Did I post correctly? I'm suprised I haven't gotten a reply.
Attached is a new BSOD from today.
This one was caused by memory management and old driver.
I would
1- run memtest
Download a copy of Memtest86 and burn the ISO to a CD using Iso Recorder or another ISO burning program. Boot from the CD, and leave it running for at least 5 or 6 passes.
Just remember, any time Memtest reports errors, it can be either bad RAM or a bad motherboard slot. Test the sticks individually, and if you find a good one, test it in all slots.
2-Update the drivers listed below
How To Find Drivers:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
Let us know if you need further assistance
Ken J
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\102010-18470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02809000 PsLoadedModuleList = 0xfffff800`02a46e50
Debug session time: Wed Oct 20 13:10:09.983 2010 (GMT-4)
System Uptime: 0 days 18:23:06.058
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {8884, fffffa800015b220, fffffa800015b910, 503}
Probably caused by : memory_corruption ( nt!MiRelinkStandbyPage+c6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa800015b220
Arg3: fffffa800015b910
Arg4: 0000000000000503
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002927e56 to fffff80002879740
STACK_TEXT:
fffff880`05c6b8b8 fffff800`02927e56 : 00000000`0000001a 00000000`00008884 fffffa80`0015b220 fffffa80`0015b910 : nt!KeBugCheckEx
fffff880`05c6b8c0 fffff800`02986675 : fffffa80`0490d498 fffffa80`049ac000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`05c6b930 fffff800`02c8b504 : fffffa80`0490c000 fffff880`05c6bca0 fffff880`05c6ba08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`05c6b980 fffff800`02cec22a : 00000000`00000020 00000000`00000000 fffffa80`0490c000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`05c6b9d0 fffff800`02cf096e : 00000000`00000000 00000000`0169b808 00000000`0000004f fffff880`03f5a701 : nt!PfSetSuperfetchInformation+0x199
fffff880`05c6bab0 fffff800`02878993 : fffffa80`062d6760 00000000`0312b770 fffffa80`0411f600 00000000`00008a34 : nt!NtSetSystemInformation+0xb91
fffff880`05c6bc20 00000000`7733144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0169b758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733144a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`02927e56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa800015b220
Arg3: fffffa800015b910
Arg4: 0000000000000503
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002927e56 to fffff80002879740
STACK_TEXT:
fffff880`05c6b8b8 fffff800`02927e56 : 00000000`0000001a 00000000`00008884 fffffa80`0015b220 fffffa80`0015b910 : nt!KeBugCheckEx
fffff880`05c6b8c0 fffff800`02986675 : fffffa80`0490d498 fffffa80`049ac000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`05c6b930 fffff800`02c8b504 : fffffa80`0490c000 fffff880`05c6bca0 fffff880`05c6ba08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`05c6b980 fffff800`02cec22a : 00000000`00000020 00000000`00000000 fffffa80`0490c000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`05c6b9d0 fffff800`02cf096e : 00000000`00000000 00000000`0169b808 00000000`0000004f fffff880`03f5a701 : nt!PfSetSuperfetchInformation+0x199
fffff880`05c6bab0 fffff800`02878993 : fffffa80`062d6760 00000000`0312b770 fffffa80`0411f600 00000000`00008a34 : nt!NtSetSystemInformation+0xb91
fffff880`05c6bc20 00000000`7733144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0169b758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733144a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`02927e56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa800015b220
Arg3: fffffa800015b910
Arg4: 0000000000000503
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002927e56 to fffff80002879740
STACK_TEXT:
fffff880`05c6b8b8 fffff800`02927e56 : 00000000`0000001a 00000000`00008884 fffffa80`0015b220 fffffa80`0015b910 : nt!KeBugCheckEx
fffff880`05c6b8c0 fffff800`02986675 : fffffa80`0490d498 fffffa80`049ac000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`05c6b930 fffff800`02c8b504 : fffffa80`0490c000 fffff880`05c6bca0 fffff880`05c6ba08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`05c6b980 fffff800`02cec22a : 00000000`00000020 00000000`00000000 fffffa80`0490c000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`05c6b9d0 fffff800`02cf096e : 00000000`00000000 00000000`0169b808 00000000`0000004f fffff880`03f5a701 : nt!PfSetSuperfetchInformation+0x199
fffff880`05c6bab0 fffff800`02878993 : fffffa80`062d6760 00000000`0312b770 fffffa80`0411f600 00000000`00008a34 : nt!NtSetSystemInformation+0xb91
