 00 00 ]
        8c0cd488-8c0cd4b1  42 bytes - afd!AfdDoMdlReadComplete+7d (+0x13)
        [ 90 90 90 90 90 8b ff 53:00 00 00 00 00 00 00 00 ]
        8c0cd4b6-8c0cd4ce  25 bytes - afd!AfdBuildPacketChain+29 (+0x2e)
        [ 50 51 51 53 83 ec 50 56:00 00 00 00 00 00 00 00 ]
        8c0cd4d3-8c0cd4d9  7 bytes - afd!AfdBuildPacketChain+46 (+0x1d)
        [ 89 65 e8 c7 45 d8 16:00 00 00 00 00 00 00 ]
        8c0cd4dc-8c0cd4df  4 bytes - afd!AfdBuildPacketChain+4f (+0x09)
        [ c0 c6 45 df:00 00 00 00 ]
        8c0cd4e1-8c0cd4f5  21 bytes - afd!AfdBuildPacketChain+54 (+0x05)
        [ 8b 73 08 8b 7e 0c 8b 46:00 00 00 00 00 00 00 00 ]
        8c0cd4f7-8c0cd4f9  3 bytes - afd!AfdBuildPacketChain+6a (+0x16)
        [ 83 65 c0:00 00 00 ]
        8c0cd4fb-8c0cd50f  21 bytes - afd!AfdBuildPacketChain+6e (+0x04)
        [ 8b 46 44 a8 40 74 45 84:00 00 00 00 00 00 00 00 ]
        8c0cd512-8c0cd51c  11 bytes - afd!AfdBuildPacketChain+85 (+0x17)
        [ 85 c0 7d 0a 83 66 44 bf:00 00 00 00 00 00 00 00 ]
    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    3815 errors : !afd (8c0cd000-8c0cdfff)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  LARGE_4096
    
    FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE_4096
    
    BUCKET_ID:  MEMORY_CORRUPTION_LARGE_4096
    
    Followup: memory_corruption
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\Minidump\071410-26906-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c4e000 PsLoadedModuleList = 0x81d96810
    Debug session time: Wed Jul 14 09:47:32.147 2010 (GMT-4)
    System Uptime: 0 days 0:19:44.834
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ......
    0: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7A, {c0540480, c0000185, 3b52bbe0, a8090000}
    
    Probably caused by : memory_corruption ( nt!MiWaitForInPageComplete+2fd )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_DATA_INPAGE_ERROR (7a)
    The requested page of kernel data could not be read in.  Typically caused by
    a bad block in the paging file or disk controller error. Also see
    KERNEL_STACK_INPAGE_ERROR.
    If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
    it means the disk subsystem has experienced a failure.
    If the error status is 0xC000009A, then it means the request failed because
    a filesystem failed to make forward progress.
    Arguments:
    Arg1: c0540480, lock type that was held (value 1,2,3, or PTE address)
    Arg2: c0000185, error status (normally i/o status code)
    Arg3: 3b52bbe0, current process (virtual address for lock type 3, or PTE)
    Arg4: a8090000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
    
    Debugging Details:
    ------------------
    
    
    ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
    
    DISK_HARDWARE_ERROR: There was error with disk hardware
    
    BUGCHECK_STR:  0x7a_c0000185
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 81d0260a to 81d2ad10
    
    STACK_TEXT:  
    89270af4 81d0260a 0000007a c0540480 c0000185 nt!KeBugCheckEx+0x1e
    89270b68 81cfa0d5 8682e80c 89270bc0 81d82540 nt!MiWaitForInPageComplete+0x2fd
    89270bfc 81cd5e3f 81d82540 a8090000 8682e778 nt!MiIssueHardFault+0x3b2
    89270c80 81c82259 00000001 a8090000 00000000 nt!MmAccessFault+0x2656
    89270d10 81c81f7a 862e6030 89270d30 00000000 nt!MiInPageSingleKernelStack+0x1cf
    89270d44 81cda003 861a94bc 89270d90 81e5c66d nt!KiInSwapKernelStacks+0x41
    89270d50 81e5c66d 00000000 96e91ef3 00000000 nt!KeSwapProcessOrStack+0x78
    89270d90 81d0e0d9 81cd9f8b 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiWaitForInPageComplete+2fd
    81d0260a cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiWaitForInPageComplete+2fd
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0x7a_c0000185_nt!MiWaitForInPageComplete+2fd
    
