Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: svchoste.exe problems

23 Jun 2010   #21
shawaj

7 64bit
 
 

tried latency checker and whats running....

latency is fine...actualy seems to drop down into low green when music playing.

couldnt find out anything more about the svchost.exe processes in whats running

problem is very weird, not always there, it comes and goes...will be there for 20 mins, then stop then come back later.

or i will get a bsod and then restart and then it will happen again.


My System SpecsSystem Spec
.
23 Jun 2010   #22
fishnbanjo

Vista 64 Ultimate, Windows 7 64 Ultimate, Ubuntu 9.10
 
 

If you can grab the mini.dmp file from the BSOD that might nail it for us and get you clean again. Good job on the network driver by the way.
My System SpecsSystem Spec
23 Jun 2010   #23
shawaj

7 64bit
 
 

how do i read the .dmp files? microsoft debugging tools?
My System SpecsSystem Spec
.

23 Jun 2010   #24
shawaj

7 64bit
 
 

found 11 mini dumps and the memory.dmp, just trying to get them now.
My System SpecsSystem Spec
23 Jun 2010   #25
fishnbanjo

Vista 64 Ultimate, Windows 7 64 Ultimate, Ubuntu 9.10
 
 

There's a tutorial on how to make a screen shot here Tutorials - Windows 7 Forums
My System SpecsSystem Spec
23 Jun 2010   #26
shawaj

7 64bit
 
 

im cool with making the screenshot, but how do i open the dmp file? i cant find windbg even though i installed debugging tools for windows
My System SpecsSystem Spec
23 Jun 2010   #27
shawaj

7 64bit
 
 

here is the debug file text for the last bsod:


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062310-37674-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Wed Jun 23 18:14:51.760 2010 (UTC + 1:00)
System Uptime: 0 days 0:06:39.742
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F7, {180c5948a90, 24f12c4c4b5d, ffffdb0ed3b3b4a2, 0}

Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 00000180c5948a90, Actual security check cookie from the stack
Arg2: 000024f12c4c4b5d, Expected security check cookie
Arg3: ffffdb0ed3b3b4a2, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


DEFAULT_BUCKET_ID: GS_FALSE_POSITIVE_MISSING_GSFRAME

SECURITY_COOKIE: Expected 000024f12c4c4b5d found 00000180c5948a90

CUSTOMER_CRASH_COUNT: 1

BUGCHECK_STR: 0xF7

PROCESS_NAME: firefox.exe

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff880073dbaa8 -- (.exr 0xfffff880073dbaa8)
ExceptionAddress: fffff80002a8e411 (nt!SepAccessCheck+0x0000000000000501)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME: fffff880073dbb50 -- (.trap 0xfffff880073dbb50)
Unable to read trap frame at fffff880`073dbb50

LAST_CONTROL_TRANSFER: from fffff80002b1d405 to fffff80002a88600

STACK_TEXT:
fffff880`073dab58 fffff800`02b1d405 : 00000000`000000f7 00000180`c5948a90 000024f1`2c4c4b5d ffffdb0e`d3b3b4a2 : nt!KeBugCheckEx
fffff880`073dab60 fffff800`02ad72f7 : 0000f0f0`0000000a fffff960`000e0082 fffff880`073db310 fffff800`02ab5524 : nt!_report_gsfailure+0x25
fffff880`073daba0 fffff800`02aae2ed : 00000000`0010001f fffff880`073db310 fffff880`073dbb50 fffff880`073dbaa8 : nt!_GSHandlerCheck+0x13
fffff880`073dabd0 fffff800`02ab5950 : fffff800`02bd211c fffff880`073dac48 fffff880`073dbaa8 fffff800`02a18000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`073dac00 fffff800`02ac28df : fffff880`073dbaa8 fffff880`073db310 fffff880`00000000 fffff880`009e4180 : nt!RtlDispatchException+0x410
fffff880`073db2e0 fffff800`02a87c42 : fffff880`073dbaa8 fffffa80`0440c060 fffff880`073dbb50 fffffa80`04b52b60 : nt!KiDispatchException+0x16f
fffff880`073db970 fffff800`02a85d9f : fffff880`073dbb50 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`073dbb50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!_report_gsfailure+25
fffff800`02b1d405 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!_report_gsfailure+25

