New
#11
Hi carl, this zip is the latest after doing verifier. Please advise what next. thanks.
Hi carl, this zip is the latest after doing verifier. Please advise what next. thanks.
I found an old driver on your system. Win 7 does not generally like old drivers and they can cause memory corruption and crashes.
Lachesis.sys Fri Aug 17 03:48:44 2007 (46C552DC) - Razer Lachesis Mouse driver http://www.razersupport.com
If you are still using this mouse, go to the Razer site and try to find an update. Apparently others have had problems with this mouse on Win 7. I read that it is not compatible with 7 64 bit. Check these two links:
Razer Blueprints - the razer community - Search
BSOD - Vista - Razer Lachesis? - TechSpot OpenBoards
You might want to get a new mouse compatible with Win 7.
The first dump pointed at RTKVHD64.sys as the cause of the crash.
The second dump blamed memory corruption and did not point to a driver.Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_070710-17378-01.zip\070710-17378-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02e60000 PsLoadedModuleList = 0xfffff800`0309de50 Debug session time: Tue Jul 6 19:12:39.143 2010 (GMT-4) System Uptime: 0 days 0:00:18.844 Loading Kernel Symbols ............................................................... ................................................................ ... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D5, {fffff98003912d60, 0, fffff8800677df7a, 0} Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for RTKVHD64.sys *** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys Could not read faulting driver name Probably caused by : RTKVHD64.sys ( RTKVHD64+cbf7a ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5) Memory was referenced after it was freed. This cannot be protected by try-except. When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff98003912d60, memory referenced Arg2: 0000000000000000, value 0 = read operation, 1 = write operation Arg3: fffff8800677df7a, if non-zero, the address which referenced memory. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031080e0 fffff98003912d60 FAULTING_IP: RTKVHD64+cbf7a fffff880`0677df7a 8b4630 mov eax,dword ptr [rsi+30h] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xD5 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88003a957e0 -- (.trap 0xfffff88003a957e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003a95a08 rdx=fffff88003a95970 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8800677df7a rsp=fffff88003a95970 rbp=0000000000000002 r8=0000000000000000 r9=fffff8800677df7a r10=0000000000000000 r11=fffff8000304ae80 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc RTKVHD64+0xcbf7a: fffff880`0677df7a 8b4630 mov eax,dword ptr [rsi+30h] ds:ae80:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002f50e54 to fffff80002ed0600 STACK_TEXT: fffff880`03a95678 fffff800`02f50e54 : 00000000`00000050 fffff980`03912d60 00000000`00000000 fffff880`03a957e0 : nt!KeBugCheckEx fffff880`03a95680 fffff800`02ece6ee : 00000000`00000000 fffff8a0`015f910e fffffa80`0633d500 fffff800`02f0320f : nt! ?? ::FNODOBFM::`string'+0x42877 fffff880`03a957e0 fffff880`0677df7a : fffff880`03a95a08 00000000`00000000 fffff8a0`015f910e fffffa80`06945440 : nt!KiPageFault+0x16e fffff880`03a95970 fffff880`03a95a08 : 00000000`00000000 fffff8a0`015f910e fffffa80`06945440 00000000`00000000 : RTKVHD64+0xcbf7a fffff880`03a95978 00000000`00000000 : fffff8a0`015f910e fffffa80`06945440 00000000`00000000 fffff800`00000000 : 0xfffff880`03a95a08 STACK_COMMAND: kb FOLLOWUP_IP: RTKVHD64+cbf7a fffff880`0677df7a 8b4630 mov eax,dword ptr [rsi+30h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: RTKVHD64+cbf7a FOLLOWUP_NAME: MachineOwner MODULE_NAME: RTKVHD64 IMAGE_NAME: RTKVHD64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4b1e2855 FAILURE_BUCKET_ID: X64_0xD5_VRF_RTKVHD64+cbf7a BUCKET_ID: X64_0xD5_VRF_RTKVHD64+cbf7a Followup: MachineOwner ---------
The third dump also pointed to RTKVHD64.sys.Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_070710-17378-01.zip\070710-16520-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02e19000 PsLoadedModuleList = 0xfffff800`03056e50 Debug session time: Tue Jul 6 19:15:12.542 2010 (GMT-4) System Uptime: 0 days 0:02:01.244 Loading Kernel Symbols ............................................................... ................................................................ ................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C1, {fffff98013f9aee0, fffff98013f9a253, d0118, 23} Probably caused by : memory_corruption ( nt!MiCheckSpecialPoolSlop+9a ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1) Special pool has detected memory corruption. Typically the current thread's stack backtrace will reveal the guilty party. Arguments: Arg1: fffff98013f9aee0, address trying to free Arg2: fffff98013f9a253, address where bits are corrupted Arg3: 00000000000d0118, (reserved) Arg4: 0000000000000023, caller is freeing an address where nearby bytes within the same page have been corrupted Debugging Details: ------------------ BUGCHECK_STR: 0xC1_23 SPECIAL_POOL_CORRUPTION_TYPE: 23 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: MsMpEng.exe CURRENT_IRQL: 0 IRP_ADDRESS: fffffa7fffffff89 LAST_CONTROL_TRANSFER: from fffff80002f1953a to fffff80002e89600 STACK_TEXT: fffff880`009fa688 fffff800`02f1953a : 00000000`000000c1 fffff980`13f9aee0 fffff980`13f9a253 00000000`000d0118 : nt!KeBugCheckEx fffff880`009fa690 fffff800`02f905d3 : fffff980`0979ace0 fffffa80`0719a010 00000000`00000000 00000000`00000000 : nt!MiCheckSpecialPoolSlop+0x9a fffff880`009fa6d0 fffff800`02fbc356 : fffff800`02e19000 00000000`2b707249 