    BUCKET_ID:  0x7a_c0000185_nt!MiWaitForInPageComplete+2fd
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\Minidump\071410-29828-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c1d000 PsLoadedModuleList = 0x81d65810
    Debug session time: Wed Jul 14 07:41:49.118 2010 (GMT-4)
    System Uptime: 0 days 0:21:22.805
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ......
    0: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7A, {c0407e08, c0000185, ce288c0, 80fc1034}
    
    Probably caused by : CI.dll ( CI!CiValidateImageData+1d )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_DATA_INPAGE_ERROR (7a)
    The requested page of kernel data could not be read in.  Typically caused by
    a bad block in the paging file or disk controller error. Also see
    KERNEL_STACK_INPAGE_ERROR.
    If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
    it means the disk subsystem has experienced a failure.
    If the error status is 0xC000009A, then it means the request failed because
    a filesystem failed to make forward progress.
    Arguments:
    Arg1: c0407e08, lock type that was held (value 1,2,3, or PTE address)
    Arg2: c0000185, error status (normally i/o status code)
    Arg3: 0ce288c0, current process (virtual address for lock type 3, or PTE)
    Arg4: 80fc1034, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
    
    Debugging Details:
    ------------------
    
    
    ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
    
    DISK_HARDWARE_ERROR: There was error with disk hardware
    
    BUGCHECK_STR:  0x7a_c0000185
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  af2d0a80 -- (.trap 0xffffffffaf2d0a80)
    ErrCode = 00000000
    eax=ab4f3000 ebx=c055a798 ecx=00000000 edx=ffffffff esi=80fc1000 edi=83127ea0
    eip=822f0943 esp=af2d0af4 ebp=af2d0b50 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    CI!CiValidateImageData+0x1d:
    822f0943 8b4634          mov     eax,dword ptr [esi+34h] ds:0023:80fc1034=00000000
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 81cd160a to 81cf9d10
    
    STACK_TEXT:  
    af2d08dc 81cd160a 0000007a c0407e08 c0000185 nt!KeBugCheckEx+0x1e
    af2d0950 81cc90d5 84111fbc af2d09a8 81d51300 nt!MiWaitForInPageComplete+0x2fd
    af2d09e4 81ca4e3f 81d51300 80fc1034 84111f28 nt!MiIssueHardFault+0x3b2
    af2d0a68 81c635f8 00000000 80fc1034 00000000 nt!MmAccessFault+0x2656
    af2d0a68 822f0943 00000000 80fc1034 00000000 nt!KiTrap0E+0xdc
    af2d0b50 81dfc16a 80fc1000 ab4f3000 00006400 CI!CiValidateImageData+0x1d
    af2d0b68 81dfc114 80fc1000 ab4f3000 00006400 nt!SeValidateImageData+0x30
    af2d0b94 81cd142e 00000000 00006400 00000000 nt!MiValidateImagePfn+0xed
    af2d0c00 81cc90d5 86786e9c af2d0c58 86067220 nt!MiWaitForInPageComplete+0x121
    af2d0c94 81ca5428 86067220 778b7408 86786e09 nt!MiIssueHardFault+0x3b2
    af2d0d1c 81c635f8 00000000 778b7408 00000001 nt!MmAccessFault+0x2c3a
    af2d0d1c 77aaedd9 00000000 778b7408 00000001 nt!KiTrap0E+0xdc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00f5ec28 00000000 00000000 00000000 00000000 0x77aaedd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    CI!CiValidateImageData+1d
    822f0943 8b4634          mov     eax,dword ptr [esi+34h]
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  CI!CiValidateImageData+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: CI
    
