Install Service pack 1 and all other windows updates. Otherwise the system will remain vulnerable to threats.
Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17273.amd64fre.win7_gdr.130318-1532
Learn how to install Windows 7 Service Pack 1 (SP1)
Service Pack and Update Center - Microsoft Windows
Update your ATI/AMD display driver to teh latest WHQL. It is failing.
Code:
fffff880`059e6808 fffff880`048fa350Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
atikmdag+0x4f350
And the driver is too old.
Code:
fffff880`04327000 fffff880`0437c000 atikmpag (deferred)
Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
Image name: atikmpag.sys
Timestamp: Thu Nov 10 07:42:44 2011 (4EBB331C)
CheckSum: 000502CB
ImageSize: 00055000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
You can get it from the link in our forum, Latest AMD Catalyst Video Driver for Windows 7, or you may go to AMD Graphics Driver and Software and opt for Automatically Detect and Install the appropriate driver for your card.
During installation, you may opt for advanced installation, and install the display driver only, not the Catalyst Control Center.
Let us know the results.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88006cc752c, 0, fffff80002b7c5c0, 1}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ObReferenceObjectByHandleWithTag+b0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88006cc752c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002b7c5c0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000001, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac50e0
fffff88006cc752c
FAULTING_IP:
nt!ObReferenceObjectByHandleWithTag+b0
fffff800`02b7c5c0 8b465c mov eax,dword ptr [rsi+5Ch]
MM_INTERNAL_CODE: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: kb.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880059e6940 -- (.trap 0xfffff880059e6940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003bc rbx=0000000000000000 rcx=00000000000003bc
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b7c5c0 rsp=fffff880059e6ad0 rbp=fffff880059e6c00
r8=fffffa80036dc570 r9=0000000077dcf801 r10=00000000000003bc
r11=00000000002f42e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ObReferenceObjectByHandleWithTag+0xb0:
fffff800`02b7c5c0 8b465c mov eax,dword ptr [rsi+5Ch] ds:2625:00000000`0000005c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002839795 to fffff8000288d880
STACK_TEXT:
fffff880`059e67d8 fffff800`02839795 : 00000000`00000050 fffff880`06cc752c 00000000`00000000 fffff880`059e6940 : nt!KeBugCheckEx
fffff880`059e67e0 fffff800`0288b96e : 00000000`00000000 fffff880`059e6c38 fffffa80`04221200 fffff880`048f815f : nt! ?? ::FNODOBFM::`string'+0x41e7f
fffff880`059e6940 fffff800`02b7c5c0 : fffffa80`0685afd8 fffff780`00000008 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`059e6ad0 fffff800`02b8283a : 00000000`00000000 fffff800`00000000 fffffa80`036dc570 fffffa80`0685af01 : nt!ObReferenceObjectByHandleWithTag+0xb0
fffff880`059e6ba0 fffff800`0288cad3 : fffffa80`0579bb60 00000000`000003bc 00000000`00000000 00000000`00000000 : nt!NtReleaseMutant+0x5a
fffff880`059e6c20 00000000`75842dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`126ff0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75842dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ObReferenceObjectByHandleWithTag+b0
fffff800`02b7c5c0 8b465c mov eax,dword ptr [rsi+5Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ObReferenceObjectByHandleWithTag+b0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147dc36
FAILURE_BUCKET_ID: X64_0x50_nt!ObReferenceObjectByHandleWithTag+b0
BUCKET_ID: X64_0x50_nt!ObReferenceObjectByHandleWithTag+b0
Followup: MachineOwner
---------