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb

FAILURE_BUCKET_ID: X64_0xF7_MISSING_GSFRAME_nt!_report_gsfailure+25

BUCKET_ID: X64_0xF7_MISSING_GSFRAME_nt!_report_gsfailure+25

Followup: MachineOwner
---------
My System SpecsSystem Spec
23 Jun 2010   #28
shawaj

7 64bit
 
 

that one above is the mini dump and this is the memory.dmp file


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Wed Jun 23 18:14:51.760 2010 (UTC + 1:00)
System Uptime: 0 days 0:06:39.742
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F7, {180c5948a90, 24f12c4c4b5d, ffffdb0ed3b3b4a2, 0}

Page 1a2c7 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : hardware ( win32k!SURFACE::bUnMap+28 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 00000180c5948a90, Actual security check cookie from the stack
Arg2: 000024f12c4c4b5d, Expected security check cookie
Arg3: ffffdb0ed3b3b4a2, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


DEFAULT_BUCKET_ID: GS_FALSE_POSITIVE_MISSING_GSFRAME

SECURITY_COOKIE: Expected 000024f12c4c4b5d found 00000180c5948a90

BUGCHECK_STR: 0xF7

PROCESS_NAME: firefox.exe

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff880073dbaa8 -- (.exr 0xfffff880073dbaa8)
ExceptionAddress: fffff80002a8e411 (nt!SepAccessCheck+0x0000000000000501)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME: fffff880073dbb50 -- (.trap 0xfffff880073dbb50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880073dbde0 rbx=0000000000000000 rcx=fffffa800440c060
rdx=fffffa8004b52b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a8e411 rsp=fffff880073dbce0 rbp=fffffa800440c060
r8=fffffa800440c100 r9=000000000000000e r10=0000000000000000
r11=fffff880009e4180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv dn ei ng nz na pe nc
nt!SepAccessCheck+0x501:
fffff800`02a8e411 ff ???
Resetting default scope

MISALIGNED_IP:
nt!SepAccessCheck+501
fffff800`02a8e411 ff ???