    IMAGE_NAME:  CI.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bdac8
    
    FAILURE_BUCKET_ID:  0x7a_c0000185_CI!CiValidateImageData+1d
    
    BUCKET_ID:  0x7a_c0000185_CI!CiValidateImageData+1d
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start    end        module name
    880a2000 880ea000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    8c297000 8c2f1000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    8d690000 8d6a2000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8800e000 88017000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    881c5000 881ce000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    881ce000 881f1000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    8e450000 8e49d000   ATMFD    ATMFD.DLL    unavailable (00000000)
    8c86c000 8c89f280   avgldx86 avgldx86.sys Wed Feb 10 22:51:19 2010 (4B737EB7)
    8c866000 8c86b940   avgmfx86 avgmfx86.sys Sun Apr 25 17:05:02 2010 (4BD4AE7E)
    8c22b000 8c264a80   avgtdix  avgtdix.sys  Sun Apr 25 17:08:21 2010 (4BD4AF45)
    88149000 88154000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
    88426000 8842d000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8c858000 8c866000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    822a1000 822a9000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    a5e9e000 a5eb7000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    8e430000 8e44e000   cdd      cdd.dll      unavailable (00000000)
    822eb000 82396000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    8859f000 885c4000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    822a9000 822eb000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8d664000 8d667700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    88384000 883e1000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    88141000 88149000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    8d683000 8d690000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    8daa5000 8dab2000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8c840000 8c858000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    8c834000 8c840000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8858e000 8859f000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8da8c000 8daa5000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    8dab2000 8dabd000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8dac7000 8dad8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    8dabd000 8dac7000   dump_msahci dump_msahci.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8dad8000 8dae2000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    8d328000 8d3df000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:26:15 2009 (4A5BC297)
    8c8c1000 8c8fa000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    8c349000 8c373000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
    823ca000 823db000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    82396000 823ca000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    883ef000 883f8000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    8855c000 8858e000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
    88788000 887b9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    8855b000 8855b680   giveio   giveio.sys   Wed Apr 03 22:33:25 1996 (316334F5)
    8202d000 82064000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8d3df000 8d3fe000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    8da0d000 8da5d000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
    a5e19000 a5e9e000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    88553000 8855b000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    8c800000 8c818000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    8ce2b000 8d328000   igdkmd32 igdkmd32.sys Tue Jun 16 14:28:17 2009 (4A37E441)
    8d671000 8d683000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8c818000 8c825000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    81b9a000 81ba2000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8d760000 8d794000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    88371000 88384000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    8852e000 88553000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
    8db39000 8db49000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    8db04000 8db1f000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    82218000 82290000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    8dae2000 8daed000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8d657000 8d664000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    881af000 881c5000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    a5eb7000 a5ec9000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    a5ec9000 a5eec000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:14:24 2009 (4A5BBFD0)
    a5eec000 a5f27000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
    a5f27000 a5f42000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
    881f1000 881fb000   msahci   msahci.sys   Mon Jul 13 19:45:50 2009 (4A5BC72E)
    88200000 8820b000   Msfs     Msfs.SYS     unavailable (00000000)
    880f3000 880fb000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    88346000 88371000   msrpc    msrpc.sys    unavailable (00000000)
    88017000 88021000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8862f000 8863f000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    88439000 884f0000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    8d6ba000 8d6c5000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    8db8f000 8db9f000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
