Blue screen error: With various Error Code (Help pls)

Page 2 of 3 FirstFirst 123 LastLast

  1. Posts : 12
    Win 7 64bit
    Thread Starter
       #11

    Hi carl, this zip is the latest after doing verifier. Please advise what next. thanks.
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #12

    fildoo said:
    Hi carl, this zip is the latest after doing verifier. Please advise what next. thanks.
    I found an old driver on your system. Win 7 does not generally like old drivers and they can cause memory corruption and crashes.

    Lachesis.sys Fri Aug 17 03:48:44 2007 (46C552DC) - Razer Lachesis Mouse driver http://www.razersupport.com

    If you are still using this mouse, go to the Razer site and try to find an update. Apparently others have had problems with this mouse on Win 7. I read that it is not compatible with 7 64 bit. Check these two links:

    Razer Blueprints - the razer community - Search

    BSOD - Vista - Razer Lachesis? - TechSpot OpenBoards

    You might want to get a new mouse compatible with Win 7.

    The first dump pointed at RTKVHD64.sys as the cause of the crash.
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_070710-17378-01.zip\070710-17378-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02e60000 PsLoadedModuleList = 0xfffff800`0309de50
    Debug session time: Tue Jul  6 19:12:39.143 2010 (GMT-4)
    System Uptime: 0 days 0:00:18.844
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D5, {fffff98003912d60, 0, fffff8800677df7a, 0}
    
    Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for RTKVHD64.sys
    *** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
    
    Could not read faulting driver name
    Probably caused by : RTKVHD64.sys ( RTKVHD64+cbf7a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
    Memory was referenced after it was freed.
    This cannot be protected by try-except.
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff98003912d60, memory referenced
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg3: fffff8800677df7a, if non-zero, the address which referenced memory.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031080e0
     fffff98003912d60 
    
    FAULTING_IP: 
    RTKVHD64+cbf7a
    fffff880`0677df7a 8b4630          mov     eax,dword ptr [rsi+30h]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xD5
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88003a957e0 -- (.trap 0xfffff88003a957e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003a95a08
    rdx=fffff88003a95970 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800677df7a rsp=fffff88003a95970 rbp=0000000000000002
     r8=0000000000000000  r9=fffff8800677df7a r10=0000000000000000
    r11=fffff8000304ae80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    RTKVHD64+0xcbf7a:
    fffff880`0677df7a 8b4630          mov     eax,dword ptr [rsi+30h] ds:ae80:00000000`00000030=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002f50e54 to fffff80002ed0600
    
    STACK_TEXT:  
    fffff880`03a95678 fffff800`02f50e54 : 00000000`00000050 fffff980`03912d60 00000000`00000000 fffff880`03a957e0 : nt!KeBugCheckEx
    fffff880`03a95680 fffff800`02ece6ee : 00000000`00000000 fffff8a0`015f910e fffffa80`0633d500 fffff800`02f0320f : nt! ?? ::FNODOBFM::`string'+0x42877
    fffff880`03a957e0 fffff880`0677df7a : fffff880`03a95a08 00000000`00000000 fffff8a0`015f910e fffffa80`06945440 : nt!KiPageFault+0x16e
    fffff880`03a95970 fffff880`03a95a08 : 00000000`00000000 fffff8a0`015f910e fffffa80`06945440 00000000`00000000 : RTKVHD64+0xcbf7a
    fffff880`03a95978 00000000`00000000 : fffff8a0`015f910e fffffa80`06945440 00000000`00000000 fffff800`00000000 : 0xfffff880`03a95a08
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    RTKVHD64+cbf7a
    fffff880`0677df7a 8b4630          mov     eax,dword ptr [rsi+30h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  RTKVHD64+cbf7a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: RTKVHD64
    
    IMAGE_NAME:  RTKVHD64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b1e2855
    
