Random BSOD Ntoskrnl+6846e And atikmdag.sys+62070


  1. Posts : 8
    Windows 7 64 Bit
       #1

    Random BSOD Ntoskrnl+6846e And atikmdag.sys+62070


    Hey, So I built this computer a little over a year ago and for the past few months i've been getting a few random BSOD's...

    They seem to normally happen when I am playing games however have happened while watching videos...Doesn't seem to happen when Being Idle.

    I am running Win 7 64 Bit.
    AMD Raedon HD 5770

    MSI Mother Board
    6gig ram
    AMD Phenom Quad core.

    I've attached the System Health Report and I think my dump files? Basically followed the instructions on the BSOD posting rules. If you guys need anymore information just ask!

    And Thank you so much!
      My Computer


  2. Posts : 8
    Windows 7 64 Bit
    Thread Starter
       #2

    Just incase the dumps aren't in that zip here are the last 4 dumps over the last 5 days.
      My Computer


  3. Posts : 11,269
    Windows 7 Home Premium 64 Bit
       #3

    Code:
    1. Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010112-15000-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03048e50 Debug session time: Sun Jan 1 07:19:05.326 2012 (UTC - 7:00) System Uptime: 0 days 13:16:34.561 Loading Kernel Symbols ............................................................... ................................................................ ............ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {0, 0, 0, 0} Probably caused by : hardware ( USBPORT!USBPORT_SetMiniDumpData+20 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP: +3536306261323662 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0 BUGCHECK_STR: 0x1E_0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff88002ffc868 -- (.exr 0xfffff88002ffc868) ExceptionAddress: fffff88003e823a4 (USBPORT!USBPORT_SetMiniDumpData+0x0000000000000020) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 TRAP_FRAME: fffff88002ffc910 -- (.trap 0xfffff88002ffc910) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa80069c61a1 rbx=0000000000000000 rcx=fffffa80069c6050 rdx=00000000000003d8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88003e823a4 rsp=fffff88002ffcaa8 rbp=0000000000000008 r8=fffffa8005f94900 r9=0000000000000000 r10=00000000ffffffff r11=fffffa80069c61a0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc USBPORT!USBPORT_SetMiniDumpData+0x20: fffff880`03e823a4 f08b17 lock mov edx,dword ptr [rdi] ds:4900:00000000`00000000=???????? Resetting default scope MISALIGNED_IP: USBPORT!USBPORT_SetMiniDumpData+20 fffff880`03e823a4 f08b17 lock mov edx,dword ptr [rdi] LAST_CONTROL_TRANSFER: from fffff80002e7346e to fffff80002e7b710 STACK_TEXT: fffff880`02ffb958 fffff800`02e7346e : 00000000`00000000 fffff880`00000000 fffff880`02ffc0d0 fffff800`02ea8668 : nt!KeBugCheck fffff880`02ffb960 fffff800`02ea140d : fffff800`03089b7c fffff800`02fc3e84 fffff800`02e0b000 fffff880`02ffc868 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`02ffb990 fffff800`02ea8a90 : fffff800`02fcab14 fffff880`02ffba08 fffff880`02ffc868 fffff800`02e0b000 : nt!RtlpExecuteHandlerForException+0xd fffff880`02ffb9c0 fffff800`02eb59ef : fffff880`02ffc868 fffff880`02ffc0d0 fffff880`00000000 fffffa80`069c6050 : nt!RtlDispatchException+0x410 fffff880`02ffc0a0 fffff800`02e7ad82 : fffff880`02ffc868 fffffa80`05f94900 fffff880`02ffc910 fffffa80`069c6050 : nt!KiDispatchException+0x16f fffff880`02ffc730 fffff800`02e78edf : fffff880`02ffc910 fffff880`03e7e002 fffffa80`069c7500 fffff880`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`02ffc910 fffff880`03e823a4 : ffffffff`8b40798b 00000000`ffffff01 fffff880`03e7954a fffffa80`069c6050 : nt!KiInvalidOpcodeFault+0x11f fffff880`02ffcaa8 fffffa80`069c6050 : fffff880`03e7f46f fffffa80`05f94900 00000000`00000008 fffffa80`069c6050 : USBPORT!USBPORT_SetMiniDumpData+0x20 fffff880`02ffcae8 fffff880`03e7f46f : fffffa80`05f94900 00000000`00000008 fffffa80`069c6050 fffffa80`075f3af0 : 0xfffffa80`069c6050 fffff880`02ffcaf0 fffff880`03e7af03 : fffffa80`069c61a0 fffffa80`069c6050 fffffa80`05f94900 fffffa80`069c61a0 : USBPORT!USBPORT_Core_RecordOcaTransferData+0x5b fffff880`02ffcb20 fffff880`03e7bab7 : fffffa80`05f94902 fffffa80`069688b0 00000000`ffffffff fffffa80`069c6ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x33f fffff880`02ffcc00 fffff880`03e7964f : fffffa80`069c6ea8 fffffa80`069c61a0 fffffa80`069c7040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7 fffff880`02ffcc60 fffff880`03e6af89 : fffffa80`069c6050 00000000`00000000 fffffa80`069c6e02 fffffa80`069c6ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3 fffff880`02ffcca0 fffff800`02e86bfc : fffff880`02fd4180 fffffa80`069c6ea8 fffffa80`069c6ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9 fffff880`02ffccd0 fffff800`02e83eea : fffff880`02fd4180 fffff880`02fdefc0 00000000`00000000 fffff880`03e6adb0 : nt!KiRetireDpcList+0x1bc fffff880`02ffcd80 00000000`00000000 : fffff880`02ffd000 fffff880`02ff7000 fffff880`02ffcd40 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: USBPORT!USBPORT_SetMiniDumpData+20 fffff880`03e823a4 f08b17 lock mov edx,dword ptr [rdi] SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: USBPORT!USBPORT_SetMiniDumpData+20 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: hardware FAILURE_BUCKET_ID: X64_IP_MISALIGNED BUCKET_ID: X64_IP_MISALIGNED Followup: MachineOwner ---------
    2. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010312-13671-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e07000 PsLoadedModuleList = 0xfffff800`03044e50 Debug session time: Tue Jan 3 05:26:39.835 2012 (UTC - 7:00) System Uptime: 0 days 10:42:50.070 Loading Kernel Symbols ............................................................... ................................................................ ............ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {ffffffff, 2, 1, fffff80002e82bdf} Probably caused by : memory_corruption Followup: memory_corruption --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000ffffffff, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002e82bdf, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af0e0 00000000ffffffff CURRENT_IRQL: 2 FAULTING_IP: nt!KiRetireDpcList+19f fffff800`02e82bdf ff00 inc dword ptr [rax] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: vlc.exe TRAP_FRAME: fffff880009b0d70 -- (.trap 0xfffff880009b0d70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000ffffffff rbx=0000000000000000 rcx=fffff88002fd6300 rdx=fffff88002fd89f0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002e82bdf rsp=fffff880009b0f00 rbp=fffff88002fd4180 r8=0000000000000000 r9=0000000000000000 r10=fffffa800541a990 r11=0000000000000246 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiRetireDpcList+0x19f: fffff800`02e82bdf ff00 inc dword ptr [rax] ds:00ff:00000000`ffffffff=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002e76ca9 to fffff80002e77740 STACK_TEXT: fffff880`009b0c28 fffff800`02e76ca9 : 00000000`0000000a 00000000`ffffffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`009b0c30 fffff800`02e75920 : 000000b5`000000a9 fffff880`02fd4180 00000000`00000202 fffff800`02e7c1fa : nt!KiBugCheckDispatch+0x69 fffff880`009b0d70 fffff800`02e82bdf : fffffa80`06bdacc1 fffffa80`0025aa84 fffffa80`06bd4000 00000000`00000084 : nt!KiPageFault+0x260 fffff880`009b0f00 fffff800`02e7d865 : 000004d8`00000000 fffffa80`0541a990 00000000`00000000 fffff800`02f97da0 : nt!KiRetireDpcList+0x19f fffff880`009b0fb0 fffff800`02e7d67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5 fffff880`08ae3bf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff80002e820f8-fffff80002e820ff 