    8d6c5000 8d6e7000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    8d7e6000 8d7f7000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    8c328000 8c336000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    8c265000 8c297000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    884f0000 8852e000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    8c8fa000 8c983000   netr28   netr28.sys   Wed Feb 25 21:56:57 2009 (49A604F9)
    a5f5a000 a5f69000   npf      npf.sys      Tue Oct 20 13:57:28 2009 (4ADDFA08)
    82200000 8220e000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    8820b000 88215000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    81c1d000 8202d000   nt       ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
    88217000 88346000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    8841f000 88426000   Null     Null.SYS     unavailable (00000000)
    8db49000 8db8f000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
    8c2f8000 8c317000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    88130000 88141000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    880fb000 88125000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    88000000 8800e000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    883e1000 883ef000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    a5f69000 a6000000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    8da5d000 8da8c000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    82290000 822a1000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    a94c9000 a94d5000   pssdk42  pssdk42.sys  Tue Jun 23 08:14:40 2009 (4A40C730)
    8d6a2000 8d6ba000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    8d6e7000 8d6ff000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    8d6ff000 8d716000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8d716000 8d72d000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8c3bf000 8c400000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    8840d000 88415000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    88415000 8841d000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    885f7000 885ff000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    88602000 8862f000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    a5e00000 a5e0f000   RHDISK   RHDISK.SYS   Fri Jul 24 03:43:27 2009 (4A69661F)
    8db9f000 8dbb2000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    8ce00000 8ce25000   Rt86win7 Rt86win7.sys Thu Feb 26 04:04:22 2009 (49A65B16)
    8c3b1000 8c3be880   SCDEmu   SCDEmu.SYS   Sun Jul 26 22:43:19 2009 (4A6D1447)
    a5e0f000 a5e19000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    88600000 88601480   speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
    887f8000 88800000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    a9478000 a94c9000   srv      srv.sys      Mon Jul 13 19:15:10 2009 (4A5BBFFE)
    a9429000 a9478000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
    8dbbb000 8dbdc000   srvnet   srvnet.sys   Mon Jul 13 19:14:45 2009 (4A5BBFE5)
    8d75e000 8d75f380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8d61b000 8d654b00   SynTP    SynTP.sys    Thu Feb 18 22:35:08 2010 (4B7E06EC)
    8863f000 88788000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
    a5f42000 a5f4f000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8c220000 8c22b000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    8c209000 8c220000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    8c3a1000 8c3b1000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    8e400000 8e409000   TSDDD    TSDDD.dll    unavailable (00000000)
    8c8a0000 8c8c1000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    8d794000 8d7a2000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    8d655000 8d656700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8c9e3000 8c9f2000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8d7a2000 8d7e6000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    8c998000 8c9e3000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    8daed000 8db04000   USBSTOR  USBSTOR.SYS  Mon Jul 13 19:51:19 2009 (4A5BC877)
    8c98d000 8c998000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    8c37f000 8c3a0480   VBoxDrv  VBoxDrv.sys  Fri Jun 25 10:01:13 2010 (4C24B6A9)
    8d72d000 8d743e80   VBoxNetAdp VBoxNetAdp.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
    8d744000 8d75d8c0   VBoxNetFlt VBoxNetFlt.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
    8c376000 8c37e9c0   VBoxUSBMon VBoxUSBMon.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
    8c373000 8c375180   VCdRom   VCdRom.sys   Wed Dec 19 14:44:58 2001 (3C20EE3A)
    88125000 88130000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    8842d000 88439000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    823db000 823fc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    88154000 88164000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    88164000 881af000   volmgrx  volmgrx.sys  unavailable (00000000)
    887b9000 887f8000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    8c983000 8c98d000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
    8c317000 8c328000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
    8dbb2000 8dbbb000   vwifimp  vwifimp.sys  Mon Jul 13 19:52:09 2009 (4A5BC8A9)
    8c336000 8c349000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    88400000 8840d000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    88023000 88094000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    88094000 880a2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8c2f1000 8c2f8000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    8e5a0000 8e7ea000   win32k   win32k.sys   unavailable (00000000)
    8d668000 8d671000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:19:16 2009 (4A5BC0F4)
    880ea000 880f3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    8db1f000 8db39000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    a94d5000 a94f5480   WUDFRd   WUDFRd.sys   Mon Jul 13 19:50:44 2009 (4A5BC854)
    
