Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Recurring daily BSOD after never having any


  • Please log in to reply
37 replies to this topic

#1 orion44

orion44

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 17 March 2016 - 12:51 PM

Motherboard: Z170A KRAIT GAMING
OS: Windows 7 Ultimate SP1
Specs:
CPU: Intel® Core™ i7-6700K 4.00 GHz
MOTHERBOARD: MSI Z170A Krait Gaming (White design)
FAN: Asetek 550LC 120mm Liquid Cooling
HDD: 512GB SanDisk X300 SATA-III SSD
HDD2: 2TB Toshiba SATA-III HDD
RAM: 32 GB (8 GBx4) DDR4/2400MHz Memory (ADATA XPG Z1)
OS: Windows 7 Ultimate x64 SP1
POWERSUPPLY: 1050 Watts - EVGA SuperNOVA 1050 GS 80 Plus Gold Power Supply
VIDEO: EVGA Superclocked NVIDIA GeForce GTX 960 2GB GDDR5 PCIe 3.0 x16 (Maxwell)
MONITOR: ASUS VG248QE 144Hz Refresh Rate
SOUND: ASUS XONAR DG - Logitech Z-5300 5.1-Channel Surround Speaker System
XMP: Disabled
OC: Nothing OC - all BIOS default
 
 
WhoCrashed error report:
On Thu 3/17/2016 12:40:01 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\031716-9016-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x74080)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA8010C8DB60, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
 
On Thu 3/17/2016 12:40:01 PM GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: ntdll.dll (ntdll!NtUnmapViewOfSection+0xA)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA8010C8DB60, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntdll.dll
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Layer DLL
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
 
On Wed 3/16/2016 12:38:10 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\031616-8845-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x74080)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA8010BB4FF0, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
 
On Mon 3/14/2016 12:36:21 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\031416-9235-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x74080)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA8010CD5020, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.
 
Minidump files here:
 
Steps to reproduce:
1.) Shutdown computer for extended period of time - example: Overnight (8 hours)
2.) Turn computer on
3.) After booting into Windows - don't do much - example: Open Chrome browser
4.) BSOD
 
Steps taken:
  • Enabled full crash dump capturing
  • Rebuilt Windows pagefile (disable, reboot, enable)
  • Boot via USB and ran memtest86 for 8+ hours - No memory errors found
  • Using BIOS A.70 or A.80 - No effect -  BSOD occurs
  • Rolled NVIDIA driver back to 362.00 - due to recent issues noted with latest updates. No effect.
 
Other notes:
Ran AIDA64 stress test for 30 minutes each time I updated to A.70 and A.80 - no issues and no BSOD
Issues does not occur when rebooting Windows - only after shutdown and "cold" boot after being turned off overnight.
 
Latest Windows updates were installed on 3/9:
 
Capture.PNG
 
 
Prior to 3/14/2016, I never received any BSOD since the computer was built in 10/2015.  I am currently trying A.60 BIOS and will check after next cold boot for BSOD.  Do you bet it's a Windows software issue due to the latest updates?

Primary Analysis
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
Machine Name:
Kernel base = 0xfffff800`03409000 PsLoadedModuleList = 0xfffff800`03650730
Debug session time: Thu Mar 17 08:40:01.761 2016 (UTC - 4:00)
System Uptime: 0 days 0:03:14.480
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8010c8db60
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff800034edc20 to fffff8000347d080

STACK_TEXT:
fffff880`0ccbb6e8 fffff800`034edc20 : 00000000`0000001a 00000000`00041790 fffffa80`10c8db60 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0ccbb6f0 fffff800`034afe49 : fffff880`00000000 00000000`56b01fff 00000000`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x33854
fffff880`0ccbb8b0 fffff800`0379a541 : fffffa80`1b6e9cb0 00000000`00000000 fffffa80`2122fe90 fffffa80`2122fe90 : nt!MiRemoveMappedView+0xd9
fffff880`0ccbb9d0 fffff800`0379a943 : 0000007f`00000000 00000000`378e0000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0ccbba90 fffff800`0347c313 : 00000000`00000001 00000000`3690b620 fffffa80`1d77b540 00000000`3690b618 : nt!NtUnmapViewOfSection+0x5f
fffff880`0ccbbae0 00000000`7778d65a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`035fda18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7778d65a


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33854
fffff800`034edc20 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33854