00000000`00195780 00000000`00000001 : nt!MmFreeSpecialPool+0x1d3 fffff880`009fa800 fffff800`0332e026 : fffffa80`0719f402 fffffa80`0719f4c0 00000000`00000000 fffff980`13f9aee0 : nt!ExFreePool+0x9f3 fffff880`009fa8b0 fffff800`0332e5ec : fffff800`02ea8aa2 fffff980`13f9aee0 fffff880`009faca0 00000000`00000000 : nt!VfIoFreeIrp+0xe6 fffff880`009fa8e0 fffff800`02ea8aa2 : fffff880`009faca0 fffff980`13f9aee0 00000000`00000000 fffffa80`06931060 : nt!IovFreeIrpPrivate+0x5c fffff880`009fa920 fffff800`02e5c0ed : fffffa80`00000001 00000000`00000000 fffff980`13e18e00 fffff800`031a56c7 : nt!IopCompleteRequest+0x402 fffff880`009fa9f0 fffff800`03185a77 : 00000000`00000000 fffff880`009fab60 fffff980`13e18ee0 fffffa80`06d36b60 : nt!IopPostProcessIrp+0x4d fffff880`009faa70 fffff800`03145825 : 00000000`00000000 fffff880`009fab68 fffff880`009fab60 00000000`00000401 : nt!IoRemoveIoCompletion+0xe7 fffff880`009fab00 fffff800`02e88853 : fffffa80`06931060 00000000`01d1f818 fffff880`009fabc8 fffff880`009fac00 : nt!NtRemoveIoCompletion+0x145 fffff880`009fabb0 00000000`77b3ff4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`01d1f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b3ff4a STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCheckSpecialPoolSlop+9a fffff800`02f1953a cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiCheckSpecialPoolSlop+9a FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a BUCKET_ID: X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a Followup: MachineOwner ---------
RTKVHD64.sys is your Realtek High Definition Audio Function (sound card) Driver RealtekCode:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_070710-17378-01.zip\070710-16458-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`02e5c000 PsLoadedModuleList = 0xfffff800`03099e50 Debug session time: Tue Jul 6 19:05:16.301 2010 (GMT-4) System Uptime: 0 days 0:00:18.628 Loading Kernel Symbols ............................................................... ................................................................ ... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D5, {fffff98003482d60, 0, fffff88006741f7a, 0} Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for RTKVHD64.sys *** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys Could not read faulting driver name Probably caused by : RTKVHD64.sys ( RTKVHD64+cbf7a ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5) Memory was referenced after it was freed. This cannot be protected by try-except. When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff98003482d60, memory referenced Arg2: 0000000000000000, value 0 = read operation, 1 = write operation Arg3: fffff88006741f7a, if non-zero, the address which referenced memory. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031040e0 fffff98003482d60 FAULTING_IP: RTKVHD64+cbf7a fffff880`06741f7a 8b4630 mov eax,dword ptr [rsi+30h] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xD5 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88002a937e0 -- (.trap 0xfffff88002a937e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002a93a08 rdx=fffff88002a93970 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88006741f7a rsp=fffff88002a93970 rbp=0000000000000002 r8=0000000000000000 r9=fffff88006741f7a r10=0000000000000000 r11=fffff88002fd5180 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc RTKVHD64+0xcbf7a: fffff880`06741f7a 8b4630 mov eax,dword ptr [rsi+30h] ds:5180:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002f4ce54 to fffff80002ecc600 STACK_TEXT: fffff880`02a93678 fffff800`02f4ce54 : 00000000`00000050 fffff980`03482d60 00000000`00000000 fffff880`02a937e0 : nt!KeBugCheckEx fffff880`02a93680 fffff800`02eca6ee : 00000000`00000000 fffff8a0`0234410e fffffa80`06b17000 fffff800`02eff20f : nt! ?? ::FNODOBFM::`string'+0x42877 fffff880`02a937e0 fffff880`06741f7a : fffff880`02a93a08 00000000`00000000 fffff8a0`0234410e fffffa80`06b10a00 : nt!KiPageFault+0x16e fffff880`02a93970 fffff880`02a93a08 : 00000000`00000000 fffff8a0`0234410e fffffa80`06b10a00 00000000`00000000 : RTKVHD64+0xcbf7a fffff880`02a93978 00000000`00000000 : fffff8a0`0234410e fffffa80`06b10a00 00000000`00000000 fffff800`00000000 : 0xfffff880`02a93a08 STACK_COMMAND: kb FOLLOWUP_IP: RTKVHD64+cbf7a fffff880`06741f7a 8b4630 mov eax,dword ptr [rsi+30h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: RTKVHD64+cbf7a FOLLOWUP_NAME: MachineOwner MODULE_NAME: RTKVHD64 IMAGE_NAME: RTKVHD64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4b1e2855 FAILURE_BUCKET_ID: X64_0xD5_VRF_RTKVHD64+cbf7a BUCKET_ID: X64_0xD5_VRF_RTKVHD64+cbf7a Followup: MachineOwner --------- 3: kd> lmtsmn start end module name fffff880`03e00000 fffff880`03e3e000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f35000 fffff880`00f8c000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02c83000 fffff880`02d0d000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`03e5a000 fffff880`03e70000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`01851000 fffff880`01866000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`00ff4000 fffff880`00fff000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`00e78000 fffff880`00e81000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00c1a000 fffff880`00c44000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`04807000 fffff880`04ee3000 atikmdag atikmdag.sys Thu May 27 12:47:58 2010 (4BFEA23E) fffff880`03e77000 fffff880`03ebd000 atikmpag atikmpag.sys Thu May 27 12:25:36 2010 (4BFE9D00) fffff880`0197c000 fffff880`01983000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`02c2d000 fffff880`02c3e000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff960`00740000 