LAST_CONTROL_TRANSFER: from fffff80002b1d405 to fffff80002a88600

STACK_TEXT:
fffff880`073dab58 fffff800`02b1d405 : 00000000`000000f7 00000180`c5948a90 000024f1`2c4c4b5d ffffdb0e`d3b3b4a2 : nt!KeBugCheckEx
fffff880`073dab60 fffff800`02ad72f7 : 0000f0f0`0000000a fffff960`000e0082 fffff880`073db310 fffff800`02ab5524 : nt!_report_gsfailure+0x25
fffff880`073daba0 fffff800`02aae2ed : 00000000`0010001f fffff880`073db310 fffff880`073dbb50 fffff880`073dbaa8 : nt!_GSHandlerCheck+0x13
fffff880`073dabd0 fffff800`02ab5950 : fffff800`02bd211c fffff880`073dac48 fffff880`073dbaa8 fffff800`02a18000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`073dac00 fffff800`02ac28df : fffff880`073dbaa8 fffff880`073db310 fffff880`00000000 fffff880`009e4180 : nt!RtlDispatchException+0x410
fffff880`073db2e0 fffff800`02a87c42 : fffff880`073dbaa8 fffffa80`0440c060 fffff880`073dbb50 fffffa80`04b52b60 : nt!KiDispatchException+0x16f
fffff880`073db970 fffff800`02a85d9f : fffff880`073dbb50 fffff900`c0218f02 fffff900`c0218f00 fffff800`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`073dbb50 fffff800`02a8e411 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`073dbce0 00000001`00000000 : fffff880`009e4180 fffff800`02a3f304 fffffa80`0440c060 fffffa80`04b52b60 : nt!SepAccessCheck+0x501
fffff880`073dbe10 fffff880`009e4180 : fffff800`02a3f304 fffffa80`0440c060 fffffa80`04b52b60 00000000`00000000 : 0x1`00000000
fffff880`073dbe18 fffff800`02a3f304 : fffffa80`0440c060 fffffa80`04b52b60 00000000`00000000 fffff880`073dbe90 : 0xfffff880`009e4180
fffff880`073dbe20 fffff800`02a8e592 : 00000000`0000000f fffff880`009e4180 fffff880`073dbf10 fffff880`073dc110 : nt!KiQuantumEnd+0x1b4
fffff880`073dbe60 fffff800`02ad39dc : fffffa80`01befd70 fffff880`009e4180 00000000`00000000 fffff880`009e4180 : nt!KiDispatchInterruptContinue+0x16
fffff880`073dbe90 fffff800`02a91411 : 00000000`00000000 fffff900`000e0082 fffff960`002ebaa8 fffff960`002ebac8 : nt!KiDpcInterrupt+0xcc
fffff880`073dc020 fffff960`00273858 : fffff900`00000000 fffff960`00000001 fffff880`073dc190 fffff960`000f2900 : nt!KeReleaseMutant+0x151
fffff880`073dc0d0 fffff960`000c6bdf : fffff900`00000000 00000000`00000000 00000000`000000c8 00000000`000000d8 : win32k!SURFACE::bUnMap+0x28
fffff880`073dc100 fffff960`00104705 : fffff900`c00bf010 fffff960`00223309 fffff880`073dc288 00000141`000000d1 : win32k!DEVLOCKOBJ::vFlushSpriteUpdates+0x13f
fffff880`073dc150 fffff960`001045d6 : fffff880`073dc288 fffff880`073dc390 00000000`00000000 fffff880`00000001 : win32k!DEVLOCKOBJ::bDisposeTrgDco+0x61
fffff880`073dc180 fffff960`0005f561 : fffff900`c3fbf630 00000000`00000000 fffff880`073dc390 fffff900`c0000340 : win32k!DEVLOCKOBJ::~DEVLOCKOBJ+0xe
fffff880`073dc1b0 fffff960`00232ce8 : fffff880`073dc390 000007ff`fffdd000 00000000`0013ee58 fffff960`ffffffff : win32k!GrePolyPatBltInternal+0x3e1
fffff880`073dc300 fffff800`02a87853 : 00000000`0013edc8 fffff880`00f00021 00000000`0013ee40 fffff880`00000001 : win32k!NtGdiPolyPatBlt+0x308
fffff880`073dc430 000007fe`fefd15da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0013eda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fefd15da


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!SURFACE::bUnMap+28
fffff960`00273858 b801000000 mov eax,1

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: win32k!SURFACE::bUnMap+28

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: hardware

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: hardware

FAILURE_BUCKET_ID: X64_IP_MISALIGNED

BUCKET_ID: X64_IP_MISALIGNED

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 00000180c5948a90, Actual security check cookie from the stack
Arg2: 000024f12c4c4b5d, Expected security check cookie
Arg3: ffffdb0ed3b3b4a2, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


DEFAULT_BUCKET_ID: GS_FALSE_POSITIVE_MISSING_GSFRAME

SECURITY_COOKIE: Expected 000024f12c4c4b5d found 00000180c5948a90

BUGCHECK_STR: 0xF7

PROCESS_NAME: firefox.exe

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff880073dbaa8 -- (.exr 0xfffff880073dbaa8)
ExceptionAddress: fffff80002a8e411 (nt!SepAccessCheck+0x0000000000000501)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME: fffff880073dbb50 -- (.trap 0xfffff880073dbb50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880073dbde0 rbx=0000000000000000 rcx=fffffa800440c060
rdx=fffffa8004b52b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a8e411 rsp=fffff880073dbce0 rbp=fffffa800440c060
r8=fffffa800440c100 r9=000000000000000e r10=0000000000000000
r11=fffff880009e4180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv dn ei ng nz na pe nc
nt!SepAccessCheck+0x501:
fffff800`02a8e411 ff ???
Resetting default scope

MISALIGNED_IP:
nt!SepAccessCheck+501
fffff800`02a8e411 ff ???