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 56bcc786

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854

Followup: MachineOwner
---------


This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
expand.gifCrash Code Links collapse.gifLoaded Module List
start end module name
fffff800`00bb9000 fffff800`00bc3000 kdcom kdcom.dll
fffff800`03409000 fffff800`039f5000 nt ntkrnlmp.exe
fffff800`039f5000 fffff800`03a3e000 hal hal.dll
fffff880`00c00000 fffff880`00c4c000 FLTMGR FLTMGR.SYS
fffff880`00c4c000 fffff880`00c66000 mountmgr mountmgr.sys
fffff880`00c66000 fffff880`00c90000 ataport ataport.SYS
fffff880`00c98000 fffff880`00ce7000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll
fffff880`00ce7000 fffff880`00cfb000 PSHED PSHED.dll
fffff880`00cfb000 fffff880`00d59000 CLFS CLFS.SYS
fffff880`00d59000 fffff880`00dce000 CI CI.dll
fffff880`00dce000 fffff880`00dde000 PCIIDEX PCIIDEX.SYS
fffff880`00dde000 fffff880`00df2000 fileinfo fileinfo.sys
fffff880`00e00000 fffff880`00e15000 volmgr volmgr.sys
fffff880`00e15000 fffff880`00e71000 volmgrx volmgrx.sys
fffff880`00e71000 fffff880`00e7f000 klbackupdisk klbackupdisk.sys
fffff880`00e7f000 fffff880`00e8a000 msahci msahci.sys
fffff880`00e8f000 fffff880`00f51000 Wdf01000 Wdf01000.sys
fffff880`00f51000 fffff880`00f61000 WDFLDR WDFLDR.SYS
fffff880`00f61000 fffff880`00f94000 pci pci.sys
fffff880`00f94000 fffff880`00ff4000 cm_km cm_km.sys
fffff880`00ff4000 fffff880`00fff000 amdxata amdxata.sys
fffff880`01000000 fffff880`0100d000 vdrvroot vdrvroot.sys
fffff880`0100d000 fffff880`01022000 partmgr partmgr.sys
fffff880`0102a000 fffff880`0178c000 kl1 kl1.sys
fffff880`0178c000 fffff880`017e3000 ACPI ACPI.sys
fffff880`017e3000 fffff880`017ec000 WMILIB WMILIB.SYS
fffff880`017ec000 fffff880`017f6000 msisadrv msisadrv.sys
fffff880`017f6000 fffff880`017ff000 atapi atapi.sys
fffff880`01812000 fffff880`019bb000 Ntfs Ntfs.sys
fffff880`019bb000 fffff880`019eb000 CLASSPNP CLASSPNP.SYS
fffff880`01a00000 fffff880`01a4c000 volsnap volsnap.sys
fffff880`01a4c000 fffff880`01a86000 rdyboost rdyboost.sys
fffff880`01a86000 fffff880`01a8f000 hwpolicy hwpolicy.sys
fffff880`01a8f000 fffff880`01ac9000 fvevol fvevol.sys
fffff880`01ac9000 fffff880`01adf000 disk disk.sys
fffff880`01ae6000 fffff880`01b44000 msrpc msrpc.sys
fffff880`01b44000 fffff880`01b5f000 ksecdd ksecdd.sys
fffff880`01b5f000 fffff880`01bd1000 cng cng.sys
fffff880`01bd1000 fffff880`01be2000 pcw pcw.sys
fffff880`01be2000 fffff880`01bec000 Fs_Rec Fs_Rec.sys
fffff880`01c00000 fffff880`01c10000 vmstorfl vmstorfl.sys
fffff880`01c10000 fffff880`01c18000 spldr spldr.sys
fffff880`01c18000 fffff880`01c2a000 mup mup.sys
fffff880`01c31000 fffff880`01d24000 ndis ndis.sys
fffff880`01d24000 fffff880`01d84000 NETIO NETIO.SYS
fffff880`01d84000 fffff880`01daf000 ksecpkg ksecpkg.sys
fffff880`01daf000 fffff880`01df8000 fwpkclnt fwpkclnt.sys
fffff880`01e00000 fffff880`01fff000 tcpip tcpip.sys
fffff880`03200000 fffff880`03289000 afd afd.sys
fffff880`03289000 fffff880`032ce000 netbt netbt.sys
fffff880`032ce000 fffff880`032d7000 wfplwf wfplwf.sys
fffff880`032d7000 fffff880`032eb000 termdd termdd.sys
fffff880`032fe000 fffff880`03328000 cdrom cdrom.sys
fffff880`03328000 fffff880`0333a000 klbackupflt klbackupflt.sys
fffff880`0333a000 fffff880`03373000 klflt klflt.sys
fffff880`03373000 fffff880`0337e000 Msfs Msfs.SYS
fffff880`0337e000 fffff880`0338f000 Npfs Npfs.SYS
fffff880`0338f000 fffff880`033b1000 tdx tdx.sys
fffff880`033b1000 fffff880`033be000 TDI TDI.SYS
fffff880`033be000 fffff880`033ce000 kltdi kltdi.sys
fffff880`033ce000 fffff880`033e1000 networx networx.sys
fffff880`04600000 fffff880`04656000 klhk klhk.sys
fffff880`04656000 fffff880`0465f000 klpd klpd.sys
fffff880`0465f000 fffff880`04668000 Null Null.SYS
fffff880`04668000 fffff880`0466f000 Beep Beep.SYS
fffff880`0466f000 fffff880`0467d000 vga vga.sys
fffff880`0467d000 fffff880`0468d000 watchdog watchdog.sys
fffff880`0468d000 fffff880`04696000 RDPCDD RDPCDD.sys
fffff880`04696000 fffff880`0469f000 rdpencdd rdpencdd.sys
fffff880`046a0000 fffff880`0478c000 klif klif.sys
fffff880`0478c000 fffff880`047cf000 ks ks.sys
fffff880`047cf000 fffff880`047f4000 VIDEOPRT VIDEOPRT.SYS
fffff880`047f4000 fffff880`047fd000 rdprefmp rdprefmp.sys
fffff880`04800000 fffff880`048f1000 VBoxDrv VBoxDrv.sys
fffff880`048fd000 fffff880`04923000 pacer pacer.sys
fffff880`04923000 fffff880`0492d000 klim6 klim6.sys
fffff880`0492d000 fffff880`04947000 klwtp klwtp.sys
fffff880`04947000 fffff880`0496a000 VBoxNetAdp6 VBoxNetAdp6.sys
fffff880`0496a000 fffff880`0499e000 VBoxNetLwf VBoxNetLwf.sys
fffff880`0499e000 fffff880`049ad000 netbios netbios.sys
fffff880`049ad000 fffff880`049c8000 wanarp wanarp.sys
fffff880`049c8000 fffff880`049f1000 VBoxUSBMon VBoxUSBMon.sys
fffff880`04a00000 fffff880`04a1e000 dfsc dfsc.sys
fffff880`04a1e000 fffff880`04a2f000 blbdrive blbdrive.sys
fffff880`04a2f000 fffff880`04a55000 tunnel tunnel.sys
fffff880`04a55000 fffff880`04aba000 iusb3hub iusb3hub.sys
fffff880`04ad1000 fffff880`04b22000 rdbss rdbss.sys
fffff880`04b22000 fffff880`04b2e000 nsiproxy nsiproxy.sys
fffff880`04b2e000 fffff880`04b39000 mssmbios mssmbios.sys
fffff880`04b39000 fffff880`04b67000 kneps kneps.sys
fffff880`04b67000 fffff880`04b76000 discache discache.sys
fffff880`04b76000 fffff880`04bf9000 csc csc.sys
fffff880`04e00000 fffff880`04e26000 asmthub3 asmthub3.sys
fffff880`04e2e000 fffff880`04ef6000 iusb3xhc iusb3xhc.sys
fffff880`04ef6000 fffff880`04ef7f00 USBD USBD.SYS
fffff880`04ef8000 fffff880`04f26000 TeeDriverx64 TeeDriverx64.sys
fffff880`04f26000 fffff880`04f93000 asmtxhci asmtxhci.sys
fffff880`04f93000 fffff880`04fa8000 NDProxy NDProxy.SYS
fffff880`04fa8000 fffff880`04fdc000 nvhda64v nvhda64v.sys
fffff880`04fdc000 fffff880`04ff9000 usbccgp usbccgp.sys
fffff880`05000000 fffff880`0503d000 portcls portcls.sys
fffff880`0503d000 fffff880`0505f000 drmk drmk.sys
fffff880`0505f000 fffff880`05064200 ksthunk ksthunk.sys
fffff880`05065000 fffff880`05071700 LGJoyXlCore LGJoyXlCore.sys
fffff880`05072000 fffff880`05084000 umbus umbus.sys
fffff880`05084000 fffff880`05091000 nvvad64v nvvad64v.sys
fffff880`05091000 fffff880`0509f000 kbdhid kbdhid.sys
fffff880`0509f000 fffff880`050ab000 klkbdflt klkbdflt.sys
fffff880`050ab000 fffff880`050b8000 mouhid mouhid.sys
fffff880`050b8000 fffff880`050c4000 klmouflt klmouflt.sys
fffff880`050c7000 fffff880`053f5000 cmudaxp cmudaxp.sys
fffff880`05400000 fffff880`0540f000 mouclass mouclass.sys
fffff880`0540f000 fffff880`05410480 swenum swenum.sys
fffff880`05411000 fffff880`05415e00 LGBusEnum LGBusEnum.sys
fffff880`0541a000 fffff880`05498000 e1d62x64 e1d62x64.sys
fffff880`05498000 fffff880`054a1000 wmiacpi wmiacpi.sys
fffff880`054a1000 fffff880`054b7000 intelppm intelppm.sys
fffff880`054b7000 fffff880`054c7000 CompositeBus CompositeBus.sys
fffff880`054c7000 fffff880`054d2000 uvhid uvhid.sys
fffff880`054d2000 fffff880`054da000 mshidkmdf mshidkmdf.sys
fffff880`054da000 fffff880`054f3000 HIDCLASS HIDCLASS.SYS
fffff880`054f3000 fffff880`054fb080 HIDPARSE HIDPARSE.SYS
fffff880`054fc000 fffff880`05504000 serscan serscan.sys
fffff880`05504000 fffff880`0551a000 AgileVpn AgileVpn.sys
fffff880`0551a000 fffff880`0553e000 rasl2tp rasl2tp.sys
fffff880`0553e000 fffff880`0554a000 ndistapi ndistapi.sys
fffff880`0554a000 fffff880`05579000 ndiswan ndiswan.sys
fffff880`05579000 fffff880`05594000 raspppoe raspppoe.sys
fffff880`05594000 fffff880`055b5000 raspptp raspptp.sys
fffff880`055b5000 fffff880`055cf000 rassstp rassstp.sys
fffff880`055cf000 fffff880`055db000 tap0901 tap0901.sys
fffff880`055db000 fffff880`055e6000 rdpbus rdpbus.sys
fffff880`055e6000 fffff880`055f5000 kbdclass kbdclass.sys
fffff880`0603f000 fffff880`064e0d00 lvuvc64 lvuvc64.sys
fffff880`064e1000 fffff880`064fbd00 usbaudio usbaudio.sys
fffff880`064fc000 fffff880`0654fa80 lvrs64 lvrs64.sys
fffff880`06550000 fffff880`06559000 lgLowAudio lgLowAudio.sys
fffff880`06559000 fffff880`06567000 hidusb hidusb.sys
fffff880`06567000 fffff880`0659b000 bcbtums bcbtums.sys
fffff880`0659b000 fffff880`065ab000 BthEnum BthEnum.sys
fffff880`065ab000 fffff880`065cb000 bthpan bthpan.sys
fffff880`06a00000 fffff880`06a18000 BTHUSB BTHUSB.sys
fffff880`06a18000 fffff880`06aa4000 bthport bthport.sys
fffff880`06aa4000 fffff880`06ad0000 rfcomm rfcomm.sys
fffff880`06ad0000 fffff880`06adc000 Dxapi Dxapi.sys
fffff880`06ae5000 fffff880`06bfa000 btwampfl btwampfl.sys
fffff880`06c00000 fffff880`06c15000 lltdio lltdio.sys
fffff880`06c15000 fffff880`06c2d000 rspndr rspndr.sys
fffff880`06cae000 fffff880`06d16000 btwavdt btwavdt.sys
fffff880`06d16000 fffff880`06d73000 btwaudio btwaudio.sys
fffff880`06d73000 fffff880`06d81000 btwl2cap btwl2cap.sys
fffff880`06d81000 fffff880`06d84a00 btwrchid btwrchid.sys
fffff880`06d85000 fffff880`06d93000 crashdmp crashdmp.sys
fffff880`06d93000 fffff880`06d9f000 dump_dumpata dump_dumpata.sys
fffff880`06d9f000 fffff880`06daa000 dump_msahci dump_msahci.sys
fffff880`06daa000 fffff880`06dbd000 dump_dumpfve dump_dumpfve.sys
fffff880`06dbd000 fffff880`06dcb000 monitor monitor.sys
fffff880`06dcb000 fffff880`06dee000 luafv luafv.sys
fffff880`0700c000 fffff880`070d5000 HTTP HTTP.sys
fffff880`070d5000 fffff880`070f3000 bowser bowser.sys
fffff880`070f3000 fffff880`0710b000 mpsdrv mpsdrv.sys
fffff880`0710b000 fffff880`07138000 mrxsmb mrxsmb.sys
fffff880`07138000 fffff880`07186000 mrxsmb10 mrxsmb10.sys
fffff880`07186000 fffff880`071aa000 mrxsmb20 mrxsmb20.sys
fffff880`071aa000 fffff880`071bc000 kldisk kldisk.sys
fffff880`071bc000 fffff880`071c4000 lgcoretemp lgcoretemp.sys
fffff880`09c12000 fffff880`09cbc000 peauth peauth.sys
fffff880`09cbc000 fffff880`09ced000 srvnet srvnet.sys
fffff880`09ced000 fffff880`09cff000 tcpipreg tcpipreg.sys
fffff880`09cff000 fffff880`09d08000 UltraMonUtility UltraMonUtility.sys
fffff880`09d08000 fffff880`09d71000 srv2 srv2.sys
fffff880`0a480000 fffff880`0a518000 srv srv.sys
fffff880`0a518000 fffff880`0a51f000 NTIOLib_X64 NTIOLib_X64.sys
fffff880`0a526000 fffff880`0a597000 spsys spsys.sys
fffff880`0ae00000 fffff880`0ae0a000 NvStreamKms NvStreamKms.sys
fffff880`0ae0a000 fffff880`0ae15000 asyncmac asyncmac.sys
fffff880`0ae18000 fffff880`0b3ec000 iqvw64e iqvw64e.sys
fffff880`0b3ec000 fffff880`0b3f3000 NTIOLib_X64_fffff8800b3ec000 NTIOLib_X64.sys
fffff880`0b3f3000 fffff880`0b3f5500 LGVirHid LGVirHid.sys
fffff880`0f647000 fffff880`1025b000 nvlddmkm nvlddmkm.sys
fffff880`1025b000 fffff880`10350000 dxgkrnl dxgkrnl.sys
fffff880`10350000 fffff880`10396000 dxgmms1 dxgmms1.sys
fffff880`10396000 fffff880`103ba000 HDAudBus HDAudBus.sys
fffff960`00000000 fffff960`00325000 win32k win32k.sys
fffff960`00590000 fffff960`0059a000 TSDDD TSDDD.dll
fffff960`006b0000 fffff960`006d7000 cdd cdd.dll
fffff960`00970000 fffff960`009d2000 ATMFD ATMFD.DLL

Unloaded modules:
fffff880`0b3f6000 fffff880`0b3fd000 amifldrv64.s
fffff880`0a51f000 fffff880`0a526000 NTIOLib_X64.
fffff880`01bec000 fffff880`01bfa000 crashdmp.sys
fffff880`019eb000 fffff880`019f7000 dump_pciidex
fffff880`01800000 fffff880`0180b000 dump_msahci.
fffff880`032eb000 fffff880`032fe000 dump_dumpfve


BC AdBot (Login to Remove)

 


#2 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 17 March 2016 - 01:01 PM

Attaching my SysnativeFileCollectionApp.zip

Attached Files



#3 usasma

usasma

    Still visually handicapped (avatar is memory developed by my Dad


  • BSOD Kernel Dump Expert
  • 25,091 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Southeastern CT, USA
  • Local time:03:56 PM

Posted 17 March 2016 - 04:58 PM

These devices have issues in Device Manager:

 

Microsoft PS/2 Mouse    ACPI\PNP0F03\0    This device is not present, is not working properly, or does not have all its drivers installed.
Standard PS/2 Keyboard    ACPI\PNP0303\0    This device is not present, is not working properly, or does not have all its drivers installed.

