Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

BSOD


  • Please log in to reply
1 reply to this topic

#1 slicki

slicki

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:27 PM

Posted 07 October 2012 - 09:59 PM

Hi there! This is my first post to this forum, prompted by an annoying and frequent BSOD problem which I've had for about six months. A few months ago, I took it back to the technician who assembled the computer. He checked the hardware out and did a thorough virus scan, but found no problems. I've used the windows check disk and memory diagnostic tools but found no problems. Microsoft Security Essentials also reports no problems, neither does Malwarebytes or Super Anti-Spyware. I tried a System Restore to no avail. I've also updated the display driver, sound driver, and ethernet driver.

The BSODs seem very random. They have occurred when browsing harmless sites on the web, playing music through itunes, or when the computer is sitting idle. For a while, they seemed to go away but then Firefox kept randomly crashing instead. I've updated all my Firefox add ons (Flash, Java, etc) but it still crashes on occasion.

I've attached a specifications file for my computer, plus a blue screen view text file for my most recent BSODs. I don't have a record of the earlier crashes as I've used CCcleaner.

I hope that someone can help me fix this. I would really appreciate it. I'm not very technically-minded, but hopefully I can follow any relevant instructions. Thank you!

Attached Files



BC AdBot (Login to Remove)

 


#2 slicki

slicki
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:27 PM

Posted 08 October 2012 - 01:19 AM

Hi again! I followed the tutorial on this website concerning how to use Windows debugging tools to generate a report. Below I have posted information from my most recent minidump. I hope it makes sense to someone here:


Microsoft ® Windows Debugger Version 6.2.9200.16384 AMD64
Copyright © Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\100812-18548-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e9d670
Debug session time: Mon Oct 8 10:58:07.037 2012 (UTC + 11:00)
System Uptime: 0 days 0:51:36.348
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa80035261d0, ffff, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+355e4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80035261d0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: MsMpEng.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002d43b40 to fffff80002cd81c0

STACK_TEXT:
fffff880`08756828 fffff800`02d43b40 : 00000000`0000001a 00000000`00041790 fffffa80`035261d0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08756830 fffff800`02d0aea9 : 00000000`00000000 00000000`0cb68fff fffff880`00000000 fffff880`00961000 : nt! ?? ::FNODOBFM::`string'+0x355e4
fffff880`087569f0 fffff800`02feaec1 : fffffa80`06525170 00000000`00000000 fffffa80`065d24a0 fffffa80`065d24a0 : nt!MiRemoveMappedView+0xd9
fffff880`08756b10 fffff800`02feb2c3 : 0000007f`00000000 00000000`0c500000 fffffa80`00000001 00000000`77331201 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08756bd0 fffff800`02cd7453 : 00000000`00000008 00000000`7734f314 fffffa80`05960b30 00000000`00000026 : nt!NtUnmapViewOfSection+0x5f
fffff880`08756c20 00000000`773315ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`019bc8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773315ba


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+355e4
fffff800`02d43b40 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+355e4

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80035261d0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: MsMpEng.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002d43b40 to fffff80002cd81c0

STACK_TEXT:
fffff880`08756828 fffff800`02d43b40 : 00000000`0000001a 00000000`00041790 fffffa80`035261d0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08756830 fffff800`02d0aea9 : 00000000`00000000 00000000`0cb68fff fffff880`00000000 fffff880`00961000 : nt! ?? ::FNODOBFM::`string'+0x355e4
fffff880`087569f0 fffff800`02feaec1 : fffffa80`06525170 00000000`00000000 fffffa80`065d24a0 fffffa80`065d24a0 : nt!MiRemoveMappedView+0xd9
fffff880`08756b10 fffff800`02feb2c3 : 0000007f`00000000 00000000`0c500000 fffffa80`00000001 00000000`77331201 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08756bd0 fffff800`02cd7453 : 00000000`00000008 00000000`7734f314 fffffa80`05960b30 00000000`00000026 : nt!NtUnmapViewOfSection+0x5f
fffff880`08756c20 00000000`773315ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`019bc8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773315ba


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+355e4
fffff800`02d43b40 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+355e4

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80035261d0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: MsMpEng.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002d43b40 to fffff80002cd81c0

STACK_TEXT:
fffff880`08756828 fffff800`02d43b40 : 00000000`0000001a 00000000`00041790 fffffa80`035261d0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08756830 fffff800`02d0aea9 : 00000000`00000000 00000000`0cb68fff fffff880`00000000 fffff880`00961000 : nt! ?? ::FNODOBFM::`string'+0x355e4
fffff880`087569f0 fffff800`02feaec1 : fffffa80`06525170 00000000`00000000 fffffa80`065d24a0 fffffa80`065d24a0 : nt!MiRemoveMappedView+0xd9
fffff880`08756b10 fffff800`02feb2c3 : 0000007f`00000000 00000000`0c500000 fffffa80`00000001 00000000`77331201 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08756bd0 fffff800`02cd7453 : 00000000`00000008 00000000`7734f314 fffffa80`05960b30 00000000`00000026 : nt!NtUnmapViewOfSection+0x5f
fffff880`08756c20 00000000`773315ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`019bc8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773315ba


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+355e4
fffff800`02d43b40 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+355e4

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80035261d0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: MsMpEng.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002d43b40 to fffff80002cd81c0

STACK_TEXT:
fffff880`08756828 fffff800`02d43b40 : 00000000`0000001a 00000000`00041790 fffffa80`035261d0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08756830 fffff800`02d0aea9 : 00000000`00000000 00000000`0cb68fff fffff880`00000000 fffff880`00961000 : nt! ?? ::FNODOBFM::`string'+0x355e4
fffff880`087569f0 fffff800`02feaec1 : fffffa80`06525170 00000000`00000000 fffffa80`065d24a0 fffffa80`065d24a0 : nt!MiRemoveMappedView+0xd9
fffff880`08756b10 fffff800`02feb2c3 : 0000007f`00000000 00000000`0c500000 fffffa80`00000001 00000000`77331201 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08756bd0 fffff800`02cd7453 : 00000000`00000008 00000000`7734f314 fffffa80`05960b30 00000000`00000026 : nt!NtUnmapViewOfSection+0x5f
fffff880`08756c20 00000000`773315ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`019bc8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773315ba


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+355e4
fffff800`02d43b40 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+355e4

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+355e4

Followup: MachineOwner
---------




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users