BSOD on brand new laptop

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by ratty, Feb 23, 2011.

  1. ratty

    ratty New Member

    Joined:
    Feb 23, 2011
    Messages:
    4
    Likes Received:
    0
    I have a week-old Qosmio x505 q8100 that is giving me random BSODs while I"m working. It has always started up just fine and then at some point while I'm working, the BS shows up. I just got this computer after returning 2 Toshiba Satellite laptops that did the same thing. I run an external monitor, which is a Viewsonic VA2702w, which has the latest drivers and is compatible with the OS. Toshiba tech support told me the problem is probably from 3rd party software. Can you help me figure it out? I run TradeStation 8.8 and Firefox most of the time, and very little else. Here are the CPUID and RAMMon files, plus the minidump file.

    Thank you! slot2.PNG Memory.PNG slot3.PNG slot1.PNG slot4.PNG

    [​IMG][​IMG]
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    RAM is set right, Samsung x 2 DDR1333 9-9-9-24 1.5v.

    Uninstall Avast, install MSE:

    avast! Uninstall Utility

    https://www.microsoft.com/security_essentials/




    Try to update:

    Toshiba HDD protection
    Thpevm.SYS Mon Jun 29 04:15:37 2009
    QIOMem.sys Mon Jun 15 01:58:48 2009

    Toshiba Camera
    pgeffect.sys Mon Jun 22 05:00:11 2009






    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022311-28345-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034a2e50
    Debug session time: Wed Feb 23 10:15:48.347 2011 (UTC - 5:00)
    System Uptime: 0 days 0:25:29.799
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff960001efc77, fffff8800b9f5ad0, 0}
    
    Probably caused by : win32k.sys ( win32k!xxxSendMenuDrawItemMessage+253 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff960001efc77, Address of the instruction which caused the bugcheck
    Arg3: fffff8800b9f5ad0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`001efc77 44016e08        add     dword ptr [rsi+8],r13d
    
    CONTEXT:  fffff8800b9f5ad0 -- (.cxr 0xfffff8800b9f5ad0)
    rax=fffff8800b9f64e0 rbx=fffff900c0814a40 rcx=fffff8800b9f657c
    rdx=00000080b4e1e554 rsi=0000000000000000 rdi=fffff900c08114f0
    rip=fffff960001efc77 rsp=fffff8800b9f64a0 rbp=0000000060011bc8
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000100
    r11=fffff900c1fe6c30 r12=0000000000000001 r13=0000000000000001
    r14=0000000000000001 r15=fffff900c0814e20
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    win32k!xxxSendMenuDrawItemMessage+0x253:
    fffff960`001efc77 44016e08        add     dword ptr [rsi+8],r13d ds:002b:00000000`00000008=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  orchart.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960001efc77
    
    STACK_TEXT:  
    fffff880`0b9f64a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxSendMenuDrawItemMessage+0x253
    
    
    FOLLOWUP_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`001efc77 44016e08        add     dword ptr [rsi+8],r13d
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!xxxSendMenuDrawItemMessage+253
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0
    
    STACK_COMMAND:  .cxr 0xfffff8800b9f5ad0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022311-23166-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03451e50
    Debug session time: Wed Feb 23 10:42:59.326 2011 (UTC - 5:00)
    System Uptime: 0 days 0:25:51.388
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff960001afc77, fffff88008070ad0, 0}
    
    Probably caused by : win32k.sys ( win32k!xxxSendMenuDrawItemMessage+253 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff960001afc77, Address of the instruction which caused the bugcheck
    Arg3: fffff88008070ad0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`001afc77 44016e08        add     dword ptr [rsi+8],r13d
    