If you are using a USB mouse and keyboard, these errors are safe to ignore.

 

Only 299 Windows Update hotfixes installed.  Most systems with SP1 have 400 or more.  Please visit Windows Update and get ALL available updates (it may take several trips to get them all).

There are many Windows Update errors in the WER section of the MSINFO32 report.
The actual number is not important.  Rather it's important that you checked manually, installed any available updates, and didn't experience any errors when checking or updating.
 

MSI Afterburner and Riva Tuner (along with  EVGA Precision) is known to cause BSOD's in some Windows systems (it's driver is usually RTCore64.sys).  Please un-install them immediately!

If you're overclocking, please stop the overclock while we're troubleshooting.  Feel free to resume the overclock once the system has been stabilized.

There's only 3 memory dumps in the uploaded reports - and they are all STOP 0x1A errors.

BUT, in the WER section of the MSINFO32 report there are many different STOP errors (4 different one's out of a total of 9)

I would start with these free hardware diagnostics:  http://www.carrona.org/hwdiag.html

Once you've finished ALL of them, if the problem persists, then please run Driver Verifier according to these instructions:  http://www.carrona.org/verifier.html

 

Please remove (un-install) the program responsible for the following drivers. DO NOT manually delete/rename the driver as it may make the system unbootable! :

UltraMonUtility.sys         Thu Nov 13 20:10:30 2008 (491CD006)
UltraMon multi-monitor http://www.realtimesoft.com/ultramon/support.asp
http://www.carrona.org/drivers/driver.php?id=UltraMonUtility.sys
 
NTIOLib_X64.sys             Thu Oct 25 21:46:44 2012 (5089EB84)
MSI Afterburner driver (known BSOD issues with Windows) Also found to be a part of MSI Live Update 5, MSI Super Charger & MSI Smart Utilities.[br]    [br]  Recently (Nov 2014) there have been numerous instances of this driver in memory dumps.  Analysis reveals that they are scattered throughout the filesystem by the installed MSI command utilities.  For now I suggest uninstalling them all. http://event.msi.com/vga/afterburner/download.htm
http://www.carrona.org/drivers/driver.php?id=NTIOLib_X64.sys
 

Analysis:
The following is for informational purposes only.
**************************Thu Mar 17 08:40:01.761 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\031716-9016-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:03:14.480
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33854 )
BugCheck 1A, {41790, fffffa8010c8db60, ffff, 0}
BugCheck Info: MEMORY_MANAGEMENT (1a)
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8010c8db60
Arg3: 000000000000ffff
Arg4: 0000000000000000
BUGCHECK_STR:  0x1a_41790
PROCESS_NAME:  svchost.exe
FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.80
  BIOS Release Date             02/23/2016
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Mar 16 08:38:10.052 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\031616-8845-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:03:09.770
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33854 )
BugCheck 1A, {41790, fffffa8010bb4ff0, ffff, 0}
BugCheck Info: MEMORY_MANAGEMENT (1a)
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8010bb4ff0
Arg3: 000000000000ffff
Arg4: 0000000000000000
BUGCHECK_STR:  0x1a_41790
PROCESS_NAME:  svchost.exe
FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.80
  BIOS Release Date             02/23/2016
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Mon Mar 14 08:36:21.756 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\031416-9235-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:03:18.475
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33854 )
BugCheck 1A, {41790, fffffa8010cd5020, ffff, 0}
BugCheck Info: MEMORY_MANAGEMENT (1a)
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8010cd5020
Arg3: 000000000000ffff
Arg4: 0000000000000000
BUGCHECK_STR:  0x1a_41790
PROCESS_NAME:  TrustedInstall
FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.70
  BIOS Release Date             01/21/2016
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``


3rd Party Drivers:
The following is for information purposes only.
**************************Thu Mar 17 08:40:01.761 2016 (UTC - 4:00)**************************
UltraMonUtility.sys         Thu Nov 13 20:10:30 2008 (491CD006)
intelppm.sys                Mon Jul 13 19:19:25 2009 (4A5BC0FD)
amdxata.sys                 Fri Mar 19 12:18:18 2010 (4BA3A3CA)
btwl2cap.sys                Sat Aug 27 18:58:52 2011 (4E5976AC)
lvrs64.sys                  Wed Jan 18 01:40:36 2012 (4F166964)
lvuvc64.sys                 Wed Jan 18 01:41:08 2012 (4F166984)
btwavdt.sys                 Thu Mar  1 16:45:18 2012 (4F4FEDEE)
btwrchid.sys                Thu Mar  1 16:46:08 2012 (4F4FEE20)
btwaudio.sys                Wed Mar 28 18:34:32 2012 (4F7391F8)
NTIOLib_X64.sys             Thu Oct 25 21:46:44 2012 (5089EB84)
NTIOLib_X64.sys             Mon Nov 26 05:11:53 2012 (50B34069)
bcbtums.sys                 Tue Apr  9 13:56:19 2013 (51645643)
tap0901.sys                 Wed Nov  5 08:16:32 2014 (545A2330)
klbackupflt.sys             Wed Apr 15 21:10:06 2015 (552F0BEE)
iqvw64e.sys                 Wed Apr 22 07:46:58 2015 (55378A32)
LGVirHid.sys                Fri Apr 24 17:20:53 2015 (553AB3B5)
LGJoyXlCore.sys             Fri Apr 24 17:20:57 2015 (553AB3B9)
LGBusEnum.sys               Fri Apr 24 17:21:00 2015 (553AB3BC)
cmudaxp.sys                 Tue Jun  2 05:11:20 2015 (556D7338)
klmouflt.sys                Tue Jun  2 08:36:27 2015 (556DA34B)
klkbdflt.sys                Tue Jun  2 08:37:05 2015 (556DA371)
klbackupdisk.sys            Tue Jun  2 16:18:33 2015 (556E0F99)
klwtp.sys                   Wed Jun  3 11:30:17 2015 (556F1D89)
klim6.sys                   Mon Jun  8 04:50:09 2015 (55755741)
lgcoretemp.sys              Tue Jun  9 12:52:10 2015 (557719BA)
kltdi.sys                   Wed Jun 10 08:28:21 2015 (55782D65)
iusb3hub.sys                Mon Jun 15 09:54:03 2015 (557ED8FB)
iusb3xhc.sys                Mon Jun 15 09:54:05 2015 (557ED8FD)
kl1.sys                     Thu Jun 18 14:58:13 2015 (558314C5)
kneps.sys                   Fri Jun 19 08:22:49 2015 (55840999)
cm_km.sys                   Wed Jul  1 14:08:29 2015 (55942C9D)
klhk.sys                    Mon Jul 20 12:11:17 2015 (55AD1DA5)
e1d62x64.sys                Thu Aug 13 05:05:40 2015 (55CC5DE4)
asmtxhci.sys                Thu Sep 10 05:38:13 2015 (55F14F85)
asmthub3.sys                Thu Sep 10 05:38:17 2015 (55F14F89)
btwampfl.sys                Mon Sep 14 11:23:24 2015 (55F6E66C)
nvhda64v.sys                Mon Sep 21 05:44:17 2015 (55FFD171)
klpd.sys                    Wed Sep 23 07:10:31 2015 (560288A7)
klflt.sys                   Thu Sep 24 07:52:05 2015 (5603E3E5)
uvhid.sys                   Thu Oct  1 05:52:20 2015 (560D0254)
TeeDriverx64.sys            Thu Oct  8 14:11:48 2015 (5616B1E4)
networx.sys                 Thu Nov  5 14:52:09 2015 (563BB369)
lgLowAudio.sys              Fri Nov 20 12:21:26 2015 (564F5696)
nvvad64v.sys                Thu Dec 17 07:47:18 2015 (5672AED6)
NvStreamKms.sys             Tue Dec 22 15:53:26 2015 (5679B846)
VBoxNetLwf.sys              Tue Jan 19 11:40:16 2016 (569E66F0)
VBoxNetAdp6.sys             Tue Jan 19 11:40:17 2016 (569E66F1)
VBoxUSBMon.sys              Tue Jan 19 11:40:17 2016 (569E66F1)
VBoxDrv.sys                 Tue Jan 19 11:40:46 2016 (569E670E)
kldisk.sys                  Fri Jan 22 05:56:11 2016 (56A20ACB)
klif.sys                    Sat Feb 20 03:08:46 2016 (56C81F0E)
nvlddmkm.sys                Tue Feb 23 14:58:05 2016 (56CCB9CD)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Mar 16 08:38:10.052 2016 (UTC - 4:00)**************************
NvStreamKms.sys             Tue Dec 22 15:54:00 2015 (5679B868)
nvlddmkm.sys                Tue Mar  8 00:45:32 2016 (56DE66FC)