LAST_CONTROL_TRANSFER: from fffff80002b1d405 to fffff80002a88600

STACK_TEXT:
fffff880`073dab58 fffff800`02b1d405 : 00000000`000000f7 00000180`c5948a90 000024f1`2c4c4b5d ffffdb0e`d3b3b4a2 : nt!KeBugCheckEx
fffff880`073dab60 fffff800`02ad72f7 : 0000f0f0`0000000a fffff960`000e0082 fffff880`073db310 fffff800`02ab5524 : nt!_report_gsfailure+0x25
fffff880`073daba0 fffff800`02aae2ed : 00000000`0010001f fffff880`073db310 fffff880`073dbb50 fffff880`073dbaa8 : nt!_GSHandlerCheck+0x13
fffff880`073dabd0 fffff800`02ab5950 : fffff800`02bd211c fffff880`073dac48 fffff880`073dbaa8 fffff800`02a18000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`073dac00 fffff800`02ac28df : fffff880`073dbaa8 fffff880`073db310 fffff880`00000000 fffff880`009e4180 : nt!RtlDispatchException+0x410
fffff880`073db2e0 fffff800`02a87c42 : fffff880`073dbaa8 fffffa80`0440c060 fffff880`073dbb50 fffffa80`04b52b60 : nt!KiDispatchException+0x16f
fffff880`073db970 fffff800`02a85d9f : fffff880`073dbb50 fffff900`c0218f02 fffff900`c0218f00 fffff800`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`073dbb50 fffff800`02a8e411 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`073dbce0 00000001`00000000 : fffff880`009e4180 fffff800`02a3f304 fffffa80`0440c060 fffffa80`04b52b60 : nt!SepAccessCheck+0x501
fffff880`073dbe10 fffff880`009e4180 : fffff800`02a3f304 fffffa80`0440c060 fffffa80`04b52b60 00000000`00000000 : 0x1`00000000
fffff880`073dbe18 fffff800`02a3f304 : fffffa80`0440c060 fffffa80`04b52b60 00000000`00000000 fffff880`073dbe90 : 0xfffff880`009e4180
fffff880`073dbe20 fffff800`02a8e592 : 00000000`0000000f fffff880`009e4180 fffff880`073dbf10 fffff880`073dc110 : nt!KiQuantumEnd+0x1b4
fffff880`073dbe60 fffff800`02ad39dc : fffffa80`01befd70 fffff880`009e4180 00000000`00000000 fffff880`009e4180 : nt!KiDispatchInterruptContinue+0x16
fffff880`073dbe90 fffff800`02a91411 : 00000000`00000000 fffff900`000e0082 fffff960`002ebaa8 fffff960`002ebac8 : nt!KiDpcInterrupt+0xcc
fffff880`073dc020 fffff960`00273858 : fffff900`00000000 fffff960`00000001 fffff880`073dc190 fffff960`000f2900 : nt!KeReleaseMutant+0x151
fffff880`073dc0d0 fffff960`000c6bdf : fffff900`00000000 00000000`00000000 00000000`000000c8 00000000`000000d8 : win32k!SURFACE::bUnMap+0x28
fffff880`073dc100 fffff960`00104705 : fffff900`c00bf010 fffff960`00223309 fffff880`073dc288 00000141`000000d1 : win32k!DEVLOCKOBJ::vFlushSpriteUpdates+0x13f
fffff880`073dc150 fffff960`001045d6 : fffff880`073dc288 fffff880`073dc390 00000000`00000000 fffff880`00000001 : win32k!DEVLOCKOBJ::bDisposeTrgDco+0x61
fffff880`073dc180 fffff960`0005f561 : fffff900`c3fbf630 00000000`00000000 fffff880`073dc390 fffff900`c0000340 : win32k!DEVLOCKOBJ::~DEVLOCKOBJ+0xe
fffff880`073dc1b0 fffff960`00232ce8 : fffff880`073dc390 000007ff`fffdd000 00000000`0013ee58 fffff960`ffffffff : win32k!GrePolyPatBltInternal+0x3e1
fffff880`073dc300 fffff800`02a87853 : 00000000`0013edc8 fffff880`00f00021 00000000`0013ee40 fffff880`00000001 : win32k!NtGdiPolyPatBlt+0x308
fffff880`073dc430 000007fe`fefd15da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0013eda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fefd15da