8 bytes - nt!KeRemoveQueueEx+158 [ 5f 5e 5d c3 4d 85 c9 74:a0 c9 e4 02 00 f8 ff ff ] fffff80002e82120-fffff80002e82135 22 bytes - nt!KeRemoveQueueEx+180 (+0x28) [ 00 00 83 67 4c df 8b 47:40 22 e8 02 00 f8 ff ff ] fffff80002e82137-fffff80002e8213b 5 bytes - nt!KeRemoveQueueEx+197 (+0x17) [ 0f 85 8f 01 00:ff 00 2a e8 02 ] fffff80002e8213d-fffff80002e82143 7 bytes - nt!KeRemoveQueueEx+19d (+0x06) [ f0 48 0f ba af 88 00:f8 ff ff a0 21 e8 02 ] fffff80002e82145-fffff80002e8214b 7 bytes - nt!KeRemoveQueueEx+1a5 (+0x08) [ 00 00 0f 82 db 05 00:f8 ff ff 00 2a e8 02 ] fffff80002e8214d-fffff80002e8214f 3 bytes - nt!KeRemoveQueueEx+1ad (+0x08) [ 40 38 6f:f8 ff ff ] fffff80002e82160-fffff80002e8216e 15 bytes - nt!KeRemoveQueueEx+1c0 (+0x13) [ ff 0f 85 70 01 00 00 44:40 22 e8 02 00 f8 ff ff ] fffff80002e82170-fffff80002e82182 19 bytes - nt!KeRemoveQueueEx+1d0 (+0x10) [ 00 c6 87 64 01 00 00 05:80 2a e8 02 00 f8 ff ff ] fffff80002e82185-fffff80002e82188 4 bytes - nt!KeRemoveQueueEx+1e5 (+0x15) [ 00 0f a1 20:f8 ff ff 00 ] fffff80002e82190 - nt!KeRemoveQueueEx+1f0 (+0x0b) [ 89:c3 ] fffff80002e821a0-fffff80002e821ab 12 bytes - nt!KeRemoveQueueEx+200 (+0x10) [ 8b c1 48 c1 e8 20 85 c0:bb 7d f1 02 00 f8 ff ff ] fffff80002e821ad-fffff80002e821bd 17 bytes - nt!KeRemoveQueueEx+20d (+0x0d) [ 00 80 a7 c1 00 00 00 fe:f8 ff ff 40 22 e8 02 00 ] fffff80002e821bf-fffff80002e821cf 17 bytes - nt!KeRemoveQueueEx+21f (+0x12) [ 48 8b 10 48 8b 05 17 d5:ff bb 7d f1 02 00 f8 ff ] fffff80002e821d1-fffff80002e821d8 8 bytes - nt!KeRemoveQueueEx+231 (+0x12) [ 00 00 0f b6 0d 25 cf 22:8b b4 24 b8 00 00 00 1f ] fffff80002e821da-fffff80002e821eb 18 bytes - nt!KeRemoveQueueEx+23a (+0x09) [ 48 f7 e2 48 d3 ea 0f b6:10 00 00 00 00 00 40 22 ] fffff80002e821ed-fffff80002e82230 68 bytes - nt!KeRemoveQueueEx+24d (+0x13) [ 48 8b 9f d8 00 00 00 8b:00 00 c6 80 2a e8 02 00 ] fffff80002e82270-fffff80002e8227a 11 bytes - nt!KeRemoveQueueEx+2d0 (+0x83) [ 48 8d 4e 08 49 89 45 08:1f 00 10 00 80 1f 00 00 ] fffff80002e8227c-fffff80002e822a5 42 bytes - nt!KeRemoveQueueEx+2dc (+0x0c) [ 4c 89 28 4c 89 69 08 f0:2b 00 53 00 2b 00 18 00 ] fffff80002e822a8-fffff80002e822a9 2 bytes - nt!KeRemoveQueueEx+308 (+0x2c) [ 48 3d:00 00 ] fffff80002e822ab - nt!KeRemoveQueueEx+30b (+0x03) [ 01:00 ] fffff80002e822ae-fffff80002e822b0 3 bytes - nt!KeRemoveQueueEx+30e (+0x03) [ 0f 84 e3:00 00 00 ] fffff80002e822b4-fffff80002e822d5 34 bytes - nt!KeRemoveQueueEx+314 (+0x06) [ 4c 8b d8 48 8b 84 24 d0:00 00 00 00 20 fb ee 05 ] fffff80002e822d7-fffff80002e822f0 26 bytes - nt!KeRemoveQueueEx+337 (+0x23) [ 49 0f be c6 40 38 6c 38:ff 14 2c e8 02 00 f8 ff ] fffff80002e822f2-fffff80002e822f5 4 bytes - nt!KeRemoveQueueEx+352 (+0x1b) [ 0f 85 47 02:bd 01 00 00 ] fffff80002e822f7-fffff80002e82305 15 bytes - nt!KeRemoveQueueEx+357 (+0x05) [ 00 40 38 6f 4a 0f 84 6f:c6 00 00 00 00 00 00 00 ] fffff80002e82307-fffff80002e82331 43 bytes - nt!KeRemoveQueueEx+367 (+0x10) [ 8b 46 28 3b 46 2c 0f 83:00 fb ff ff ff ff ff ff ] fffff80002e82333-fffff80002e8233f 13 bytes - nt!KeRemoveQueueEx+393 (+0x2c) [ f0 81 26 7f ff ff ff 44:00 00 00 00 00 bb 7d f1 ] fffff80002e82358-fffff80002e8235b 4 bytes - nt!KeRemoveQueueEx+3b8 (+0x25) [ 00 0f 85 c9:80 1f 00 00 ] fffff80002e823e0-fffff80002e823e6 7 bytes - nt!KeRemoveQueueEx+440 (+0x88) [ ff c3 85 1d e4 ce 22:00 00 00 00 00 00 00 ] fffff80002e823e8-fffff80002e823ec 5 bytes - nt!KeRemoveQueueEx+448 (+0x08) [ 0f 84 98 66 07:00 00 00 00 00 ] fffff80002e823ee-fffff80002e823fe 17 bytes - nt!KeRemoveQueueEx+44e (+0x06) [ f3 90 8b 06 84 c0 78 ea:00 00 00 00 00 00 00 00 ] fffff80002e82402-fffff80002e8240c 11 bytes - nt!KeRemoveQueueEx+462 (+0x14) [ e9 2a fc ff ff f0 48 0f:00 00 00 00 00 00 00 00 ] fffff80002e8240e-fffff80002e82411 4 bytes - nt!KeRemoveQueueEx+46e (+0x0c) [ 0f 82 0c 02:00 00 