 

http://www.carrona.org/drivers/driver.php?id=UltraMonUtility.sys
http://www.carrona.org/drivers/driver.php?id=intelppm.sys
http://www.carrona.org/drivers/driver.php?id=amdxata.sys
http://www.carrona.org/drivers/driver.php?id=btwl2cap.sys
http://www.carrona.org/drivers/driver.php?id=lvrs64.sys
http://www.carrona.org/drivers/driver.php?id=lvuvc64.sys
http://www.carrona.org/drivers/driver.php?id=btwavdt.sys
http://www.carrona.org/drivers/driver.php?id=btwrchid.sys
http://www.carrona.org/drivers/driver.php?id=btwaudio.sys
http://www.carrona.org/drivers/driver.php?id=NTIOLib_X64.sys
http://www.carrona.org/drivers/driver.php?id=NTIOLib_X64.sys
http://www.carrona.org/drivers/driver.php?id=bcbtums.sys
http://www.carrona.org/drivers/driver.php?id=tap0901.sys
http://www.carrona.org/drivers/driver.php?id=klbackupflt.sys
http://www.carrona.org/drivers/driver.php?id=iqvw64e.sys
http://www.carrona.org/drivers/driver.php?id=LGVirHid.sys
http://www.carrona.org/drivers/driver.php?id=LGJoyXlCore.sys
http://www.carrona.org/drivers/driver.php?id=LGBusEnum.sys
http://www.carrona.org/drivers/driver.php?id=cmudaxp.sys
http://www.carrona.org/drivers/driver.php?id=klmouflt.sys
http://www.carrona.org/drivers/driver.php?id=klkbdflt.sys
http://www.carrona.org/drivers/driver.php?id=klbackupdisk.sys
http://www.carrona.org/drivers/driver.php?id=klwtp.sys
http://www.carrona.org/drivers/driver.php?id=klim6.sys
http://www.carrona.org/drivers/driver.php?id=lgcoretemp.sys
http://www.carrona.org/drivers/driver.php?id=kltdi.sys
http://www.carrona.org/drivers/driver.php?id=iusb3hub.sys
http://www.carrona.org/drivers/driver.php?id=iusb3xhc.sys
http://www.carrona.org/drivers/driver.php?id=kl1.sys
http://www.carrona.org/drivers/driver.php?id=kneps.sys
http://www.carrona.org/drivers/driver.php?id=cm_km.sys
http://www.carrona.org/drivers/driver.php?id=klhk.sys
http://www.carrona.org/drivers/driver.php?id=e1d62x64.sys
http://www.carrona.org/drivers/driver.php?id=asmtxhci.sys
http://www.carrona.org/drivers/driver.php?id=asmthub3.sys
http://www.carrona.org/drivers/driver.php?id=btwampfl.sys
http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
http://www.carrona.org/drivers/driver.php?id=klpd.sys
http://www.carrona.org/drivers/driver.php?id=klflt.sys
http://www.carrona.org/drivers/driver.php?id=uvhid.sys
http://www.carrona.org/drivers/driver.php?id=TeeDriverx64.sys
http://www.carrona.org/drivers/driver.php?id=networx.sys
http://www.carrona.org/drivers/driver.php?id=lgLowAudio.sys
http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
http://www.carrona.org/drivers/driver.php?id=NvStreamKms.sys
http://www.carrona.org/drivers/driver.php?id=VBoxNetLwf.sys
http://www.carrona.org/drivers/driver.php?id=VBoxNetAdp6.sys
http://www.carrona.org/drivers/driver.php?id=VBoxUSBMon.sys
http://www.carrona.org/drivers/driver.php?id=VBoxDrv.sys
http://www.carrona.org/drivers/driver.php?id=kldisk.sys
http://www.carrona.org/drivers/driver.php?id=klif.sys
http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
http://www.carrona.org/drivers/driver.php?id=NvStreamKms.sys
http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
 


My browser caused a flood of traffic, sio my IP address was banned. Hope to fix it soon. Will get back to posting as soon as Im able.

- John  (my website: http://www.carrona.org/ )**If you need a more detailed explanation, please ask for it. I have the Knack. **  If I haven't replied in 48 hours, please send me a message. My eye problems have recently increased and I'm having difficult reading posts. (23 Nov 2017)FYI - I am completely blind in the right eye and ~30% blind in the left eye.<p>If the eye problems get worse suddenly, I may not be able to respond.If that's the case and help is needed, please PM a staff member for assistance.

#4 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 17 March 2016 - 05:47 PM

Thanks John - here's my replies:

 

These devices have issues in Device Manager:

Quote

 

Microsoft PS/2 Mouse    ACPI\PNP0F03\0    This device is not present, is not working properly, or does not have all its drivers installed.
Standard PS/2 Keyboard    ACPI\PNP0303\0    This device is not present, is not working properly, or does not have all its drivers installed.

If you are using a USB mouse and keyboard, these errors are safe to ignore.

OK - I am using a USB keyboard. 
 

 

Only 299 Windows Update hotfixes installed.  Most systems with SP1 have 400 or more.  Please visit Windows Update and get ALL available updates (it may take several trips to get them all).

There are many Windows Update errors in the WER section of the MSINFO32 report.
The actual number is not important.  Rather it's important that you checked manually, installed any available updates, and didn't experience any errors when checking or updating.

This is OEM install of Windows 7 Pro/Ultimate from CyberPower from last year, so it's possible the prior hotfixes were rolled up. It's worth noting I have an actual legitimate copy of WIndows 7 Ultimate as well.  I have only hidden the "Windows 10 spying" updates, which I went back today and installed them.  The remaining updates I have blocked are the two "Get Windows 10 App" updates with duplicate KB numbers (KB3035583).

 

MSI Afterburner and Riva Tuner (along with  EVGA Precision) is known to cause BSOD's in some Windows systems (it's driver is usually RTCore64.sys).  Please un-install them immediately!

I haven't had any BSOD while using the software in-game, but I will uninstall for testing purposes.

 

If you're overclocking, please stop the overclock while we're troubleshooting.  Feel free to resume the overclock once the system has been stabilized.

No, no OC and XMP is disabled.

 

There's only 3 memory dumps in the uploaded reports - and they are all STOP 0x1A errors.

BUT, in the WER section of the MSINFO32 report there are many different STOP errors (4 different one's out of a total of 9)

I would start with these free hardware diagnostics:  http://www.carrona.org/hwdiag.html

 

Once you've finished ALL of them, if the problem persists, then please run Driver Verifier according to these instructions:  http://www.carrona.org/verifier.html

In addition to the typo in the post "nevering" - let me clarify that I had received a BSOD last year while testing OC - this was since patched by MSI in a BIOS update and never happened again.  As for hardware diagnosis, I ran the AIDA64 stress test for 30+ minutes after each recent BIOS update without any issues.  I also ran memtest86 for 8 hours with no memory errors found.  I do plan to try Driver Verifier if the issue persists.

 

Please remove (un-install) the program responsible for the following drivers. DO NOT manually delete/rename the driver as it may make the system unbootable! :

UltraMonUtility.sys         Thu Nov 13 20:10:30 2008 (491CD006)
OK, will do
NTIOLib_X64.sys             Thu Oct 25 21:46:44 2012 (5089EB84)
OK, will do

 

 

Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2

    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.

Just to confirm, this has nothing to do with the paging file?  I recently disabled, rebooted, renabled the pagefile as part of the troubleshooting to force Windows to rebuild it.


Edited by orion44, 17 March 2016 - 05:49 PM.


#5 usasma

usasma

    Still visually handicapped (avatar is memory developed by my Dad


  • BSOD Kernel Dump Expert
  • 25,091 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Southeastern CT, USA
  • Local time:03:56 PM

Posted 18 March 2016 - 06:57 PM

If a memory dump is over a month old, I generally ignore it.

I only pay attention to older memory dumps if they're part of a chain of dumps leading up the the present.
For example, if you have a memory dump once a week for 4 months - then I look at all of them.

If you have one 4 months ago, then go 2 months without another - that 4 month old one is ignored.

 

 

The page table page may/may not have something to do with the pagefile.

But, IMO, it's most likely that it doesn't have anything to do with it - as it's a structure of the memory manager, rather than a place to store memory contents that aren' t immediately needed.


My browser caused a flood of traffic, sio my IP address was banned. Hope to fix it soon. Will get back to posting as soon as Im able.

- John  (my website: http://www.carrona.org/ )**If you need a more detailed explanation, please ask for it. I have the Knack. **  If I haven't replied in 48 hours, please send me a message. My eye problems have recently increased and I'm having difficult reading posts. (23 Nov 2017)FYI - I am completely blind in the right eye and ~30% blind in the left eye.<p>If the eye problems get worse suddenly, I may not be able to respond.If that's the case and help is needed, please PM a staff member for assistance.

#6 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 01 April 2016 - 08:00 AM

Still happening, only after a cold boot (off overnight) after all the removals and reinstalls.

 

 

On Fri 4/1/2016 12:40:28 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\040116-10623-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x74080)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA8010A66820, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Fri 4/1/2016 12:40:28 PM GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: chrome_child.sys (chrome_child!GetHandleVerifier+0x4FA0F)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA8010A66820, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: chrome_child.sys .
Google query: chrome_child.sys MEMORY_MANAGEMENT

 

 

 

On Thu 3/31/2016 1:20:29 PM GMT your computer crashed
crash dump file: C:\Windows\Minidump\033116-14320-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x74080)
Bugcheck code: 0x1A (0x41790, 0xFFFFFA801095C450, 0xFFFF, 0x0)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time. 


Edited by orion44, 01 April 2016 - 08:03 AM.