    FAILURE_BUCKET_ID:  X64_0xD5_VRF_RTKVHD64+cbf7a
    
    BUCKET_ID:  X64_0xD5_VRF_RTKVHD64+cbf7a
    
    Followup: MachineOwner
    ---------
    The second dump blamed memory corruption and did not point to a driver.
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_070710-17378-01.zip\070710-16520-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02e19000 PsLoadedModuleList = 0xfffff800`03056e50
    Debug session time: Tue Jul  6 19:15:12.542 2010 (GMT-4)
    System Uptime: 0 days 0:02:01.244
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C1, {fffff98013f9aee0, fffff98013f9a253, d0118, 23}
    
    Probably caused by : memory_corruption ( nt!MiCheckSpecialPoolSlop+9a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
    Special pool has detected memory corruption.  Typically the current thread's
    stack backtrace will reveal the guilty party.
    Arguments:
    Arg1: fffff98013f9aee0, address trying to free
    Arg2: fffff98013f9a253, address where bits are corrupted
    Arg3: 00000000000d0118, (reserved)
    Arg4: 0000000000000023, caller is freeing an address where nearby bytes within the same page have been corrupted
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xC1_23
    
    SPECIAL_POOL_CORRUPTION_TYPE:  23
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  MsMpEng.exe
    
    CURRENT_IRQL:  0
    
    IRP_ADDRESS:  fffffa7fffffff89
    
    LAST_CONTROL_TRANSFER:  from fffff80002f1953a to fffff80002e89600
    
    STACK_TEXT:  
    fffff880`009fa688 fffff800`02f1953a : 00000000`000000c1 fffff980`13f9aee0 fffff980`13f9a253 00000000`000d0118 : nt!KeBugCheckEx
    fffff880`009fa690 fffff800`02f905d3 : fffff980`0979ace0 fffffa80`0719a010 00000000`00000000 00000000`00000000 : nt!MiCheckSpecialPoolSlop+0x9a
    fffff880`009fa6d0 fffff800`02fbc356 : fffff800`02e19000 00000000`2b707249 00000000`00195780 00000000`00000001 : nt!MmFreeSpecialPool+0x1d3
    fffff880`009fa800 fffff800`0332e026 : fffffa80`0719f402 fffffa80`0719f4c0 00000000`00000000 fffff980`13f9aee0 : nt!ExFreePool+0x9f3
    fffff880`009fa8b0 fffff800`0332e5ec : fffff800`02ea8aa2 fffff980`13f9aee0 fffff880`009faca0 00000000`00000000 : nt!VfIoFreeIrp+0xe6
    fffff880`009fa8e0 fffff800`02ea8aa2 : fffff880`009faca0 fffff980`13f9aee0 00000000`00000000 fffffa80`06931060 : nt!IovFreeIrpPrivate+0x5c
    fffff880`009fa920 fffff800`02e5c0ed : fffffa80`00000001 00000000`00000000 fffff980`13e18e00 fffff800`031a56c7 : nt!IopCompleteRequest+0x402
    fffff880`009fa9f0 fffff800`03185a77 : 00000000`00000000 fffff880`009fab60 fffff980`13e18ee0 fffffa80`06d36b60 : nt!IopPostProcessIrp+0x4d
    fffff880`009faa70 fffff800`03145825 : 00000000`00000000 fffff880`009fab68 fffff880`009fab60 00000000`00000401 : nt!IoRemoveIoCompletion+0xe7
    fffff880`009fab00 fffff800`02e88853 : fffffa80`06931060 00000000`01d1f818 fffff880`009fabc8 fffff880`009fac00 : nt!NtRemoveIoCompletion+0x145
    fffff880`009fabb0 00000000`77b3ff4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`01d1f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b3ff4a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiCheckSpecialPoolSlop+9a
    fffff800`02f1953a cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiCheckSpecialPoolSlop+9a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a
    