00 00 ] fffff80002e82414-fffff80002e8243c 41 bytes - nt!KeRemoveQueueEx+474 (+0x06) [ 4c 8b 6e 10 48 89 6e 10:00 00 00 00 00 00 00 00 ] fffff80002e8243f-fffff80002e82450 18 bytes - nt!KeRemoveQueueEx+49f (+0x2b) [ 48 03 c2 48 89 45 18 0f:00 00 00 00 00 00 00 00 ] fffff80002e82452-fffff80002e82456 5 bytes - nt!KeRemoveQueueEx+4b2 (+0x13) [ 4c 89 b6 40 47:00 00 00 00 00 ] fffff80002e82459-fffff80002e82462 10 bytes - nt!KeRemoveQueueEx+4b9 (+0x07) [ fb 4c 89 6e 08 41 c6 85:00 00 00 00 00 00 00 00 ] fffff80002e82465-fffff80002e82471 13 bytes - nt!KeRemoveQueueEx+4c5 (+0x0c) [ 02 48 8b d6 49 8b cc 41:00 00 00 00 00 00 00 00 ] fffff80002e82474-fffff80002e82485 18 bytes - nt!KeRemoveQueueEx+4d4 (+0x0f) [ 20 e8 66 db ff ff 49 8b:00 00 00 00 00 00 00 00 ] fffff80002e82488-fffff80002e82498 17 bytes - nt!KeRemoveQueueEx+4e8 (+0x14) [ e8 d3 b0 ff ff 84 c0 0f:00 00 00 00 00 00 00 00 ] fffff80002e8249a-fffff80002e8249e 5 bytes - nt!KeRemoveQueueEx+4fa (+0x12) [ 44 8b ed 0f 1f:00 00 00 00 00 ] fffff80002e824a0-fffff80002e824a8 9 bytes - nt!KeRemoveQueueEx+500 (+0x06) [ 41 ff c5 44 85 2d 22 ce:00 00 00 00 00 00 00 00 ] fffff80002e824aa-fffff80002e824ae 5 bytes - nt!KeRemoveQueueEx+50a (+0x0a) [ 0f 84 09 6a 07:00 00 00 00 00 ] fffff80002e824b0-fffff80002e824c3 20 bytes - nt!KeRemoveQueueEx+510 (+0x06) [ f3 90 8b 06 84 c0 78 e8:00 00 00 00 00 00 00 00 ] fffff80002e824c6-fffff80002e824c8 3 bytes - nt!KeRemoveQueueEx+526 (+0x16) [ 41 ba 80:00 00 00 ] fffff80002e824cc-fffff80002e824d8 13 bytes - nt!KeRemoveQueueEx+52c (+0x06) [ e9 69 fd ff ff 48 85 d2:00 00 00 00 00 00 00 00 ] fffff80002e824da-fffff80002e824de 5 bytes - nt!KeRemoveQueueEx+53a (+0x0e) [ 4c 8d 87 c8 01:00 00 00 00 00 ] fffff80002e826d8-fffff80002e826de 7 bytes - nt!KeRemoveQueueEx+738 (+0x1fe) [ 66 01 00 00 e8 7f ae:c8 05 eb 02 00 f8 ff ] fffff80002e826f0-fffff80002e826f4 5 bytes - nt!KeRemoveQueueEx+750 (+0x18) [ ed 66 0f 1f 04:00 00 00 00 00 ] fffff80002e826f6-fffff80002e826fe 9 bytes - nt!KeRemoveQueueEx+760 (+0x06) [ 41 ff c5 44 85 2d cc cb:00 00 00 00 00 00 00 00 ] WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output. 1265 errors : !nt (fffff80002e820f8-fffff80002e82c0f) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE Followup: memory_corruption ---------
    3. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010412-17296-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e63000 PsLoadedModuleList = 0xfffff800`030a0e50 Debug session time: Wed Jan 4 10:34:17.500 2012 (UTC - 7:00) System Uptime: 0 days 20:38:06.719 Loading Kernel Symbols ............................................................... ................................................................ ............ Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {fffffaa00810b838, 2, 0, fffff80002ee014b} Probably caused by : ntkrnlmp.exe ( nt!KiInsertTimerTable+13b ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffffaa00810b838, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002ee014b, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310b0e0 fffffaa00810b838 CURRENT_IRQL: 2 FAULTING_IP: nt!KiInsertTimerTable+13b fffff800`02ee014b 488b42f8 mov rax,qword ptr [rdx-8] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: Skype.exe TRAP_FRAME: fffff8800855d900 -- (.trap 0xfffff8800855d900) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000003 rbx=0000000000000000 rcx=0000000000000003 rdx=fffffaa00810b840 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002ee014b rsp=fffff8800855da90 rbp=fffff88002dd7b68 r8=ffffffffffffffff r9=00000000000000af r10=fffff88002dd4180 r11=00000000002f9d00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po nc nt!KiInsertTimerTable+0x13b: fffff800`02ee014b 488b42f8 mov rax,qword ptr [rdx-8] ds:fffffaa0`0810b838=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ed2ca9 