#7 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 01 April 2016 - 08:02 AM

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
Machine Name:
Kernel base = 0xfffff800`03a0e000 PsLoadedModuleList = 0xfffff800`03c55730
Debug session time: Thu Mar 31 09:20:29.228 2016 (UTC - 4:00)
System Uptime: 0 days 0:03:07.947
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa801095c450
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x1a_41790

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: MsMpEng.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80003af2c20 to fffff80003a82080

STACK_TEXT:
fffff880`0e5eb6e8 fffff800`03af2c20 : 00000000`0000001a 00000000`00041790 fffffa80`1095c450 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0e5eb6f0 fffff800`03ab4e49 : fffff880`00000000 00000000`1c6cffff fffffa80`00000000 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x33854
fffff880`0e5eb8b0 fffff800`03d9f541 : fffffa80`19e0d7c0 00000000`00000000 fffffa80`1f652cc0 fffffa80`1f652cc0 : nt!MiRemoveMappedView+0xd9
fffff880`0e5eb9d0 fffff800`03d9f943 : 0000007f`00000000 00000000`1b6d0000 fffffa80`00000001 00000000`1c10b001 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0e5eba90 fffff800`03a81313 : 00000000`00000000 00000000`1c10b000 fffffa80`1e2fcb10 00000000`00001000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0e5ebae0 00000000`77afd65a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0222c8f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77afd65a


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33854
fffff800`03af2c20 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33854

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 56bcc786

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854

Followup: MachineOwner
---------

 

 

 

 

 

 

 

 

 

 

 

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
Machine Name:
Kernel base = 0xfffff800`03a0a000 PsLoadedModuleList = 0xfffff800`03c51730
Debug session time: Fri Apr 1 08:40:28.005 2016 (UTC - 4:00)
System Uptime: 0 days 0:05:14.739
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8010a66820
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80003aeec20 to fffff80003a7e080

STACK_TEXT:
fffff880`115a6818 fffff800`03aeec20 : 00000000`0000001a 00000000`00041790 fffffa80`10a66820 00000000`0000ffff : nt!KeBugCheckEx
fffff880`115a6820 fffff800`03a6ab7f : fffffa80`00000000 000000e5`a9bfffff 000000e5`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33854
fffff880`115a69e0 fffff800`03a7d313 : ffffffff`ffffffff 00000000`04ccf3b8 00000000`04ccf3b0 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`115a6ae0 00000000`770cd59a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04ccf378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770cd59a


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33854
fffff800`03aeec20 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33854

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 56bcc786

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854

Followup: MachineOwner
---------
 



#8 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 01 April 2016 - 10:56 AM

Attached is my latest SysnativeFileCollectionApp.zip file

Attached Files



#9 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 03 April 2016 - 04:01 AM

I enabled Driver Verifier and rebooted and immediately got a BSOD:

 

On Sun 4/3/2016 8:42:07 AM GMT your computer crashed
crash dump file: C:\Windows\Minidump\040316-7566-01.dmp
This was probably caused by the following module: wdf01000.sys (Wdf01000+0x47C0)
Bugcheck code: 0xC9 (0x22E, 0xFFFFF88000E2D7C0, 0xFFFFF98006092D30, 0x0)
Error: DRIVER_VERIFIER_IOMANAGER_VIOLATION
file path: C:\Windows\system32\drivers\wdf01000.sys
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: Kernel Mode Driver Framework Runtime
Bug check description: This is the bug check code for all Driver Verifier
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Sun 4/3/2016 8:42:07 AM GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: uvhid.sys (uvhid+0x1585)
Bugcheck code: 0xC9 (0x22E, 0xFFFFF88000E2D7C0, 0xFFFFF98006092D30, 0x0)
Error: DRIVER_VERIFIER_IOMANAGER_VIOLATION
file path: C:\Windows\system32\drivers\uvhid.sys
product: Windows ® Win 7 DDK driver
company: Windows ® Win 7 DDK provider
description: HID mini driver for Unified Virtual HID
Bug check description: This is the bug check code for all Driver Verifier
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: uvhid.sys (HID mini driver for Unified Virtual HID, Windows ® Win 7 DDK provider).
Google query: uvhid.sys Windows ® Win 7 DDK provider DRIVER_VERIFIER_IOMANAGER_VIOLATION 

 

 

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)

Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
Machine Name:
Kernel base = 0xfffff800`03a5c000 PsLoadedModuleList = 0xfffff800`03ca3730
Debug session time: Sun Apr 3 04:42:07.815 2016 (UTC - 4:00)
System Uptime: 0 days 0:00:11.549
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000022e, The caller has completed a successful IRP_MJ_PNP instead of passing it down.
Arg2: fffff88000e2d7c0, The address in the driver's code where the error was detected.
Arg3: fffff98006092d30, IRP address.
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0xc9_22e

DRIVER_VERIFIER_IO_VIOLATION_TYPE: 22e

FAULTING_IP:
Wdf01000!FxDevice::DispatchWithLock+0
fffff880`00e2d7c0 48895c2408 mov qword ptr [rsp+8],rbx

FOLLOWUP_IP:
uvhid+1585
fffff880`04bbd585 ?? ???

IRP_ADDRESS: fffff98006092d30

DEVICE_OBJECT: fffffa801c688780

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80003f654ec to fffff80003ad0080

STACK_TEXT:
fffff880`033a8e48 fffff800`03f654ec : 00000000`000000c9 00000000`0000022e fffff880`00e2d7c0 fffff980`06092d30 : nt!KeBugCheckEx
fffff880`033a8e50 fffff800`03f6f5aa : fffff800`03f63b00 fffff880`00e2d7c0 fffff980`06092d30 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`033a8e90 fffff800`03f705b3 : 00000000`0000022e fffff980`06092d30 fffff980`06092d30 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`033a8ee0 fffff800`03f7bff2 : fffffa80`166fe000 00000000`00000000 08200007`00000365 fffff800`03ad3002 : nt!VfErrorReport1+0x63
fffff880`033a8f80 fffff800`03f6515e : fffffa80`1d606240 00000000`00000001 00000000`00000000 00000000`00000000 : nt!VfPnpVerifyIrpStackUpward+0xb2
fffff880`033a8fe0 fffff800`03f71c5d : fffffa80`1bf2fd70 fffffa80`1d606010 fffff980`06092d30 fffff980`06092d30 : nt!VfMajorVerifyIrpStackUpward+0x6e
fffff880`033a9020 fffff800`03f8363d : fffff980`06092ed8 fffff880`033a9210 00000000`00000000 fffff980`06092ed8 : nt!IovpCompleteRequest2+0xad
fffff880`033a9090 fffff800`03ad3ad1 : fffff980`06092edb 00000000`00000000 00000000`00000013 fffff800`03b960b3 : nt!IovpLocalCompletionRoutine+0x9d
fffff880`033a90f0 fffff800`03f7aeef : fffff980`06092d30 00000000`00000000 fffff980`06092d00 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`033a91e0 fffff880`04bbd585 : fffffa80`1c6dd080 fffff980`06092ed8 00000000`00000000 fffff980`06092d30 : nt!IovCompleteRequest+0x19f
fffff880`033a92b0 fffffa80`1c6dd080 : fffff980`06092ed8 00000000`00000000 fffff980`06092d30 fffffa80`1bf14d10 : uvhid+0x1585
fffff880`033a92b8 fffff980`06092ed8 : 00000000`00000000 fffff980`06092d30 fffffa80`1bf14d10 fffff880`00e2d706 : 0xfffffa80`1c6dd080
fffff880`033a92c0 00000000`00000000 : fffff980`06092d30 fffffa80`1bf14d10 fffff880`00e2d706 00000000`0000001b : 0xfffff980`06092ed8