    BUCKET_ID:  X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a
    
    Followup: MachineOwner
    ---------
    The third dump also pointed to RTKVHD64.sys.
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_070710-17378-01.zip\070710-16458-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02e5c000 PsLoadedModuleList = 0xfffff800`03099e50
    Debug session time: Tue Jul  6 19:05:16.301 2010 (GMT-4)
    System Uptime: 0 days 0:00:18.628
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D5, {fffff98003482d60, 0, fffff88006741f7a, 0}
    
    Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for RTKVHD64.sys
    *** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
    
    Could not read faulting driver name
    Probably caused by : RTKVHD64.sys ( RTKVHD64+cbf7a )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
    Memory was referenced after it was freed.
    This cannot be protected by try-except.
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff98003482d60, memory referenced
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg3: fffff88006741f7a, if non-zero, the address which referenced memory.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031040e0
     fffff98003482d60 
    
    FAULTING_IP: 
    RTKVHD64+cbf7a
    fffff880`06741f7a 8b4630          mov     eax,dword ptr [rsi+30h]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xD5
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88002a937e0 -- (.trap 0xfffff88002a937e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002a93a08
    rdx=fffff88002a93970 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88006741f7a rsp=fffff88002a93970 rbp=0000000000000002
     r8=0000000000000000  r9=fffff88006741f7a r10=0000000000000000
    r11=fffff88002fd5180 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    RTKVHD64+0xcbf7a:
    fffff880`06741f7a 8b4630          mov     eax,dword ptr [rsi+30h] ds:5180:00000000`00000030=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002f4ce54 to fffff80002ecc600
    
    STACK_TEXT:  
    fffff880`02a93678 fffff800`02f4ce54 : 00000000`00000050 fffff980`03482d60 00000000`00000000 fffff880`02a937e0 : nt!KeBugCheckEx
    fffff880`02a93680 fffff800`02eca6ee : 00000000`00000000 fffff8a0`0234410e fffffa80`06b17000 fffff800`02eff20f : nt! ?? ::FNODOBFM::`string'+0x42877
    fffff880`02a937e0 fffff880`06741f7a : fffff880`02a93a08 00000000`00000000 fffff8a0`0234410e fffffa80`06b10a00 : nt!KiPageFault+0x16e
    fffff880`02a93970 fffff880`02a93a08 : 00000000`00000000 fffff8a0`0234410e fffffa80`06b10a00 00000000`00000000 : RTKVHD64+0xcbf7a
    fffff880`02a93978 00000000`00000000 : fffff8a0`0234410e fffffa80`06b10a00 00000000`00000000 fffff800`00000000 : 0xfffff880`02a93a08
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    RTKVHD64+cbf7a
    fffff880`06741f7a 8b4630          mov     eax,dword ptr [rsi+30h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  RTKVHD64+cbf7a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: RTKVHD64
    
    IMAGE_NAME:  RTKVHD64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b1e2855
    