to fffff80002ed3740 STACK_TEXT: fffff880`0855d7b8 fffff800`02ed2ca9 : 00000000`0000000a fffffaa0`0810b838 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`0855d7c0 fffff800`02ed1920 : 00000000`00000000 fffffa80`059ab120 00000000`00001f80 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`0855d900 fffff800`02ee014b : 00000000`00000000 fffff800`02ed99a2 00000009`00000003 fffff880`02dd4180 : nt!KiPageFault+0x260 fffff880`0855da90 fffff800`02edaaf2 : fffffa80`059ab060 fffffa80`059ab060 00000000`00000000 00000000`00000003 : nt!KiInsertTimerTable+0x13b fffff880`0855daf0 fffff800`02edc97a : 00000000`00000000 00000000`00000000 00000000`000000af 00000000`00000000 : nt!KiCommitThreadWait+0x332 fffff880`0855db80 fffff800`031ce10e : fffffa80`059ab060 00000000`7ef1a000 00000000`1772fd00 00000000`000000af : nt!KeDelayExecutionThread+0x186 fffff880`0855dbf0 fffff800`02ed2993 : 00000000`05ee3870 fffff880`0855dca0 ffffffff`fffb6c20 00000000`7ef1a000 : nt!NtDelayExecution+0x59 fffff880`0855dc20 00000000`74142dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`1772f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74142dd9 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiInsertTimerTable+13b fffff800`02ee014b 488b42f8 mov rax,qword ptr [rdx-8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!KiInsertTimerTable+13b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+13b BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+13b Followup: MachineOwner ---------
    4. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010912-18859-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`0304ee50 Debug session time: Mon Jan 9 01:28:35.020 2012 (UTC - 7:00) System Uptime: 1 days 14:52:34.296 Loading Kernel Symbols ............................................................... ................................................................ ............. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {0, 0, 0, 0} Probably caused by : amdppm.sys ( amdppm!C1Halt+2 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP: +3363353936316566 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0 BUGCHECK_STR: 0x1E_0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: d EXCEPTION_RECORD: fffff88002d8b808 -- (.exr 0xfffff88002d8b808) ExceptionAddress: fffff80002e88391 (nt!KeAccumulateTicks+0x0000000000000141) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 TRAP_FRAME: fffff88002d8b8b0 -- (.trap 0xfffff88002d8b8b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000b5474a rdx=0000000000020000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002e88391 rsp=fffff88002d8ba40 rbp=0000000000000001 r8=0000000000000000 r9=0000000000000000 r10=00000000000201bd r11=fffff88002d63100 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KeAccumulateTicks+0x141: fffff800`02e88391 408ac5 mov al,bpl Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002e7946e to fffff80002e81710 STACK_TEXT: fffff880`02d8a8f8 fffff800`02e7946e : 00000000`00000037 00000000`00000000 fffff880`02d8b070 fffff800`02eae668 : nt!KeBugCheck fffff880`02d8a900 fffff800`02ea740d : fffff800`0308fedc fffff800`02fc8dac fffff800`02e11000 fffff880`02d8b808 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`02d8a930 fffff800`02eaea90 : fffff800`02fd0b14 fffff880`02d8a9a8 fffff880`02d8b808 fffff800`02e11000 : nt!RtlpExecuteHandlerForException+0xd fffff880`02d8a960 fffff800`02ebb9ef : fffff880`02d8b808 fffff880`02d8b070 fffff880`00000000 00000000`00000001 : nt!RtlDispatchException+0x410 fffff880`02d8b040 fffff800`02e80d82 : fffff880`02d8b808 fffff880`02d63180 fffff880`02d8b8b0 00000000`00002626 : nt!KiDispatchException+0x16f fffff880`02d8b6d0 fffff800`02e7eedf : fffff880`02d8b8b0 00000000`0000000d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`02d8b8b0 fffff800`02e88391 : 