    CONTEXT:  fffff88008070ad0 -- (.cxr 0xfffff88008070ad0)
    rax=fffff880080714e0 rbx=fffff900c08211c0 rcx=fffff8800807157c
    rdx=00000080b87afcd4 rsi=0000000000000000 rdi=fffff900c081dc80
    rip=fffff960001afc77 rsp=fffff880080714a0 rbp=ffffffffff011bba
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000100
    r11=fffff900c1c16560 r12=0000000000000001 r13=0000000000000001
    r14=0000000000000001 r15=fffff900c081f9a0
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    win32k!xxxSendMenuDrawItemMessage+0x253:
    fffff960`001afc77 44016e08        add     dword ptr [rsi+8],r13d ds:002b:00000000`00000008=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  orchart.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960001afc77
    
    STACK_TEXT:  
    fffff880`080714a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxSendMenuDrawItemMessage+0x253
    
    
    FOLLOWUP_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`001afc77 44016e08        add     dword ptr [rsi+8],r13d
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!xxxSendMenuDrawItemMessage+253
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0
    
    STACK_COMMAND:  .cxr 0xfffff88008070ad0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022311-23166-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`03214000 PsLoadedModuleList = 0xfffff800`03451e50
    Debug session time: Wed Feb 23 10:42:59.326 2011 (UTC - 5:00)
    System Uptime: 0 days 0:25:51.388
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff960001afc77, fffff88008070ad0, 0}
    
    Probably caused by : win32k.sys ( win32k!xxxSendMenuDrawItemMessage+253 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff960001afc77, Address of the instruction which caused the bugcheck
    Arg3: fffff88008070ad0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`001afc77 44016e08        add     dword ptr [rsi+8],r13d
    
    CONTEXT:  fffff88008070ad0 -- (.cxr 0xfffff88008070ad0)
    rax=fffff880080714e0 rbx=fffff900c08211c0 rcx=fffff8800807157c
    rdx=00000080b87afcd4 rsi=0000000000000000 rdi=fffff900c081dc80
    rip=fffff960001afc77 rsp=fffff880080714a0 rbp=ffffffffff011bba
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000100
    r11=fffff900c1c16560 r12=0000000000000001 r13=0000000000000001
    r14=0000000000000001 r15=fffff900c081f9a0
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    win32k!xxxSendMenuDrawItemMessage+0x253:
    fffff960`001afc77 44016e08        add     dword ptr [rsi+8],r13d ds:002b:00000000`00000008=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  orchart.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960001afc77
    
    STACK_TEXT:  
    fffff880`080714a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxSendMenuDrawItemMessage+0x253
    
    
    FOLLOWUP_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`001afc77 44016e08        add     dword ptr [rsi+8],r13d
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!xxxSendMenuDrawItemMessage+253
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0
    
    STACK_COMMAND:  .cxr 0xfffff88008070ad0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022311-22900-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`0325c000 PsLoadedModuleList = 0xfffff800`03499e50
    Debug session time: Wed Feb 23 10:46:17.661 2011 (UTC - 5:00)
    System Uptime: 0 days 0:02:52.723
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff9600019fc77, fffff88008a5dad0, 0}
    
    Probably caused by : win32k.sys ( win32k!xxxSendMenuDrawItemMessage+253 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff9600019fc77, Address of the instruction which caused the bugcheck
    Arg3: fffff88008a5dad0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`0019fc77 44016e08        add     dword ptr [rsi+8],r13d
    
    CONTEXT:  fffff88008a5dad0 -- (.cxr 0xfffff88008a5dad0)
    rax=fffff88008a5e4e0 rbx=fffff900c0818cf0 rcx=fffff88008a5e57c
    rdx=00000080b7dba804 rsi=0000000000000000 rdi=fffff900c08157b0
    rip=fffff9600019fc77 rsp=fffff88008a5e4a0 rbp=000000007e011922
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000100
    r11=fffff900c1ac35f0 r12=0000000000000001 r13=0000000000000001
    r14=0000000000000001 r15=fffff900c08171e0
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    win32k!xxxSendMenuDrawItemMessage+0x253:
    fffff960`0019fc77 44016e08        add     dword ptr [rsi+8],r13d ds:002b:00000000`00000008=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  orchart.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff9600019fc77
    