STACK_COMMAND: kb

SYMBOL_STACK_INDEX: a

SYMBOL_NAME: uvhid+1585

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: uvhid

IMAGE_NAME: uvhid.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 560d0254

FAILURE_BUCKET_ID: X64_0xc9_22e_VRF_uvhid+1585

BUCKET_ID: X64_0xc9_22e_VRF_uvhid+1585

Followup: MachineOwner
---------


This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
expand.gifCrash Code Links collapse.gifLoaded Module List
start end module name
fffff800`00b97000 fffff800`00ba1000 kdcom kdcom.dll
fffff800`03a13000 fffff800`03a5c000 hal hal.dll
fffff800`03a5c000 fffff800`04048000 nt ntkrnlmp.exe
fffff880`00c0d000 fffff880`00c5c000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll
fffff880`00c5c000 fffff880`00c70000 PSHED PSHED.dll
fffff880`00c70000 fffff880`00cce000 CLFS CLFS.SYS
fffff880`00cce000 fffff880`00d43000 CI CI.dll
fffff880`00d43000 fffff880`00d9f000 volmgrx volmgrx.sys
fffff880`00d9f000 fffff880`00dc9000 ataport ataport.SYS
fffff880`00e00000 fffff880`00e10000 PCIIDEX PCIIDEX.SYS
fffff880`00e10000 fffff880`00e1b000 amdxata amdxata.sys
fffff880`00e29000 fffff880`00eeb000 Wdf01000 Wdf01000.sys
fffff880`00eeb000 fffff880`00efb000 WDFLDR WDFLDR.SYS
fffff880`00efb000 fffff880`00f52000 ACPI ACPI.sys
fffff880`00f52000 fffff880`00f5b000 WMILIB WMILIB.SYS
fffff880`00f5b000 fffff880`00f65000 msisadrv msisadrv.sys
fffff880`00f65000 fffff880`00f98000 pci pci.sys
fffff880`00f98000 fffff880`00fa5000 vdrvroot vdrvroot.sys
fffff880`00fa5000 fffff880`00fba000 partmgr partmgr.sys
fffff880`00fba000 fffff880`00fcf000 volmgr volmgr.sys
fffff880`00fcf000 fffff880`00fe9000 mountmgr mountmgr.sys
fffff880`00fe9000 fffff880`00ff2000 atapi atapi.sys
fffff880`00ff2000 fffff880`00ffd000 msahci msahci.sys
fffff880`01004000 fffff880`01050000 fltmgr fltmgr.sys
fffff880`01050000 fffff880`01064000 fileinfo fileinfo.sys
fffff880`01064000 fffff880`010a8000 MpFilter MpFilter.sys
fffff880`010a8000 fffff880`01106000 msrpc msrpc.sys
fffff880`01106000 fffff880`01178000 cng cng.sys
fffff880`01178000 fffff880`011c4000 volsnap volsnap.sys
fffff880`011c4000 fffff880`011fe000 rdyboost rdyboost.sys
fffff880`01212000 fffff880`013bb000 Ntfs Ntfs.sys
fffff880`013bb000 fffff880`013d6000 ksecdd ksecdd.sys
fffff880`013d6000 fffff880`013e7000 pcw pcw.sys
fffff880`013e7000 fffff880`013f1000 Fs_Rec Fs_Rec.sys
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys
fffff880`0148b000 fffff880`014d4000 fwpkclnt fwpkclnt.sys
fffff880`014d4000 fffff880`014e4000 vmstorfl vmstorfl.sys
fffff880`014ea000 fffff880`015dd000 ndis ndis.sys
fffff880`015dd000 fffff880`015e5000 spldr spldr.sys
fffff880`015e5000 fffff880`015f7000 mup mup.sys
fffff880`015f7000 fffff880`01600000 hwpolicy hwpolicy.sys
fffff880`01601000 fffff880`01800000 tcpip tcpip.sys
fffff880`01800000 fffff880`0180b000 Msfs Msfs.SYS
fffff880`0180b000 fffff880`0181c000 Npfs Npfs.SYS
fffff880`0181c000 fffff880`0183e000 tdx tdx.sys
fffff880`0183e000 fffff880`0184b000 TDI TDI.SYS
fffff880`0184b000 fffff880`0185e000 networx networx.sys
fffff880`018ab000 fffff880`018e5000 fvevol fvevol.sys
fffff880`018e5000 fffff880`018fa000 disk disk.sys
fffff880`018fa000 fffff880`0192a000 CLASSPNP CLASSPNP.SYS
fffff880`0192a000 fffff880`01938000 crashdmp crashdmp.sys
fffff880`01938000 fffff880`01944000 dump_dumpata dump_dumpata.sys
fffff880`01944000 fffff880`0194f000 dump_msahci dump_msahci.sys
fffff880`0194f000 fffff880`01962000 dump_dumpfve dump_dumpfve.sys
fffff880`01962000 fffff880`0198c000 cdrom cdrom.sys
fffff880`0198c000 fffff880`01995000 Null Null.SYS
fffff880`01995000 fffff880`0199c000 Beep Beep.SYS
fffff880`0199c000 fffff880`019aa000 vga vga.sys
fffff880`019aa000 fffff880`019cf000 VIDEOPRT VIDEOPRT.SYS
fffff880`019cf000 fffff880`019df000 watchdog watchdog.sys
fffff880`019df000 fffff880`019e8000 RDPCDD RDPCDD.sys
fffff880`019e8000 fffff880`019f1000 rdpencdd rdpencdd.sys
fffff880`019f1000 fffff880`019fa000 rdprefmp rdprefmp.sys
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys
fffff880`02c5d000 fffff880`02c68000 mssmbios mssmbios.sys
fffff880`02c68000 fffff880`02c77000 discache discache.sys
fffff880`02cd9000 fffff880`02dca000 VBoxDrv VBoxDrv.sys
fffff880`02dca000 fffff880`02dde000 termdd termdd.sys
fffff880`03c00000 fffff880`03c29000 VBoxUSBMon VBoxUSBMon.sys
fffff880`03c82000 fffff880`03d0b000 afd afd.sys
fffff880`03d0b000 fffff880`03d50000 netbt netbt.sys
fffff880`03d50000 fffff880`03d59000 wfplwf wfplwf.sys
fffff880`03d59000 fffff880`03d7f000 pacer pacer.sys
fffff880`03d7f000 fffff880`03da2000 VBoxNetAdp6 VBoxNetAdp6.sys
fffff880`03da2000 fffff880`03dd6000 VBoxNetLwf VBoxNetLwf.sys
fffff880`03dd6000 fffff880`03de5000 netbios netbios.sys
fffff880`03de5000 fffff880`03e00000 wanarp wanarp.sys
fffff880`03e00000 fffff880`03ec8000 iusb3xhc iusb3xhc.sys
fffff880`03ed7000 fffff880`03f5a000 csc csc.sys
fffff880`03f5a000 fffff880`03f78000 dfsc dfsc.sys
fffff880`03f78000 fffff880`03f89000 blbdrive blbdrive.sys
fffff880`03f89000 fffff880`03faf000 tunnel tunnel.sys
fffff880`03faf000 fffff880`03fc9000 rassstp rassstp.sys
fffff880`03fc9000 fffff880`03fd5700 LGJoyXlCore LGJoyXlCore.sys
fffff880`03fd6000 fffff880`03fe8000 umbus umbus.sys
fffff880`03fe8000 fffff880`03ff5000 nvvad64v nvvad64v.sys
fffff880`04a00000 fffff880`04a16000 AgileVpn AgileVpn.sys
fffff880`04a16000 fffff880`04a3a000 rasl2tp rasl2tp.sys
fffff880`04a3a000 fffff880`04a46000 ndistapi ndistapi.sys
fffff880`04a46000 fffff880`04a75000 ndiswan ndiswan.sys
fffff880`04a75000 fffff880`04a90000 raspppoe raspppoe.sys
fffff880`04a90000 fffff880`04ab1000 raspptp raspptp.sys
fffff880`04ab1000 fffff880`04abd000 tap0901 tap0901.sys
fffff880`04abf000 fffff880`04b2c000 asmtxhci asmtxhci.sys
fffff880`04b2c000 fffff880`04bac000 e1d62x64 e1d62x64.sys
fffff880`04bac000 fffff880`04bbc000 CompositeBus CompositeBus.sys
fffff880`04bbc000 fffff880`04bc7000 uvhid uvhid.sys
fffff880`04bc7000 fffff880`04be0000 HIDCLASS HIDCLASS.SYS
fffff880`04be0000 fffff880`04be8080 HIDPARSE HIDPARSE.SYS
fffff880`04be9000 fffff880`04bf1000 serscan serscan.sys
fffff880`04bf1000 fffff880`04bfc000 rdpbus rdpbus.sys
fffff880`04c00000 fffff880`04c22000 drmk drmk.sys
fffff880`04c22000 fffff880`04c65000 ks ks.sys
fffff880`04c65000 fffff880`04c6a200 ksthunk ksthunk.sys
fffff880`04c6b000 fffff880`04c74000 wmiacpi wmiacpi.sys
fffff880`04c74000 fffff880`04c75480 swenum swenum.sys
fffff880`04c77000 fffff880`04fa5000 cmudaxp cmudaxp.sys
fffff880`04fa5000 fffff880`04fe2000 portcls portcls.sys
fffff880`04fe2000 fffff880`04ff8000 intelppm intelppm.sys
fffff880`04ff8000 fffff880`05000000 mshidkmdf mshidkmdf.sys
fffff880`0f000000 fffff880`0f024000 HDAudBus HDAudBus.sys
fffff880`0f024000 fffff880`0f025f00 USBD USBD.SYS
fffff880`0f026000 fffff880`0f054000 TeeDriverx64 TeeDriverx64.sys
fffff880`0f054000 fffff880`0f063000 kbdclass kbdclass.sys
fffff880`0f06a000 fffff880`0fcae000 nvlddmkm nvlddmkm.sys
fffff880`0fcae000 fffff880`0fda3000 dxgkrnl dxgkrnl.sys
fffff880`0fda3000 fffff880`0fde9000 dxgmms1 dxgmms1.sys
fffff880`0fde9000 fffff880`0fdf8000 mouclass mouclass.sys
fffff880`0fdf8000 fffff880`0fdfce00 LGBusEnum LGBusEnum.sys


#10 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 03 April 2016 - 04:55 AM

Uninstalled Unified Remote software, per last BSOD.  Keep Driver Verifier enabled and rebooted.

 

Got the following BSOD:

 

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
Machine Name:
Kernel base = 0xfffff800`03a5f000 PsLoadedModuleList = 0xfffff800`03ca6730
Debug session time: Sun Apr 3 05:37:17.416 2016 (UTC - 4:00)
System Uptime: 0 days 0:00:31.150
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ac5cbd, address which referenced memory

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d10100
GetUlongFromAddress: unable to read from fffff80003d101c0
0000000000000020 Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!KiDeliverApc+ed
fffff800`03ac5cbd 498b4a30 mov rcx,qword ptr [r10+30h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR: 0xA

PROCESS_NAME: svchost.exe

TRAP_FRAME: fffff8800d0ea890 -- (.trap 0xfffff8800d0ea890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ac5cbd rsp=fffff8800d0eaa20 rbp=fffff8800d0ebae0
r8=0000000000000000 r9=fffff88003117180 r10=fffffffffffffff0
r11=fffff80003c90320 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KiDeliverApc+0xed:
fffff800`03ac5cbd 498b4a30 mov rcx,qword ptr [r10+30h] ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003ad2629 to fffff80003ad3080

