New
#1
Random BSoDs
I get them from time to time, been happening for about 2 months time now and I've never bothered to try and find the problem until now.
WER-36395-0.sysdata.xml
I get them from time to time, been happening for about 2 months time now and I've never bothered to try and find the problem until now.
WER-36395-0.sysdata.xml
Your crash dumps are not showing any finite probable cause.
Test your RAM modules for possible errors.
How to Test and Diagnose RAM Issues with Memtest86+
Run memtest for at least 8 passes, preferably overnight.
If memtest comes free from errors, enable Driver Verifier to monitor the drivers.
Driver Verifier - Enable and Disable
Run Driver Verifier for 24 hours or the occurrence of the next crash, whichever is earlier.
InformationWhy Driver Verifier:
It puts a stress on the drivers, ans so it makes the unstable drivers crash. Hopefully the driver that crashes is recorded in the memory dump.
How Can we know that DV is enabled:
It will make the system bit of slow, laggy.
WarningBefore enabling DV, make it sure that you have earlier System restore points made in your computer. You can check it easily by using CCleaner looking at Tools > System Restore.
If there is no points, make a System Restore Point manually before enabling DV.
Let us know the results, with the subsequent crash dumps, if any. Post it following the Blue Screen of Death (BSOD) Posting Instructions.Tip
- If you fail to get on the Desktop because of DV, Boot into Advanced Boot Options > Safe mode. Disable DV there. Now boot normally again, and try following the instruction of enabling DV again.
- If you cannot boot in Safe mode too, do a System Restore to a point you made earlier.
________________________________________________________________________________
BSOD ANALYSIS:
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {31, fffffa8009de06e0, fffff880112f4000, fffff8a002174472} Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+71d1 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000031, The subtype of the bugcheck. Arg2: fffffa8009de06e0 Arg3: fffff880112f4000 Arg4: fffff8a002174472 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_31 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT PROCESS_NAME: vlc.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002f27d85 to fffff80002cc8c00 STACK_TEXT: fffff880`03a1af78 fffff800`02f27d85 : 00000000`0000001a 00000000`00000031 fffffa80`09de06e0 fffff880`112f4000 : nt!KeBugCheckEx fffff880`03a1af80 fffff800`02fa0de7 : fffff800`00000000 00000000`00000000 00000000`00000108 fffff8a0`0216f000 : nt! ?? ::NNGAKEGL::`string'+0x71d1 fffff880`03a1afe0 fffff800`02ca9a92 : fffffa80`03b45010 00000000`00107400 fffffa80`05ecc7a0 fffff8a0`0ade9880 : nt!MiRelocateImagePfn+0xf7 fffff880`03a1b040 fffff800`02fa4f29 : fffffa80`08602a70 fffff6fc`40089148 fffff8a0`00000002 00000000`00000000 : nt!MiValidateImagePages+0x362 fffff880`03a1b0f0 fffff800`02fa5070 : ffffffff`ffffffff 00000000`00000001 fffff8a0`0216f000 00000000`0000001b : nt!MiSwitchBaseAddress+0x61 fffff880`03a1b120 fffff800`02fc7b1f : 00000000`00000004 00000000`00000080 00000000`01000000 00000000`01000000 : nt!MiRelocateImageAgain+0x100 fffff880`03a1b170 fffff800`02fa47ae : fffff880`03a1b3c0 fffff8a0`02188dd0 fffff880`03a1b468 fffff880`03a1b3b8 : nt!MmCreateSection+0x2df fffff880`03a1b370 fffff800`03127d95 : fffff8a0`01c7ae88 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x171 fffff880`03a1b3f0 fffff800`03128147 : 00000000`00000010 fffff8a0`03f56200 fffff880`03a1b580 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5 fffff880`03a1b4e0 fffff800`03128577 : fffff880`03a1b600 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247 fffff880`03a1b5d0 fffff800`0312899f : 000000dc`62e3c618 fffffa80`07b6ab30 fffff8a0`02186000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187 fffff880`03a1b840 fffff800`0302869f : 00000000`00000000 00000000`39b02edc fffffa80`072b1d00 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f fffff880`03a1b910 fffff800`02fb829c : fffffa80`0997db50 fffffa80`072b1d00 00000000`14050800 00000000`7efde000 : nt! ?? ::NNGAKEGL::`string'+0x4c1c0 fffff880`03a1b940 fffff800`02cb9a35 : fffff880`009ef180 00000000`00000000 fffff800`02fb8154 fffffa80`0997db50 : nt!PspUserThreadStartup+0x148 fffff880`03a1b9a0 fffff800`02cb99b7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16 fffff880`03a1bae0 00000000`7714c500 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn 00000000`0008fcf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7714c500 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::NNGAKEGL::`string'+71d1 fffff800`02f27d85 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+71d1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6 FAILURE_BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+71d1 BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+71d1 Followup: MachineOwner ---------