    FAILURE_BUCKET_ID:  X64_0xD5_VRF_RTKVHD64+cbf7a
    
    BUCKET_ID:  X64_0xD5_VRF_RTKVHD64+cbf7a
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmtsmn
    start             end                 module name
    fffff880`03e00000 fffff880`03e3e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f35000 fffff880`00f8c000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c83000 fffff880`02d0d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03e5a000 fffff880`03e70000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01851000 fffff880`01866000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00ff4000 fffff880`00fff000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00e78000 fffff880`00e81000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00c1a000 fffff880`00c44000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`04807000 fffff880`04ee3000   atikmdag atikmdag.sys Thu May 27 12:47:58 2010 (4BFEA23E)
    fffff880`03e77000 fffff880`03ebd000   atikmpag atikmpag.sys Thu May 27 12:25:36 2010 (4BFE9D00)
    fffff880`0197c000 fffff880`01983000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02c2d000 fffff880`02c3e000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff960`00740000 fffff960`00767000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0191c000 fffff880`01946000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cc9000 fffff880`00d89000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018b6000 fffff880`018e6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c6b000 fffff880`00cc9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01115000 fffff880`01188000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03e4a000 fffff880`03e5a000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`068a0000 fffff880`068ae000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02c0f000 fffff880`02c2d000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02c00000 fffff880`02c0f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018a0000 fffff880`018b6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06454000 fffff880`06476000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`068ba000 fffff880`068c3000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`068ae000 fffff880`068ba000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`068c3000 fffff880`068d6000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06894000 fffff880`068a0000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04ee3000 fffff880`04fd7000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03ebd000 fffff880`03f03000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`010a3000 fffff880`010b7000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01057000 fffff880`010a3000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01866000 fffff880`018a0000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02e13000 fffff800`02e5c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04fd7000 fffff880`04ffb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`06938000 fffff880`06951000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`06951000 fffff880`06959080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0692a000 fffff880`06938000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`01464000 fffff880`0146d000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`00d99000 fffff880`00db9000   jraid    jraid.sys    Thu Oct 29 04:14:20 2009 (4AE94EDC)
    fffff880`044d4000 fffff880`044e3000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06962000 fffff880`06970000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bcc000 fffff800`00bd6000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`044f4000 fffff880`04537000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`015c5000 fffff880`015f0000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`06476000 fffff880`0647b200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0695a000 fffff880`06961680   Lachesis Lachesis.sys Fri Aug 17 03:48:44 2007 (46C552DC)
    fffff880`0698b000 fffff880`069ae000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c4a000 fffff880`00c57000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`0690e000 fffff880`0692a000   Mkd2Nadr Mkd2Nadr.sys Thu Mar 12 01:37:18 2009 (49B89F8E)
    fffff880`0697d000 fffff880`0698b000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`044e3000 fffff880`044f2000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06970000 fffff880`0697d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01946000 fffff880`01973000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
    fffff880`019e1000 fffff880`019ec000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f95000 fffff880`00f9f000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010b7000 fffff880`01115000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02df4000 fffff880`02dff000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01452000 fffff880`01464000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01473000 fffff880`01565000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03fe4000 fffff880`03ff0000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0444f000 fffff880`0447e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`045ba000 fffff880`045cf000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d3c000 fffff880`02d4b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02c3e000 fffff880`02c83000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01565000 fffff880`015c5000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`019ec000 fffff880`019fd000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02de8000 fffff880`02df4000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e5c000 fffff800`03438000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
    fffff880`01252000 fffff880`013f5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01973000 fffff880`0197c000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`04549000 fffff880`04560000   nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
    fffff880`03f03000 fffff880`03f33000   nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
    fffff880`02d16000 fffff880`02d3c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fdf000 fffff880`00ff4000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f9f000 fffff880`00fd2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d89000 fffff880`00d99000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06417000 fffff880`06454000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c57000 fffff880`00c6b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`011d4000 fffff880`011f8000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0447e000 fffff880`04499000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04499000 fffff880`044ba000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`044ba000 fffff880`044d4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d97000 fffff880`02de8000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`019c6000 fffff880`019cf000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019cf000 fffff880`019d8000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019d8000 fffff880`019e1000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`03f33000 fffff880`03f72000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
    fffff880`04400000 fffff880`04432700   RtHDMIVX RtHDMIVX.sys Wed Dec 02 01:33:25 2009 (4B160A35)
    fffff880`06676000 fffff880`06893300   RTKVHD64 RTKVHD64.sys Tue Dec 08 05:20:05 2009 (4B1E2855)
    fffff880`00db9000 fffff880`00de8000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`03e3e000 fffff880`03e4a000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d4b000 fffff880`02d68000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`044f2000 fffff880`044f3480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`0181e000 fffff880`0182b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01800000 fffff880`0181e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d83000 fffff880`02d97000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0182b000 fffff880`01851000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04537000 fffff880`04549000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`068f1000 fffff880`0690e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`04ffb000 fffff880`04ffcf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03fd3000 fffff880`03fe4000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04560000 fffff880`045ba000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03f72000 fffff880`03f7d000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03f7d000 fffff880`03fd3000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`068d6000 fffff880`068f1000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00fd2000 fffff880`00fdf000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01983000 fffff880`01991000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01991000 fffff880`019b6000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01188000 fffff880`011d4000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d68000 fffff880`02d83000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019b6000 fffff880`019c6000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e82000 fffff880`00f26000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f26000 fffff880`00f35000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d0d000 fffff880`02d16000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000a0000 fffff960`003af000   win32k   win32k.sys   Sat May 01 11:06:30 2010 (4BDC4376)
    fffff880`015f0000 fffff880`015f9000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f8c000 fffff880`00f95000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`069ae000 fffff880`069cf000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`018e6000 fffff880`018f4000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018f4000 fffff880`01900000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01900000 fffff880`01909000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01909000 fffff880`0191c000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    RTKVHD64.sys is your Realtek High Definition Audio Function (sound card) Driver Realtek