00000000`00000000 fffff880`047841e6 fffffa80`06b95c00 fffffa80`06b95fa0 : nt!KiInvalidOpcodeFault+0x11f fffff880`02d8ba40 fffff800`02e8e618 : fffffa80`0790e000 fffff880`02d6dfc0 00000000`00002626 fffffa80`06b95c00 : nt!KeAccumulateTicks+0x141 fffff880`02d8bad0 fffff800`02e8e3a1 : 00000000`00000000 fffff880`02d8bb80 fffff880`02d63180 00000000`00000001 : nt!KeUpdateRunTime+0xb8 fffff880`02d8bb00 fffff880`03d9e7f2 : fffff800`02e8f24a 00000000`003938be fffffa80`06b95d28 fffff880`02d6dfc0 : nt!KiSecondaryClockInterrupt+0x131 fffff880`02d8bc98 fffff800`02e8f24a : 00000000`003938be fffffa80`06b95d28 fffff880`02d6dfc0 00000000`00000001 : amdppm!C1Halt+0x2 fffff880`02d8bca0 fffff800`02e89ebc : fffff880`02d63180 fffff880`00000000 00000000`00000000 fffff880`050f8588 : nt!PoIdle+0x53a fffff880`02d8bd80 00000000`00000000 : fffff880`02d8c000 fffff880`02d86000 fffff880`02d8bd40 00000000`00000000 : nt!KiIdleLoop+0x2c STACK_COMMAND: kb FOLLOWUP_IP: amdppm!C1Halt+2 fffff880`03d9e7f2 c3 ret SYMBOL_STACK_INDEX: a SYMBOL_NAME: amdppm!C1Halt+2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: amdppm IMAGE_NAME: amdppm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc0fd FAILURE_BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2 BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2 Followup: MachineOwner ---------
    5. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010912-15718-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`03052e50 Debug session time: Mon Jan 9 04:05:34.247 2012 (UTC - 7:00) System Uptime: 0 days 2:36:27.543 Loading Kernel Symbols ............................................................... ................................................................ ............ Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {0, 2, 1, fffff80002e9136d} Probably caused by : hardware ( nt!KiTimerExpiration+6d ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002e9136d, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bd0e0 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: nt!KiTimerExpiration+6d fffff800`02e9136d 0100 add dword ptr [rax],eax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff88002d8caa0 -- (.trap 0xfffff88002d8caa0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000092ae2 rdx=0000000000003a9f rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002e9136d rsp=fffff88002d8cc30 rbp=0000000000092ae1 r8=0000000000000000 r9=0000000000000f44 r10=000000000001b258 r11=fffff88002d64100 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KiTimerExpiration+0x6d: fffff800`02e9136d 0100 add dword ptr [rax],eax ds:00000000`00000000=???????? Resetting default scope MISALIGNED_IP: nt!KiTimerExpiration+6d fffff800`02e9136d 0100 add dword ptr [rax],eax LAST_CONTROL_TRANSFER: from fffff80002e84ca9 to fffff80002e85740 STACK_TEXT: fffff880`02d8c958 fffff800`02e84ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`02d8c960 fffff800`02e83920 : fffffa80`06b61900 00000015`db69875d 00000000`00092ae2 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02d8caa0 fffff800`02e9136d : 00000015`db696137 fffff880`02d8cc58 00000000`00092ae2 fffff880`02d681c8 : nt!KiPageFault+0x260 fffff880`02d8cc30 fffff800`02e90cb7 : 00000008`327d5eac 00000008`00092ae2 00000008`327d5eac 00000000`000000e2 : nt!KiTimerExpiration+0x6d fffff880`02d8ccd0 fffff800`02e8deea : fffff880`02d64180 fffff880`02d6efc0 00000000`00000000 fffff880`03eb4588 : nt!KiRetireDpcList+0x277 fffff880`02d8cd80 00000000`00000000 : fffff880`02d8d000 fffff880`02d87000 fffff880`02d8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTimerExpiration+6d fffff800`02e9136d 0100 add dword ptr [rax],eax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!KiTimerExpiration+6d FOLLOWUP_NAME: MachineOwner IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: hardware FAILURE_BUCKET_ID: X64_IP_MISALIGNED BUCKET_ID: X64_IP_MISALIGNED Followup: MachineOwner ---------