    STACK_TEXT:  
    fffff880`08a5e4a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxSendMenuDrawItemMessage+0x253
    
    
    FOLLOWUP_IP: 
    win32k!xxxSendMenuDrawItemMessage+253
    fffff960`0019fc77 44016e08        add     dword ptr [rsi+8],r13d
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!xxxSendMenuDrawItemMessage+253
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0
    
    STACK_COMMAND:  .cxr 0xfffff88008a5dad0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    BUCKET_ID:  X64_0x3B_win32k!xxxSendMenuDrawItemMessage+253
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`10d20000 fffff880`10d5e000   1394ohci 1394ohci.sys Fri Apr 02 23:36:00 2010 (4BB6B7A0)
    fffff880`00eee000 fffff880`00f45000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`01a00000 fffff880`01a8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`051d0000 fffff880`051e6000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`011ef000 fffff880`011fa000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`02cfb000 fffff880`02d04000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
    fffff880`02cc1000 fffff880`02cfb000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
    fffff880`01a8a000 fffff880`01a94000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
    fffff880`042c6000 fffff880`0430f000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
    fffff880`01bc3000 fffff880`01bd3000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
    fffff880`011b1000 fffff880`011ba000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`011ba000 fffff880`011e4000   ataport  ataport.SYS  Mon Aug 09 22:37:02 2010 (4C60BB4E)
    fffff880`04ad4000 fffff880`04d5e000   athrx    athrx.sys    Fri Nov 05 20:03:05 2010 (4CD49B39)
    fffff880`00fb6000 fffff880`00fc2000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`041a2000 fffff880`041a9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`042b5000 fffff880`042c6000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`05738000 fffff880`05756000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Wed Jan 26 01:28:29 2011 (4D3FBF0D)
    fffff880`0416f000 fffff880`04199000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04335000 fffff880`043ee000   CHDRT64  CHDRT64.sys  Wed Oct 13 01:17:49 2010 (4CB540FD)
    fffff880`00cc5000 fffff880`00d85000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01b35000 fffff880`01b65000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c67000 fffff880`00cc5000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05199000 fffff880`0519d500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01546000 fffff880`015b9000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fad000 fffff880`00fb6000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`051c0000 fffff880`051d0000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`10088000 fffff880`10096000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04297000 fffff880`042b5000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`04288000 fffff880`04297000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01b1f000 fffff880`01b35000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`10066000 fffff880`10088000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`10096000 fffff880`100a9000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04000000 fffff880`04154000   dump_iaStor dump_iaStor.sys Mon Sep 13 21:23:32 2010 (4C8ECE94)
    fffff880`04ac0000 fffff880`04acc000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04606000 fffff880`046fa000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:20:10 2011 (4D3FA0FA)
    fffff880`046fa000 fffff880`04740000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:19:38 2011 (4D3FA0DA)
    fffff880`00e10000 fffff880`00e24000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`015ca000 fffff880`015d4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01ae5000 fffff880`01b1f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`05176000 fffff880`05183000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`03213000 fffff800`0325c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04740000 fffff880`04764000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04764000 fffff880`04775000   HECIx64  HECIx64.sys  Tue Sep 21 12:59:04 2010 (4C98E458)
    fffff880`05670000 fffff880`05738000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`017f1000 fffff880`017fa000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04d80000 fffff880`04d9e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0105d000 fffff880`011b1000   iaStor   iaStor.sys   Mon Sep 13 21:23:32 2010 (4C8ECE94)
    fffff880`05183000 fffff880`05199000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`04d9e000 fffff880`04dad000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00b8f000 fffff800`00b99000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04a56000 fffff880`04a99000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`0152c000 fffff880`01546000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`017b2000 fffff880`017dd000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`051f4000 fffff880`051f9200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`04d6b000 fffff880`04d80000   L1C62x64 L1C62x64.sys Mon Sep 27 02:36:23 2010 (4CA03B67)