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!SURFACE::bUnMap+28
fffff960`00273858 b801000000 mov eax,1

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: win32k!SURFACE::bUnMap+28

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: hardware

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: hardware

FAILURE_BUCKET_ID: X64_IP_MISALIGNED

BUCKET_ID: X64_IP_MISALIGNED

Followup: MachineOwner
---------
My System SpecsSystem Spec
23 Jun 2010   #29
whs
Microsoft MVP

Vista, Windows7, Mint Mate, Zorin, Windows 8
 
 

It seems to be bugcheck 0xF7 all the time. Here is some information on it. Not sure how far that can help.
My System SpecsSystem Spec
23 Jun 2010   #30
shawaj

7 64bit
 
 

i have just had 3 or 4 bsods in the last half hour!!! this is getting annoying.

i think it has to be something to do wiyh the sound or graphics card, as when i remove both and use onboard graphics it works a treat!!

think it might be the graphics card since even with the sound card not in it was still happening.

i am going to test with sound card and no graphics to see if that solves the problem.

very very frustrating, i have been working on this for dayyyyys
My System SpecsSystem Spec
Reply

 svchoste.exe problems




Thread Tools




Similar help and support threads
Thread Forum
Many problems with video errors and somehow RAM problems
Okay so for a while now i have been having many problems. First off i had a PC with the video card i am using right now(Nvidia GTX 295), and it has been "losing signal" and just plain old crashing. So i bought a PC off my uncle. Its got reletivly good hardware, but i am still getting the same...
General Discussion
USB Problems, Errors and port problems!
I have a Dell Inspiron 1545 laptop, not to long ago I had to replace my hard drive. After that I reinstalled windows 7. Before this the usb devices would charge just not be recognized. Now only ONE port does everything (charge, sync, etc.) the other two just stopped working. I have no clue if its a...
Hardware & Devices
Can't start up my computer. (Driver problems, BSOD, other problems)
Hi I hope I'm placing this in the right section, if not, then could someone tell me where to put it and I'll post it again. I've got a Samsung RV510 laptop with Windows 7 HP 64 bit. About 2 weeks ago, I was watching a Youtube video, had Spotify and Facebook open too, and my computer...
BSOD Help and Support
extract problems, random BSOD errors all those problems
hi guys i dunno why i have many problems with win7 since installation and so far btw i wrote many topics before about my installation and eventually i didn't found any solution so i took my pc to computer shop and they solve the problem after that i installed win7 without any problems...
BSOD Help and Support
Windows Index Problems a.k.a Windows Assesment Problems
Hi, I have had Windows 7 for a while now and have continually tried to run windows assesment tool for a while now, but each time I run it, it always ends up having a problem when it starts "Tuning Windows Media Decoding" and ends up closing. This is not terribly important but I was just wondering...
Performance & Maintenance
Problems leading to problems...
Hello, I am new to the forum, and I am hoping someone can help me out. I am attempting to install Win 7RC 64 bit on my system and seem to run into another problem as soon as I solve one. I am now at a problem that has me at a loss. Bear with me as I outline what I have done so far. I had...
Installation & Setup


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 08:07.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App