fffff960`00767000 cdd cdd.dll unavailable (00000000) fffff880`0191c000 fffff880`01946000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00cc9000 fffff880`00d89000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`018b6000 fffff880`018e6000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c6b000 fffff880`00cc9000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`01115000 fffff880`01188000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`03e4a000 fffff880`03e5a000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`068a0000 fffff880`068ae000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`02c0f000 fffff880`02c2d000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`02c00000 fffff880`02c0f000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`018a0000 fffff880`018b6000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`06454000 fffff880`06476000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`068ba000 fffff880`068c3000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`068ae000 fffff880`068ba000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`068c3000 fffff880`068d6000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`06894000 fffff880`068a0000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`04ee3000 fffff880`04fd7000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`03ebd000 fffff880`03f03000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`010a3000 fffff880`010b7000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`01057000 fffff880`010a3000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01866000 fffff880`018a0000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7) fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`02e13000 fffff800`02e5c000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`04fd7000 fffff880`04ffb000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`06938000 fffff880`06951000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`06951000 fffff880`06959080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`0692a000 fffff880`06938000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`01464000 fffff880`0146d000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`00d99000 fffff880`00db9000 jraid jraid.sys Thu Oct 29 04:14:20 2009 (4AE94EDC) fffff880`044d4000 fffff880`044e3000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`06962000 fffff880`06970000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bcc000 fffff800`00bd6000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`044f4000 fffff880`04537000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F) fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`015c5000 fffff880`015f0000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`06476000 fffff880`0647b200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`0695a000 fffff880`06961680 Lachesis Lachesis.sys Fri Aug 17 03:48:44 2007 (46C552DC) fffff880`0698b000 fffff880`069ae000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c4a000 fffff880`00c57000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65) fffff880`0690e000 fffff880`0692a000 Mkd2Nadr Mkd2Nadr.sys Thu Mar 12 01:37:18 2009 (49B89F8E) fffff880`0697d000 fffff880`0698b000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`044e3000 fffff880`044f2000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`06970000 fffff880`0697d000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00c00000 fffff880`00c1a000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`01946000 fffff880`01973000 MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0) fffff880`019e1000 fffff880`019ec000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f95000 fffff880`00f9f000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`010b7000 fffff880`01115000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`02df4000 fffff880`02dff000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`01452000 fffff880`01464000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`01473000 fffff880`01565000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`03fe4000 fffff880`03ff0000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`0444f000 fffff880`0447e000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`045ba000 fffff880`045cf000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02d3c000 fffff880`02d4b000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02c3e000 fffff880`02c83000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01565000 fffff880`015c5000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`019ec000 fffff880`019fd000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`02de8000 fffff880`02df4000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02e5c000 fffff800`03438000 nt ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB) fffff880`01252000 fffff880`013f5000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`01973000 fffff880`0197c000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`04549000 fffff880`04560000 nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D) fffff880`03f03000 fffff880`03f33000 nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61) fffff880`02d16000 fffff880`02d3c000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00fdf000 fffff880`00ff4000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f9f000 fffff880`00fd2000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00e71000 fffff880`00e78000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00d89000 fffff880`00d99000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`06417000 fffff880`06454000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c57000 fffff880`00c6b000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`011d4000 