    fffff880`02d30000 fffff880`02d45000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02c9e000 fffff880`02cc1000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c0f000 fffff880`00c53000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`100a9000 fffff880`100b7000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0515d000 fffff880`0516c000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00fd7000 fffff880`00ff1000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`05756000 fffff880`0576e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0576e000 fffff880`0579b000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0579b000 fffff880`057e9000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`05600000 fffff880`05623000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`011e4000 fffff880`011ef000   msahci   msahci.sys   Mon Aug 09 23:23:00 2010 (4C60C614)
    fffff880`01b7c000 fffff880`01b87000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f4e000 fffff880`00f58000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`014ce000 fffff880`0152c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`0427d000 fffff880`04288000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015d4000 fffff880`015e6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01660000 fffff880`01752000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`051e6000 fffff880`051f2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02d98000 fffff880`02dab000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`04dd1000 fffff880`04e00000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04aab000 fffff880`04ac0000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`0123a000 fffff880`01249000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`01a94000 fffff880`01ad9000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01752000 fffff880`017b2000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01b87000 fffff880`01b98000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04271000 fffff880`0427d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0325c000 fffff800`03839000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01255000 fffff880`013f7000   Ntfs     Ntfs.sys     Tue May 11 23:25:59 2010 (4BEA1FC7)
    fffff880`04199000 fffff880`041a2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`10d1e000 fffff880`10d1f180   nvBridge nvBridge.kmd Wed Nov 17 17:04:42 2010 (4CE4517A)
    fffff880`10000000 fffff880`10029000   nvhda64v nvhda64v.sys Tue Sep 07 16:08:40 2010 (4C869BC8)
    fffff880`100b8000 fffff880`10d1de00   nvlddmkm nvlddmkm.sys Wed Nov 17 17:07:52 2010 (4CE45238)
    fffff880`02d45000 fffff880`02d98000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`047e7000 fffff880`047f8880   o2mdgx64 o2mdgx64.sys Thu Nov 18 03:56:14 2010 (4CE4EA2E)
    fffff880`047dc000 fffff880`047e6780   o2sdgx64 o2sdgx64.sys Tue Aug 18 05:00:36 2009 (4A8A6DB4)
    fffff880`01bd3000 fffff880`01bf9000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f98000 fffff880`00fad000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f58000 fffff880`00f8b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00ff1000 fffff880`00ff8000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e00000 fffff880`00e10000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015b9000 fffff880`015ca000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05e76000 fffff880`05f1c000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`02c97000 fffff880`02c9de80   pgeffect pgeffect.sys Mon Jun 22 05:00:11 2009 (4A3F481B)
    fffff880`10029000 fffff880`10066000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c53000 fffff880`00c67000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`051a6000 fffff880`051b0000   QIOMem   QIOMem.sys   Mon Jun 15 01:58:48 2009 (4A35E318)
    fffff880`04dad000 fffff880`04dd1000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04a00000 fffff880`04a1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04a1b000 fffff880`04a3c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04a3c000 fffff880`04a56000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04220000 fffff880`04271000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`041ec000 fffff880`041f5000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`041f5000 fffff880`041fe000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01b73000 fffff880`01b7c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01200000 fffff880`0123a000   rdyboost rdyboost.sys Sat Jun 19 00:25:06 2010 (4C1C46A2)
    fffff880`02dab000 fffff880`02dc3000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`10d5e000 fffff880`10d8d000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`05f1c000 fffff880`05f27000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`05f27000 fffff880`05fde000   Sftfslh  Sftfslh.sys  Wed Dec 02 19:55:48 2009 (4B170C94)