    Unloaded modules:
    a5f42000 a5f5a000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    885c4000 885d1000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    885d1000 885dc000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    885dc000 885e6000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    885e6000 885f7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    88400000 8841f000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    Let's begin by testing your RAM. Download a copy of Memtest86+ - Advanced Memory Diagnostic Tool and burn the ISO to a CD using http://isorecorder.alexfeinman.com/W7. Boot from the CD, and leave it running for at least 7 passes.

    If Memtest checks back clean after 7+ passes, follow these instructions for enabling driver verifier: Using Driver Verifier to identify issues with Drivers
    Please follow these instructions in order to run it:

    Using Driver Verifier is an iffy proposition. Most times it'll crash and it'll tell you what the driver is. But sometimes it'll crash and won't tell you the driver. Other times it'll crash before you can log in to Windows. If you can't get to Safe Mode, then you'll have to resort to offline editing of the registry to disable Driver Verifier.

    So, I'd suggest that you first backup your stuff and then make sure you've got access to another computer so you can contact us if problems arise. Then make a System Restore point (so you can restore the system using the Vista/Windows 7 Startup Repair feature).

    Then, here's the procedure:
    - Go to Start and type in "verifier" (without the quotes) and press Enter
    - Select "Create custom settings (for code developers)" and click "Next"
    - Select "Select individual settings from a full list" and click "Next"
    - Select everything EXCEPT FOR "Low Resource Simulation" and click "Next"
    - Select "Select driver names from a list" and click "Next"
    Then select all drivers NOT provided by Microsoft and click "Next"
    - Select "Finish" on the next page.

    Reboot the system and wait for it to crash to the Blue Screen. Continue to use your system normally, and if you know what causes the crash, do that repeatedly. The objective here is to get the system to crash because Driver Verifier is stressing the drivers out. If it doesn't crash for you, then let it run for at least 36 hours of continuous operation (an estimate on my part).

    Reboot into Windows (after the crash) and turn off Driver Verifier by going back in and selecting "Delete existing settings" on the first page, then locate and zip up the memory dump file and upload it with your next post.
    .


    If you have any questions, please post and ask them.

    I also suggest that for the purposes of troubleshooting, you uninstall AVG using this uninstall tool >
    Info > Tool (32bit) - Tool (64 bit) If you have AVG Indentity Protection installed, uninstall it also using this removal tool >Info > Tool

    Download and install Microsoft Security Essentials for trouble shooting.

    Last edited by CarlTR6; 14 Jul 2010 at 10:32.
      My Computer


  3. Posts : 1,360
    win7 ultimate / virtual box
       #3

    I hope you don't mind carl but i ran the .dmp's and i think they are corrupted as they simply halt at loading symbols ?

    at this point ezza i suggest view your reliability history by typing reliability into your search bar accessed from the start orb and then look at the red crosses that will have started appearing related to the crashes ?

    this is either going to be a driver or piece of software causing the problem or you have a hardware fault (such as a new USB device?) ?
    Last edited by ickymay; 15 Jul 2010 at 04:12.
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    No, I certainly don't mind. I also notice the corruption. But they partly came through for me. I appreciate your help.

    ezza, I found two very old drivers on your system and several more older ones. Win 7 does not like older drivers. They can and do cause conflicts. I recommend that you update the two drivers in red font or uninstall the software/devices they are associated with.

    giveio.sys Wed Apr 03 22:33:25 1996
    igdkmd32.sys Tue Jun 16 14:28:17 2009
    netr28.sys Wed Feb 25 21:56:57 2009
    pssdk42.sys Tue Jun 23 08:14:40 2009
    VCdRom.sys Wed Dec 19 14:44:58 2001

    giveio.sys belongs to the software giveio or ADC Analyzer or SwiftForth or Disspy by unknown. This software is way obsolete. I recommend that you uninstall it.

    VCdRom.sys is a driver for Virtual CD-ROMs belongs to the software Virtual CD-ROM Device Driver by Microsoft Corporation (www.microsoft.com). See if you can update this through Device Manger or from Microsoft.

    pssdk42.sys appears to be associated with the software Packet Sniffer SDK here are a couple of links you can check out -
    SoftPerfect Research Forum :: NetWorx :: Why pssdk42.sys?

    Packet Sniffer SDK: gigabit compatible sniffer/packet analyzer driver for Windows I recommend that you uninstall this program.

    netr28.sys is your wireless adapter driver - Ralink 802.11 Wireless Adapter Driver - Ralink 802.11n Wireless Adapters - Ralink Technology, Corp

    igdkmd32.sys is related to the Intel Graphics Accelerator Drivers for Windows.
    Last edited by CarlTR6; 14 Jul 2010 at 11:02.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 18:21.
Find Us