    6. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010912-18093-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50 Debug session time: Mon Jan 9 12:28:40.584 2012 (UTC - 7:00) System Uptime: 0 days 5:17:28.866 Loading Kernel Symbols ............................................................... ................................................................ ............. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {0, 0, 0, 0} Probably caused by : amdppm.sys ( amdppm!C1Halt+2 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP: +3363353936316566 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0 BUGCHECK_STR: 0x1E_0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: d EXCEPTION_RECORD: fffff88002f8b808 -- (.exr 0xfffff88002f8b808) ExceptionAddress: fffff80002ec0391 (nt!KeAccumulateTicks+0x0000000000000141) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 TRAP_FRAME: fffff88002f8b8b0 -- (.trap 0xfffff88002f8b8b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=af78282fc9f2f22b rbx=0000000000000000 rcx=0000000000000011 rdx=000000000000dfff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002ec0391 rsp=fffff88002f8ba40 rbp=0000000000000000 r8=0000000000010b07 r9=0000000000000000 r10=000000000002d2fc r11=fffffa800812f4c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KeAccumulateTicks+0x141: fffff800`02ec0391 408ac5 mov al,bpl Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002eb146e to fffff80002eb9710 STACK_TEXT: fffff880`02f8a8f8 fffff800`02eb146e : 00000000`00000037 00000000`00000000 fffff880`02f8b070 fffff800`02ee6668 : nt!KeBugCheck fffff880`02f8a900 fffff800`02edf40d : fffff800`030c7edc fffff800`03000dac fffff800`02e49000 fffff880`02f8b808 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`02f8a930 fffff800`02ee6a90 : fffff800`03008b14 fffff880`02f8a9a8 fffff880`02f8b808 fffff800`02e49000 : nt!RtlpExecuteHandlerForException+0xd fffff880`02f8a960 fffff800`02ef39ef : fffff880`02f8b808 fffff880`02f8b070 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410 fffff880`02f8b040 fffff800`02eb8d82 : fffff880`02f8b808 fffff880`02f63180 fffff880`02f8b8b0 00000000`00002626 : nt!KiDispatchException+0x16f fffff880`02f8b6d0 fffff800`02eb6edf : fffff880`02f8b8b0 00000000`0000000d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`02f8b8b0 fffff800`02ec0391 : fffff880`07bf9005 fffff880`049bd1e6 fffffa80`06bb3700 fffffa80`06bb3a80 : nt!KiInvalidOpcodeFault+0x11f fffff880`02f8ba40 fffff800`02ec6618 : 00000000`00000000 fffff880`00000002 00000000`00002626 fffff800`02ebe1fa : nt!KeAccumulateTicks+0x141 fffff880`02f8bad0 fffff800`02ec63a1 : 00000000`00000000 fffff880`02f8bb80 fffff880`02f63180 00000000`00000001 : nt!KeUpdateRunTime+0xb8 fffff880`02f8bb00 fffff880`02ccf7f2 : fffff800`02ec724a 00000000`003939c5 fffffa80`06bb3808 fffff880`02f6dfc0 : nt!KiSecondaryClockInterrupt+0x131 fffff880`02f8bc98 fffff800`02ec724a : 00000000`003939c5 fffffa80`06bb3808 fffff880`02f6dfc0 00000000`00000001 : amdppm!C1Halt+0x2 fffff880`02f8bca0 fffff800`02ec1ebc : fffff880`02f63180 fffff880`00000000 00000000`00000000 fffff880`01201c50 : nt!PoIdle+0x53a fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x2c STACK_COMMAND: kb FOLLOWUP_IP: amdppm!C1Halt+2 fffff880`02ccf7f2 c3 ret SYMBOL_STACK_INDEX: a SYMBOL_NAME: amdppm!C1Halt+2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: amdppm IMAGE_NAME: amdppm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc0fd FAILURE_BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2 BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2 Followup: MachineOwner ---------
    Many of these are system related and could be due to corruption, a virus, lack of Windows updates, or hardware.