    fffff880`05e00000 fffff880`05e4d000   Sftplaylh Sftplaylh.sys Wed Dec 02 19:55:40 2009 (4B170C8C)
    fffff880`05e5f000 fffff880`05e6a000   Sftredirlh Sftredirlh.sys Wed Dec 02 19:55:52 2009 (4B170C98)
    fffff880`02d04000 fffff880`02d0f000   Sftvollh Sftvollh.sys Wed Dec 02 19:55:23 2009 (4B170C7B)
    fffff880`017e9000 fffff880`017f1000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06770000 fffff880`067e1000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`066da000 fffff880`06770000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`02c00000 fffff880`02c67000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`05623000 fffff880`05650000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`051f2000 fffff880`051f3480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`05001000 fffff880`0515b000   SynTP    SynTP.sys    Thu Sep 30 22:31:52 2010 (4CA54818)
    fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`05e4d000 fffff880`05e5f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0516c000 fffff880`05176000   tdcmdpst tdcmdpst.sys Thu Jul 30 04:39:35 2009 (4A715C47)
    fffff880`01bb6000 fffff880`01bc3000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01b98000 fffff880`01bb6000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`00e24000 fffff880`00e38000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`017dd000 fffff880`017e9000   thpdrv   thpdrv.sys   Sun Jun 28 22:02:56 2009 (4A4820D0)
    fffff880`019fd000 fffff880`019fef80   Thpevm   Thpevm.SYS   Mon Jun 29 04:15:37 2009 (4A487829)
    fffff880`0144c000 fffff880`014c6000   tos_sps64 tos_sps64.sys Wed Jun 24 01:31:09 2009 (4A41BA1D)
    fffff880`0519e000 fffff880`051a6000   tosrfec  tosrfec.sys  Fri Jun 18 03:45:42 2010 (4C1B2426)
    fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`0430f000 fffff880`04335000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`01652000 fffff880`01656e00   TVALZ_O  TVALZ_O.SYS  Mon Jul 13 22:19:26 2009 (4A5BEB2E)
    fffff880`051b0000 fffff880`051b7000   TVALZFL  TVALZFL.sys  Fri Jun 19 06:05:44 2009 (4A3B62F8)
    fffff880`04a99000 fffff880`04aab000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`04200000 fffff880`0421d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0515b000 fffff880`0515cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04775000 fffff880`04786000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
    fffff880`10d8d000 fffff880`10de7000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF)
    fffff880`04786000 fffff880`047dc000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`02c69000 fffff880`02c96200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
    fffff880`00f8b000 fffff880`00f98000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`041a9000 fffff880`041b7000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`041b7000 fffff880`041dc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fc2000 fffff880`00fd7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d85000 fffff880`00de1000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`04d5e000 fffff880`04d6b000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`015e6000 fffff880`015fc000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`00de1000 fffff880`00dfc000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`041dc000 fffff880`041ec000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`0164a000 fffff880`01652000   wd       wd.sys       Mon Jul 13 19:19:55 2009 (4A5BC11B)
    fffff880`00e3b000 fffff880`00edf000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00edf000 fffff880`00eee000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01ad9000 fffff880`01ae2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00070000 fffff960`00380000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
    fffff880`051b7000 fffff880`051c0000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f45000 fffff880`00f4e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02d0f000 fffff880`02d30000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`01b65000 fffff880`01b73000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`04008000 fffff880`0415c000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00154000
    fffff880`0415c000 fffff880`0416f000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. ratty

    ratty New Member

    Joined:
    Feb 23, 2011
    Messages:
    4
    Likes Received:
    0
    Thank you for the reply. I uninstalled avast and switched to MSE, and got another BSOD today. This computer isn't listed on the toshiba website yet, so I haven't updated the listed drivers.

    Could this be an issue with my printer or external monitor? Should I send the latest BSOD date?
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Yes, attach your latest .dmp's files.
     
    #4 cybercore, Feb 25, 2011
    Last edited: Feb 25, 2011

Share This Page

Loading...