STACK_TEXT:
fffff880`0d0ea748 fffff800`03ad2629 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d0ea750 fffff800`03ad12a0 : 00000000`00000000 00000000`00000001 fffffa80`1f9fe480 fffffa80`1f8aa060 : nt!KiBugCheckDispatch+0x69
fffff880`0d0ea890 fffff800`03ac5cbd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0d0eaa20 fffff800`03b1d3a7 : fffff880`0d0eadd0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0xed
fffff880`0d0eaaa0 fffff800`03aaab49 : fffff800`03aaa8c2 fffffa80`19f12318 fffff880`0d0eadf0 fffff880`0d0eacb0 : nt!KiApcInterrupt+0xd7
fffff880`0d0eac38 fffff800`03aaa8c2 : fffffa80`19f12318 fffff880`0d0eadf0 fffff880`0d0eacb0 00000000`00000000 : nt!RtlLookupFunctionTable+0x169
fffff880`0d0eac40 fffff800`03b97ce6 : 00000000`0002fb74 00000000`00000000 fffff880`0d0eadd0 00000000`00000000 : nt!RtlpLookupFunctionEntryForStackWalks+0x32
fffff880`0d0eacb0 fffff800`03b990b3 : fffffa80`19f12318 fffff880`00000011 fffff980`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x2e6
fffff880`0d0eb350 fffff800`03b99f3b : 00000000`00000003 fffffa80`19f12318 00000000`00000000 fffffa80`00000000 : nt!RtlWalkFrameChain+0x63
fffff880`0d0eb380 fffff800`03f7515c : fffffa80`19f12300 00000000`00000160 00000000`00000080 fffff800`03f68edc : nt!RtlCaptureStackBackTrace+0x4b
fffff880`0d0eb3b0 fffff800`03f771ca : fffff880`0d0e6000 fffff880`0d0ec000 00000000`00000080 00000000`00000160 : nt!ViPoolLogStackCallout+0x1c
fffff880`0d0eb3e0 fffff800`03f79c86 : 00000000`00000000 00000000`00000028 fffff800`03db9d72 00000000`00000018 : nt!ViPoolLogStackTrace+0x8a
fffff880`0d0eb410 fffff800`03f79dc0 : 00000000`00000000 fffff800`03db9d72 00000000`2b707249 fffffa80`198f8298 : nt!VeAllocatePoolWithTagPriority+0x2b6
fffff880`0d0eb480 fffff800`03f834d8 : fffffa80`1fcdc390 fffff800`03f7515c fffffa80`198f8280 fffff800`03db9d72 : nt!ViIrpAllocate+0x40
fffff880`0d0eb4c0 fffff800`03f835f3 : 00000000`00000000 fffff800`03db9d72 fffffa80`198f8298 00000000`00000000 : nt!ViIrpAllocateLockedPacket+0x28
fffff880`0d0eb500 fffff800`03f83bc2 : 00000000`00000000 fffffa80`198f8298 fffff880`0d0eb5d0 fffff800`03ad12bd : nt!VfIoAllocateIrp1+0x23
fffff880`0d0eb530 fffff800`03db9d72 : 00000000`00000000 fffffa80`1fcdc390 00000000`00000000 fffff880`03cdb870 : nt!IovAllocateIrp+0x52
fffff880`0d0eb580 fffff880`03caec6b : 00000000`00000000 fffffa80`1c58e960 00000000`00000000 00000000`00000000 : nt!IoBuildDeviceIoControlRequest+0x32
fffff880`0d0eb5f0 fffff880`03caed9a : fffffa80`1fc58010 00000000`00000002 fffff980`1e30ee10 00000000`00000002 : afd!AfdIssueDeviceControl+0xbb
fffff880`0d0eb690 fffff880`03cb1389 : 00000000`00000010 00000000`00010246 fffff880`0d0eb718 00000000`00000018 : afd!AfdSetEventHandler+0x2a
fffff880`0d0eb6f0 fffff880`03caa0ab : 00000000`0000afd1 fffff980`00000000 00000000`00000001 00000000`00000002 : afd!AfdTdiSetEventHandlers+0x39
fffff880`0d0eb720 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : afd! ?? ::NNGAKEGL::`string'+0x2e8b


STACK_COMMAND: kb

FOLLOWUP_IP:
afd!AfdIssueDeviceControl+bb
fffff880`03caec6b 488bf8 mov rdi,rax

SYMBOL_STACK_INDEX: 12

SYMBOL_NAME: afd!AfdIssueDeviceControl+bb

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: afd

IMAGE_NAME: afd.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 561d341d

FAILURE_BUCKET_ID: X64_0xA_VRF_afd!AfdIssueDeviceControl+bb

BUCKET_ID: X64_0xA_VRF_afd!AfdIssueDeviceControl+bb

Followup: MachineOwner



#11 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 03 April 2016 - 05:29 AM

Uninstalled Networx (best guess since it has to do with network traffic) - rebooted.  No BSOD so far...



#12 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 03 April 2016 - 12:21 PM

Reinstalled Unified Remote (latest version) - no BSOD with Driver Verifier enabled.

 

 

Cold-booted this morning and got the usual BSOD, so at this point I'm out of ideas:

 

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
Machine Name:
Kernel base = 0xfffff800`03a00000 PsLoadedModuleList = 0xfffff800`03c47730
Debug session time: Sun Apr 3 13:09:04.023 2016 (UTC - 4:00)
System Uptime: 0 days 0:03:43.757
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8010cddea0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME: MsMpEng.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80003ae4c20 to fffff80003a74080

STACK_TEXT:
fffff880`0aea36e8 fffff800`03ae4c20 : 00000000`0000001a 00000000`00041790 fffffa80`10cddea0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0aea36f0 fffff800`03aa6e49 : 00000000`00000000 00000000`1dbaffff fffff880`00000000 fffff880`00961000 : nt! ?? ::FNODOBFM::`string'+0x33854
fffff880`0aea38b0 fffff800`03d91541 : fffffa80`1c72ba40 00000000`00000000 fffffa80`1e9dba90 fffffa80`1e9dba90 : nt!MiRemoveMappedView+0xd9
fffff880`0aea39d0 fffff800`03d91943 : 0000007f`00000000 00000000`1cbb0000 fffffa80`00000001 00000000`1cddd001 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0aea3a90 fffff800`03a73313 : 00000000`00000000 00000000`1cddd000 fffffa80`1e766b10 00000000`00001000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0aea3ae0 00000000`776bd65a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02abca78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776bd65a


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33854
fffff800`03ae4c20 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33854

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 56bcc786

FAILURE_BUCKET_ID: X64_0x1a_41790_VRF_nt!_??_::FNODOBFM::_string_+33854

BUCKET_ID: X64_0x1a_41790_VRF_nt!_??_::FNODOBFM::_string_+33854

Followup: MachineOwner
---------



#13 usasma

usasma

    Still visually handicapped (avatar is memory developed by my Dad


  • BSOD Kernel Dump Expert
  • 25,091 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Southeastern CT, USA
  • Local time:03:56 PM

Posted 03 April 2016 - 05:29 PM

Please turn verifier off and leave it off.

It's only needed if the system is crashing - and using it otherwise may cause BSOD's on weaker drivers that normally don't crash.

 

 

Please zip up the contents of the C:\Windows\Minidump folder and upload it with your next post.

If unable to zip it up, please copy it to your Desktop and zip it up there.


My browser caused a flood of traffic, sio my IP address was banned. Hope to fix it soon. Will get back to posting as soon as Im able.

- John  (my website: http://www.carrona.org/ )**If you need a more detailed explanation, please ask for it. I have the Knack. **  If I haven't replied in 48 hours, please send me a message. My eye problems have recently increased and I'm having difficult reading posts. (23 Nov 2017)FYI - I am completely blind in the right eye and ~30% blind in the left eye.<p>If the eye problems get worse suddenly, I may not be able to respond.If that's the case and help is needed, please PM a staff member for assistance.

#14 orion44

orion44
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:56 PM

Posted 03 April 2016 - 06:18 PM

Verifier is now off.

 

 

Attached is my minidump folder.

Attached Files


Edited by orion44, 03 April 2016 - 06:18 PM.


#15 usasma

usasma

    Still visually handicapped (avatar is memory developed by my Dad


  • BSOD Kernel Dump Expert
  • 25,091 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Southeastern CT, USA
  • Local time:03:56 PM

Posted 04 April 2016 - 05:10 AM

OK, first things first - this is not a quick fix.
This will take time and analysis to fix.

 

Start by uninstalling Unified Remote software and leaving it uninstalled until the BSOD's have been fixed.

Do not run Driver Verifier unless I ask for it - it just confuses the analysis when switching back and forth.

 

Next, remove all MSI programs that use the NTIOLib_X64.sys driver

AFAIK, these are the one's that showed up in the memory dumps (but others may be present and, IMO, are unstable):

C:\Program Files (x86)\MSI\Command Center\DDR\NTIOLib_X64.sys

C:\Program Files (x86)\MSI\Fast Boot\NTIOLib_X64.sys
 

Then we wait.

If the system BSOD's again, zip up and upload the contents of the memory dump folder again.
I'll extract the new dumps from it (my script does it automatically).

 

 