    I suggest you upgrade your mouse driver or upgrade your mouse. Then try reinstalling RTKVHD64.sys. The driver is current; but it could possibly be corrupt.

    Reboot and make sure Driver Verifier is turned off. If you get another BSOD, upload the dump file and turn Driver Verifier back on.

    Keep us posted on how you are doing.
      My Computer


  3. Posts : 12
    Win 7 64bit
    Thread Starter
       #13

    Hi carl,

    Im not sure if the verifier had been turned off. Basically, I turned off (by choosing delete existing setting), then reboot my system. However, every reboot attempt directs me to a BSOD with memory corruption. I will tell you more using my other laptop.(in case of another BSOD). I attached the minidump here.
      My Computer


  4. Posts : 12
    Win 7 64bit
    Thread Starter
       #14

    Carl,

    Thanks for your patience in helping me out. Seeing so many memory corruption error. I decided to perform another Memtest. This time round it return me with errors, alot of them. Hence I done the following,

    01 & 02 RAM on slot 01 n 02: Errors return on test#5 onwards.
    01 RAM on Slot 01: No error
    02 RAM on Slot 01: No error
    02 RAM on slot 02: No error

    With the results, i retested step1; this time round ensuring tt it is properly secured. Result is the same, error on test#5 onward.

    FYI, I not tamper on any setting on bios.

    any idea?
      My Computer


  5. Posts : 11,840
    64-bit Windows 8.1 Pro
       #15

    Replace the defective ram ....
      My Computer


  6. Posts : 140
    Windows 7 Home Premium 64bit
       #16

    Both sticks reported no errors in other slots and individually. So you might have a bad dimm slot.
      My Computer


  7. Posts : 12
    Win 7 64bit
    Thread Starter
       #17

    Thank you everyone. I think my com is now fixed.
      My Computer


  8. JMH
    Posts : 7,952
    Win 7 Ultimate 64-bit. SP1.
       #18

    Pleased to hear that. Thanks for reporting back.
    Jan.
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #19

    fildoo said:
    Thank you everyone. I think my com is now fixed.
    I am late getting back to the thread. Very good job on running Memtest again. I think you have a bad slot. It appears that both sticks are good. I am glad you are running smoothly now. Thank you for reporting back.

    Did you take care of your obsolete mouse driver?
      My Computer


  10. Posts : 12
    Win 7 64bit
    Thread Starter
       #20

    CarlTR6 said:
    fildoo said:
    Thank you everyone. I think my com is now fixed.
    I am late getting back to the thread. Very good job on running Memtest again. I think you have a bad slot. It appears that both sticks are good. I am glad you are running smoothly now. Thank you for reporting back.

    Did you take care of your obsolete mouse driver?
    hi Carlt

    Oh what happened is that my previous ram.. is not compatible to my pc's motherboard when it runs 2 rams.. I try 5 others ram brands.. and they all work well to all slots. In the end.. i ended up with team elite, (wasn't a very popular name in singapore thou.)

    Yeap. I got the mouse driver updated fm the website.
      My Computer


 
Page 2 of 3 FirstFirst 123 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 17:20.
Find Us