fffff880`05c6bc20 00000000`7733144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0169b758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733144a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`02927e56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------
Old drivers
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\102010-18470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02809000 PsLoadedModuleList = 0xfffff800`02a46e50
Debug session time: Wed Oct 20 13:10:09.983 2010 (GMT-4)
System Uptime: 0 days 18:23:06.058
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {8884, fffffa800015b220, fffffa800015b910, 503}
Probably caused by : memory_corruption ( nt!MiRelinkStandbyPage+c6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa800015b220
Arg3: fffffa800015b910
Arg4: 0000000000000503
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002927e56 to fffff80002879740
STACK_TEXT:
fffff880`05c6b8b8 fffff800`02927e56 : 00000000`0000001a 00000000`00008884 fffffa80`0015b220 fffffa80`0015b910 : nt!KeBugCheckEx
fffff880`05c6b8c0 fffff800`02986675 : fffffa80`0490d498 fffffa80`049ac000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`05c6b930 fffff800`02c8b504 : fffffa80`0490c000 fffff880`05c6bca0 fffff880`05c6ba08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`05c6b980 fffff800`02cec22a : 00000000`00000020 00000000`00000000 fffffa80`0490c000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`05c6b9d0 fffff800`02cf096e : 00000000`00000000 00000000`0169b808 00000000`0000004f fffff880`03f5a701 : nt!PfSetSuperfetchInformation+0x199
fffff880`05c6bab0 fffff800`02878993 : fffffa80`062d6760 00000000`0312b770 fffffa80`0411f600 00000000`00008a34 : nt!NtSetSystemInformation+0xb91
fffff880`05c6bc20 00000000`7733144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0169b758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733144a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`02927e56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa800015b220
Arg3: fffffa800015b910
Arg4: 0000000000000503
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002927e56 to fffff80002879740
STACK_TEXT:
fffff880`05c6b8b8 fffff800`02927e56 : 00000000`0000001a 00000000`00008884 fffffa80`0015b220 fffffa80`0015b910 : nt!KeBugCheckEx
fffff880`05c6b8c0 fffff800`02986675 : fffffa80`0490d498 fffffa80`049ac000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`05c6b930 fffff800`02c8b504 : fffffa80`0490c000 fffff880`05c6bca0 fffff880`05c6ba08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`05c6b980 fffff800`02cec22a : 00000000`00000020 00000000`00000000 fffffa80`0490c000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`05c6b9d0 fffff800`02cf096e : 00000000`00000000 00000000`0169b808 00000000`0000004f fffff880`03f5a701 : nt!PfSetSuperfetchInformation+0x199
fffff880`05c6bab0 fffff800`02878993 : fffffa80`062d6760 00000000`0312b770 fffffa80`0411f600 00000000`00008a34 : nt!NtSetSystemInformation+0xb91
fffff880`05c6bc20 00000000`7733144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0169b758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733144a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`02927e56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa800015b220
Arg3: fffffa800015b910
Arg4: 0000000000000503
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002927e56 to fffff80002879740
STACK_TEXT:
fffff880`05c6b8b8 fffff800`02927e56 : 00000000`0000001a 00000000`00008884 fffffa80`0015b220 fffffa80`0015b910 : nt!KeBugCheckEx
fffff880`05c6b8c0 fffff800`02986675 : fffffa80`0490d498 fffffa80`049ac000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`05c6b930 fffff800`02c8b504 : fffffa80`0490c000 fffff880`05c6bca0 fffff880`05c6ba08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`05c6b980 fffff800`02cec22a : 00000000`00000020 00000000`00000000 fffffa80`0490c000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`05c6b9d0 fffff800`02cf096e : 00000000`00000000 00000000`0169b808 00000000`0000004f fffff880`03f5a701 : nt!PfSetSuperfetchInformation+0x199
fffff880`05c6bab0 fffff800`02878993 : fffffa80`062d6760 00000000`0312b770 fffffa80`0411f600 00000000`00008a34 : nt!NtSetSystemInformation+0xb91
fffff880`05c6bc20 00000000`7733144a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0169b758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733144a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`02927e56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------