    Run the following steps and post back after doing each one.
    1. Run a Disk Check with both boxes checked.
    2. Run SFC /SCANNOW Command - System File Checker up to three times to fix all errors.
    3. Check for viruses.
      Download and install the free version of Malwarebytes : Free anti-malware, anti-virus and spyware removal download (do not start the trial) and make sure it is updated. Do not run a scan yet.
      Download VIPRE Rescue - VIPRE Computer Recovery Solution from Sunbelt Software but do not unzip it yet
      Download the Fakerean removal tool but do not run it yet.
      Start your computer in Safe Mode
      Unzip VIPRE Rescue and let it run.
      Run a full scan with Malwarebytes.
      Run the fakerean removal tool.
    4. Install all Windows Updates and device drivers (see Installing and updating drivers in 7, Driver Reference and Drivers and Downloads for driver updating).
    5. Run the boot version of Memtest86+ paying close attention to Parts 2 and 3 of the tutorial. Also, in case Memtest86+ misses anything and comes up with no errors, run the extended version of the Windows Memory Diagnostics Tool for at least five passes. These you may want to run overnight since they take a long time to complete.
    6. An underlying driver that is incompatible with your system. Run Driver Verifier to find any issues. To run Driver Verifier, do the following:
      a. Backup your system and user files
      b. Create a system restore point
      c. If you do not have a Windows 7 DVD, Create a system repair disc
      d. Run Driver Verifier

      If Windows cannot start in normal mode with driver verifier running, start in safe mode. If it cannot start in safe mode or normal mode, restore the system restore point using System Restore OPTION TWO.

      Thanks to zigzag3143 for contributing to the Verifier steps.
      If you are unable to start Windows with all drivers being verified or if the blue screen crashes fail to create .dmp files, run them in groups of 5 or 10 until you find a group that causes blue screen crashes and stores the blue screen .dmp files.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:54.
Find Us