Analysis:
The following is for informational purposes only.
**************************Sun Apr  3 15:08:37.482 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\040316-5023-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:00:12.216
*** WARNING: Unable to verify timestamp for uvhid.sys
*** ERROR: Module load completed but symbols could not be loaded for uvhid.sys
Probably caused by : Wdf01000.sys ( Wdf01000!FxDevice::DispatchWithLock+0 )
BugCheck C9, {22e, fffff88000ecd7c0, fffff9800616cd30, 0}
BugCheck Info: DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
Arguments:
Arg1: 000000000000022e, The caller has completed a successful IRP_MJ_PNP instead of passing it down.
Arg2: fffff88000ecd7c0, The address in the driver's code where the error was detected.
Arg3: fffff9800616cd30, IRP address.
Arg4: 0000000000000000
BUGCHECK_STR:  0xc9_22e
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0xc9_22e_VRF_Wdf01000!FxDevice::DispatchWithLock+0
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Sun Apr  3 13:09:04.023 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\040316-17128-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:03:43.757
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33854 )
BugCheck 1A, {41790, fffffa8010cddea0, ffff, 0}
BugCheck Info: MEMORY_MANAGEMENT (1a)
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8010cddea0
Arg3: 000000000000ffff
Arg4: 0000000000000000
BUGCHECK_STR:  0x1a_41790
PROCESS_NAME:  MsMpEng.exe
FAILURE_BUCKET_ID:  X64_0x1a_41790_VRF_nt!_??_::FNODOBFM::_string_+33854
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.80
  BIOS Release Date             02/23/2016
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Sun Apr  3 05:37:17.416 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\040316-5382-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:00:31.150
Probably caused by : afd.sys ( afd!AfdIssueDeviceControl+bb )
BugCheck A, {20, 2, 0, fffff80003ac5cbd}
BugCheck Info: IRQL_NOT_LESS_OR_EQUAL (a)
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ac5cbd, address which referenced memory
BUGCHECK_STR:  0xA
DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME:  svchost.exe
FAILURE_BUCKET_ID:  X64_0xA_VRF_afd!AfdIssueDeviceControl+bb
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.80
  BIOS Release Date             02/23/2016
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Sun Apr  3 04:42:07.815 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\040316-7566-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:00:11.549
*** WARNING: Unable to verify timestamp for uvhid.sys
*** ERROR: Module load completed but symbols could not be loaded for uvhid.sys
Probably caused by : Wdf01000.sys ( Wdf01000!FxDevice::DispatchWithLock+0 )
BugCheck C9, {22e, fffff88000e2d7c0, fffff98006092d30, 0}
BugCheck Info: DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
Arguments:
Arg1: 000000000000022e, The caller has completed a successful IRP_MJ_PNP instead of passing it down.
Arg2: fffff88000e2d7c0, The address in the driver's code where the error was detected.
Arg3: fffff98006092d30, IRP address.
Arg4: 0000000000000000
BUGCHECK_STR:  0xc9_22e
PROCESS_NAME:  System
FAILURE_BUCKET_ID:  X64_0xc9_22e_VRF_Wdf01000!FxDevice::DispatchWithLock+0
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Fri Apr  1 08:40:28.005 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\040116-10623-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:05:14.739
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33854 )
BugCheck 1A, {41790, fffffa8010a66820, ffff, 0}
BugCheck Info: MEMORY_MANAGEMENT (1a)
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8010a66820
Arg3: 000000000000ffff
Arg4: 0000000000000000
BUGCHECK_STR:  0x1a_41790
PROCESS_NAME:  chrome.exe
FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.80
  BIOS Release Date             02/23/2016
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Thu Mar 31 09:20:29.228 2016 (UTC - 4:00)**************************
Loading Dump File [C:\Users\John\SysnativeBSODApps\033116-14320-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Built by: 7601.19160.amd64fre.win7sp1_gdr.160211-0600
System Uptime: 0 days 0:03:07.947
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33854 )
BugCheck 1A, {41790, fffffa801095c450, ffff, 0}
BugCheck Info: MEMORY_MANAGEMENT (1a)
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa801095c450
Arg3: 000000000000ffff
Arg4: 0000000000000000
BUGCHECK_STR:  0x1a_41790
PROCESS_NAME:  MsMpEng.exe
FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33854
CPUID:        "Intel® Core™ i7-6700K CPU @ 4.00GHz"
MaxSpeed:     4000
CurrentSpeed: 4008
  BIOS Version                  A.60
  BIOS Release Date             12/17/2015
  Manufacturer                  MSI
  Product Name                  MS-7984
  Baseboard Product             Z170A KRAIT GAMING (MS-7984)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``


3rd Party Drivers:
The following is for information purposes only.
**************************Sun Apr  3 15:08:37.482 2016 (UTC - 4:00)**************************
intelppm.sys                Mon Jul 13 19:19:25 2009 (4A5BC0FD)
amdxata.sys                 Fri Mar 19 12:18:18 2010 (4BA3A3CA)
tap0901.sys                 Wed Nov  5 08:16:32 2014 (545A2330)
LGJoyXlCore.sys             Fri Apr 24 17:20:57 2015 (553AB3B9)
LGBusEnum.sys               Fri Apr 24 17:21:00 2015 (553AB3BC)
cmudaxp.sys                 Tue Jun  2 05:11:20 2015 (556D7338)
iusb3xhc.sys                Mon Jun 15 09:54:05 2015 (557ED8FD)
asmtxhci.sys                Thu Sep 10 05:38:13 2015 (55F14F85)
MpFilter.sys                Fri Oct 30 02:29:35 2015 (56330E4F)
networx.sys                 Thu Nov  5 14:52:09 2015 (563BB369)
e1d62x64.sys                Tue Nov 24 14:09:03 2015 (5654B5CF)
TeeDriverx64.sys            Wed Feb  3 17:40:35 2016 (56B281E3)
VBoxUSBMon.sys              Fri Mar  4 11:28:57 2016 (56D9B7C9)
VBoxNetAdp6.sys             Fri Mar  4 11:28:57 2016 (56D9B7C9)
VBoxNetLwf.sys              Fri Mar  4 11:28:57 2016 (56D9B7C9)
VBoxDrv.sys                 Fri Mar  4 11:29:26 2016 (56D9B7E6)
nvvad64v.sys                Mon Mar 14 02:27:42 2016 (56E659DE)
nvlddmkm.sys                Mon Mar 21 21:49:01 2016 (56F0A48D)
uvhid.sys                   Tue Mar 22 05:43:07 2016 (56F113AB)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Sun Apr  3 13:09:04.023 2016 (UTC - 4:00)**************************
lvrs64.sys                  Wed Jan 18 01:40:36 2012 (4F166964)
lvuvc64.sys                 Wed Jan 18 01:41:08 2012 (4F166984)
NTIOLib_X64.sys             Thu Oct 25 21:46:44 2012 (5089EB84)
NTIOLib_X64.sys             Mon Nov 26 05:11:53 2012 (50B34069)
LGVirHid.sys                Fri Apr 24 17:20:53 2015 (553AB3B5)
lgcoretemp.sys              Tue Jun  9 12:52:10 2015 (557719BA)
iusb3hub.sys                Mon Jun 15 09:54:03 2015 (557ED8FB)
asmthub3.sys                Thu Sep 10 05:38:17 2015 (55F14F89)
nvhda64v.sys                Mon Sep 21 05:44:17 2015 (55FFD171)
iqvw64e.sys                 Thu Oct 29 17:44:49 2015 (56329351)
ladfGSS.sys                 Sat Feb 13 15:36:17 2016 (56BF93C1)
NvStreamKms.sys             Fri Mar 18 17:26:05 2016 (56EC726D)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Sun Apr  3 05:37:17.416 2016 (UTC - 4:00)**************************
NTIOLib_X64.sys             Wed Oct 20 02:45:49 2010 (4CBE901D)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Sun Apr  3 04:42:07.815 2016 (UTC - 4:00)**************************
uvhid.sys                   Thu Oct  1 05:52:20 2015 (560D0254)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Thu Mar 31 09:20:29.228 2016 (UTC - 4:00)**************************
iqvw64e.sys                 Wed Apr 22 07:46:58 2015 (55378A32)
e1d62x64.sys                Thu Aug 13 05:05:40 2015 (55CC5DE4)
TeeDriverx64.sys            Thu Oct  8 14:11:48 2015 (5616B1E4)
nvlddmkm.sys                Tue Mar  8 00:45:32 2016 (56DE66FC)

 

 

http://www.carrona.org/drivers/driver.php?id=intelppm.sys
http://www.carrona.org/drivers/driver.php?id=amdxata.sys
http://www.carrona.org/drivers/driver.php?id=tap0901.sys
http://www.carrona.org/drivers/driver.php?id=LGJoyXlCore.sys
http://www.carrona.org/drivers/driver.php?id=LGBusEnum.sys
http://www.carrona.org/drivers/driver.php?id=cmudaxp.sys
http://www.carrona.org/drivers/driver.php?id=iusb3xhc.sys
http://www.carrona.org/drivers/driver.php?id=asmtxhci.sys
http://www.carrona.org/drivers/driver.php?id=MpFilter.sys
http://www.carrona.org/drivers/driver.php?id=networx.sys
http://www.carrona.org/drivers/driver.php?id=e1d62x64.sys
http://www.carrona.org/drivers/driver.php?id=TeeDriverx64.sys
http://www.carrona.org/drivers/driver.php?id=VBoxUSBMon.sys
http://www.carrona.org/drivers/driver.php?id=VBoxNetAdp6.sys
http://www.carrona.org/drivers/driver.php?id=VBoxNetLwf.sys
http://www.carrona.org/drivers/driver.php?id=VBoxDrv.sys
http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
http://www.carrona.org/drivers/driver.php?id=uvhid.sys
http://www.carrona.org/drivers/driver.php?id=lvrs64.sys
http://www.carrona.org/drivers/driver.php?id=lvuvc64.sys
http://www.carrona.org/drivers/driver.php?id=NTIOLib_X64.sys
http://www.carrona.org/drivers/driver.php?id=NTIOLib_X64.sys
http://www.carrona.org/drivers/driver.php?id=LGVirHid.sys
http://www.carrona.org/drivers/driver.php?id=lgcoretemp.sys
http://www.carrona.org/drivers/driver.php?id=iusb3hub.sys
http://www.carrona.org/drivers/driver.php?id=asmthub3.sys
http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
http://www.carrona.org/drivers/driver.php?id=iqvw64e.sys
ladfGSS.sys - this driver hasn't been added to the DRT as of this run. Please search Google/Bing for the driver if additional information is needed.
http://www.carrona.org/drivers/driver.php?id=NvStreamKms.sys
http://www.carrona.org/drivers/driver.php?id=NTIOLib_X64.sys
http://www.carrona.org/drivers/driver.php?id=uvhid.sys
http://www.carrona.org/drivers/driver.php?id=iqvw64e.sys
http://www.carrona.org/drivers/driver.php?id=e1d62x64.sys
http://www.carrona.org/drivers/driver.php?id=TeeDriverx64.sys
http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
 


Edited by usasma, 04 April 2016 - 05:11 AM.

My browser caused a flood of traffic, sio my IP address was banned. Hope to fix it soon. Will get back to posting as soon as Im able.

- John  (my website: http://www.carrona.org/ )**If you need a more detailed explanation, please ask for it. I have the Knack. **  If I haven't replied in 48 hours, please send me a message. My eye problems have recently increased and I'm having difficult reading posts. (23 Nov 2017)FYI - I am completely blind in the right eye and ~30% blind in the left eye.<p>If the eye problems get worse suddenly, I may not be able to respond.If that's the case and help is needed, please PM a staff member for assistance.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users