fffff880`011f8000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0447e000 fffff880`04499000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`04499000 fffff880`044ba000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`044ba000 fffff880`044d4000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02d97000 fffff880`02de8000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`019c6000 fffff880`019cf000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`019cf000 fffff880`019d8000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`019d8000 fffff880`019e1000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`03f33000 fffff880`03f72000 Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432) fffff880`04400000 fffff880`04432700 RtHDMIVX RtHDMIVX.sys Wed Dec 02 01:33:25 2009 (4B160A35) fffff880`06676000 fffff880`06893300 RTKVHD64 RTKVHD64.sys Tue Dec 08 05:20:05 2009 (4B1E2855) fffff880`00db9000 fffff880`00de8000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0) fffff880`03e3e000 fffff880`03e4a000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`02d4b000 fffff880`02d68000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8) fffff880`0144a000 fffff880`01452000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`044f2000 fffff880`044f3480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E) fffff880`0181e000 fffff880`0182b000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`01800000 fffff880`0181e000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02d83000 fffff880`02d97000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`005f0000 fffff960`005fa000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`0182b000 fffff880`01851000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`04537000 fffff880`04549000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`068f1000 fffff880`0690e000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`04ffb000 fffff880`04ffcf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03fd3000 fffff880`03fe4000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`04560000 fffff880`045ba000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D) fffff880`03f72000 fffff880`03f7d000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03f7d000 fffff880`03fd3000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`068d6000 fffff880`068f1000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A) fffff880`00fd2000 fffff880`00fdf000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`01983000 fffff880`01991000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`01991000 fffff880`019b6000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`00e00000 fffff880`00e15000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e15000 fffff880`00e71000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`01188000 fffff880`011d4000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`02d68000 fffff880`02d83000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`019b6000 fffff880`019c6000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e82000 fffff880`00f26000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f26000 fffff880`00f35000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02d0d000 fffff880`02d16000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`000a0000 fffff960`003af000 win32k win32k.sys Sat May 01 11:06:30 2010 (4BDC4376) fffff880`015f0000 fffff880`015f9000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f8c000 fffff880`00f95000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`069ae000 fffff880`069cf000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) Unloaded modules: fffff880`018e6000 fffff880`018f4000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`018f4000 fffff880`01900000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01900000 fffff880`01909000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01909000 fffff880`0191c000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
I suggest you upgrade your mouse driver or upgrade your mouse. Then try reinstalling RTKVHD64.sys. The driver is current; but it could possibly be corrupt.
Reboot and make sure Driver Verifier is turned off. If you get another BSOD, upload the dump file and turn Driver Verifier back on.
Keep us posted on how you are doing.
Hi carl,
Im not sure if the verifier had been turned off. Basically, I turned off (by choosing delete existing setting), then reboot my system. However, every reboot attempt directs me to a BSOD with memory corruption. I will tell you more using my other laptop.(in case of another BSOD). I attached the minidump here.
Carl,
Thanks for your patience in helping me out. Seeing so many memory corruption error. I decided to perform another Memtest. This time round it return me with errors, alot of them. Hence I done the following,
01 & 02 RAM on slot 01 n 02: Errors return on test#5 onwards.
01 RAM on Slot 01: No error
02 RAM on Slot 01: No error
02 RAM on slot 02: No error
With the results, i retested step1; this time round ensuring tt it is properly secured. Result is the same, error on test#5 onward.
FYI, I not tamper on any setting on bios.
any idea?
Both sticks reported no errors in other slots and individually. So you might have a bad dimm slot.
Thank you everyone. I think my com is now fixed.
Pleased to hear that. Thanks for reporting back.
Jan.
hi Carlt
Oh what happened is that my previous ram.. is not compatible to my pc's motherboard when it runs 2 rams.. I try 5 others ram brands.. and they all work well to all slots. In the end.. i ended up with team elite, (wasn't a very popular name in singapore thou.)
Yeap. I got the mouse driver updated fm the website.