I see that you successfully updated the Logitech drivers. Very good. Your RTKVHD64.sys driver is up to date. The 0.0000005 error code means memory corruption. One of the two Driver Verifier enabled dumps contained no data; it is corrupt. Make sure Driver Verifier is turned off for now.
Run Memtest again from a cold boot after your computer has been off for at least two hours. RAM - Test with Memtest86+. I want to be as certain as we can be (Memtest is not perfect) that RAM is not causing the problem. Post your results.
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03059000 PsLoadedModuleList = 0xfffff800`03296e50
Debug session time: Sat Dec 11 14:10:18.711 2010 (GMT-5)
System Uptime: 0 days 0:00:25.428
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D5, {fffff98002e08d60, 0, fffff8800691cef6, 0}
Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTKVHD64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
Could not read faulting driver name
Probably caused by : RTKVHD64.sys ( RTKVHD64+d9ef6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff98002e08d60, memory referenced
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
Arg3: fffff8800691cef6, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033010e0
fffff98002e08d60
FAULTING_IP:
RTKVHD64+d9ef6
fffff880`0691cef6 8b4630 mov eax,dword ptr [rsi+30h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD5
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003cc82b0 -- (.trap 0xfffff88003cc82b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003cc84d8
rdx=fffff88003cc8440 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800691cef6 rsp=fffff88003cc8440 rbp=0000000000000002
r8=0000000000000000 r9=fffff8800691cef6 r10=0000000000000000
r11=fffff80003243e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
RTKVHD64+0xd9ef6:
fffff880`0691cef6 8b4630 mov eax,dword ptr [rsi+30h] ds:3e80:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003149f14 to fffff800030c9740
STACK_TEXT:
fffff880`03cc8148 fffff800`03149f14 : 00000000`00000050 fffff980`02e08d60 00000000`00000000 fffff880`03cc82b0 : nt!KeBugCheckEx
fffff880`03cc8150 fffff800`030c782e : 00000000`00000000 fffff8a0`0140910c fffffa80`07038000 fffff800`030fc33f : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`03cc82b0 fffff880`0691cef6 : fffff880`03cc84d8 00000000`00000000 fffff8a0`0140910c fffffa80`06d0ef40 : nt!KiPageFault+0x16e
fffff880`03cc8440 fffff880`03cc84d8 : 00000000`00000000 fffff8a0`0140910c fffffa80`06d0ef40 00000000`00000000 : RTKVHD64+0xd9ef6
fffff880`03cc8448 00000000`00000000 : fffff8a0`0140910c fffffa80`06d0ef40 00000000`00000000 fffff800`00000000 : 0xfffff880`03cc84d8
STACK_COMMAND: kb
FOLLOWUP_IP:
RTKVHD64+d9ef6
fffff880`0691cef6 8b4630 mov eax,dword ptr [rsi+30h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: RTKVHD64+d9ef6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RTKVHD64
IMAGE_NAME: RTKVHD64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c80ab93
FAILURE_BUCKET_ID: X64_0xD5_VRF_RTKVHD64+d9ef6
BUCKET_ID: X64_0xD5_VRF_RTKVHD64+d9ef6
Followup: MachineOwner
---------