Windows 7 New EliteBook 8540p keeps Blue Screening..

djsax

New Member
Joined
May 13, 2011
Messages
8
Firstly, I would just like to say hi to everyone. Also that I am new and would really appreciate some help with BSOD's on my new Laptop.

I've had quite BSOD's in the last week or so and can attach a .ZIP file of the last 4..

I've tried my best to read the forum rules so there is also a couple of screen captures of CPU-Z that might also help..

I would really appreciate any help anyone could give on this..

Thanks in advance

DJLink RemovedLink Removed
 


Attachments

Solution
My question now is, I'm not running any external Firewall or Antivirus software on the OS.....is this ok or can you suggest some others that won't contribute towards a Blue Screen?

Also, something else that is screaming for an answer is, why is it that Avira and Zone Alarm cause these problems when they are both supposed to be 64 bit compliant on 7?


Avira is not a good idea alongside ZoneAlarm, more than one real-time protection systems are a frequent causer of UNEXPECTED_KERNEL_MODE_TRAP error - your crash dumps are all about this error with nt!KiDoubleFaultAbort. Microsoft Security Essentials does not cause blue screens and is always recommended whenever the causer is not completely clear.
Uninstall Avira, uninstall Zone Alarm.

Install Microsoft Security Essentials.

Link Removed due to 404 Error



Update drivers
:

Intel Mangement Engine
HECIx64.sys Thu Sep 17 15:54:16 2009
Link Removed

Intel Turbo Boost - update and disable it for now

USB 3.0 Controller
nusb3xhc.sys Fri Nov 20 05:16:01 2009

Ricoh Memory Card Reader
rimmpx64.sys Thu Jun 25 04:04:18 2009


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051111-23774-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e1a000 PsLoadedModuleList = 0xfffff800`03057e50
Debug session time: Wed May 11 15:37:56.020 2011 (UTC - 4:00)
System Uptime: 0 days 1:32:52.644
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 6f8, fffff80002e52eb0}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002e52eb0

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002e89ca9 to fffff80002e8a740

STACK_TEXT:  
fffff800`00ba4d28 fffff800`02e89ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02e88172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02e52eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b68dad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02e88172 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050711-22464-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e58000 PsLoadedModuleList = 0xfffff800`03095e50
Debug session time: Sat May  7 07:12:29.524 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:34.163
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 6f8, fffff80002e90eb0}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002e90eb0

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002ec7ca9 to fffff80002ec8740

STACK_TEXT:  
fffff880`02fd9ce8 fffff800`02ec7ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02fd9cf0 fffff800`02ec6172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02fd9e30 fffff800`02e90eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02ff5bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02ec6172 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050711-23275-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e0e000 PsLoadedModuleList = 0xfffff800`0304be50
Debug session time: Sat May  7 07:25:59.959 2011 (UTC - 4:00)
System Uptime: 0 days 0:13:08.223
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 6f8, fffff80002e46eb0}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002e46eb0

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002e7dca9 to fffff80002e7e740

STACK_TEXT:  
fffff880`009efce8 fffff800`02e7dca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009efcf0 fffff800`02e7c172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009efe30 fffff800`02e46eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02f15bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02e7c172 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051211-20295-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02e0f000 PsLoadedModuleList = 0xfffff800`0304ce50
Debug session time: Thu May 12 12:39:03.630 2011 (UTC - 4:00)
System Uptime: 0 days 0:28:28.269
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 6f8, fffff80002e47e88}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002e47e88

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002e7ec69 to fffff80002e7f700

STACK_TEXT:  
fffff880`02fd9ce8 fffff800`02e7ec69 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02fd9cf0 fffff800`02e7d132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02fd9e30 fffff800`02e47e88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02ff5b70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02e7d132 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------




Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`0530a000 fffff880`05348000   1394ohci 1394ohci.sys Wed Oct 14 23:35:12 2009 (4AD69870)
fffff880`03c26000 fffff880`03c33000   Accelerometer Accelerometer.sys Wed Apr 20 14:54:26 2011 (4DAF2BE2)
fffff880`00d58000 fffff880`00daf000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cc6000 fffff880`02d50000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c51000 fffff880`03c67000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`06e0f000 fffff880`06f40000   agrsm64  agrsm64.sys  Tue Jul 21 14:03:31 2009 (4A6602F3)
fffff880`011d0000 fffff880`011db000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`01182000 fffff880`0118b000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0118b000 fffff880`011b5000   ataport  ataport.SYS  Mon Aug 09 22:37:02 2010 (4C60BB4E)
fffff880`06fad000 fffff880`06fca000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
fffff880`04548000 fffff880`0456a000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
fffff880`00fe5000 fffff880`00ff1000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`03bb4000 fffff880`03bbb000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04537000 fffff880`04548000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02b4b000 fffff880`02b69000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00710000 fffff960`00737000   cdd      cdd.dll      unavailable (00000000)
fffff880`03b81000 fffff880`03bab000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00efa000 fffff880`00fba000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013c6000 fffff880`013f6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cfa000 fffff880`00d58000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03c33000 fffff880`03c37500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`014e3000 fffff880`01556000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fdc000 fffff880`00fe5000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`03c41000 fffff880`03c51000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`06f5b000 fffff880`06f69000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04496000 fffff880`04519000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`04519000 fffff880`04537000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04487000 fffff880`04496000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01444000 fffff880`0145a000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`067dd000 fffff880`067ff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06f69000 fffff880`06f7c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03a44000 fffff880`03b60000   dump_iaStor dump_iaStor.sys Mon Apr 05 12:30:59 2010 (4BBA1043)
fffff880`06f4f000 fffff880`06f5b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042d3000 fffff880`043c7000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04200000 fffff880`04246000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0427b000 fffff880`042c7000   e1k62x64 e1k62x64.sys Tue Apr 06 03:37:39 2010 (4BBAE4C3)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01567000 fffff880`01571000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
fffff880`0140a000 fffff880`01444000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0179a000 fffff880`017e4000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033eb000 fffff800`03434000   hal      hal.dll      Tue Sep 01 02:16:34 2009 (4A9CBC42)
fffff880`04246000 fffff880`0426a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0426a000 fffff880`0427b000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`01400000 fffff880`0140a000   hpdskflt hpdskflt.sys Wed Apr 20 14:54:27 2011 (4DAF2BE3)
fffff880`043d8000 fffff880`043e4000   HpqKbFiltr HpqKbFiltr.sys Wed Apr 29 09:48:30 2009 (49F85AAE)
fffff880`02a83000 fffff880`02b4b000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01612000 fffff880`0161b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04a37000 fffff880`04a55000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01066000 fffff880`01182000   iaStor   iaStor.sys   Mon Apr 05 12:30:59 2010 (4BBA1043)
fffff880`03c00000 fffff880`03c25180   Impcd    Impcd.sys    Mon Oct 26 16:39:41 2009 (4AE6090D)
fffff880`04590000 fffff880`045a6000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`06e00000 fffff880`06e0b000   ISWKL    ISWKL.sys    Mon Jun 14 12:12:22 2010 (4C1654E6)
fffff880`043e4000 fffff880`043f3000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`06788000 fffff880`067cb000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`014c9000 fffff880`014e3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0176f000 fffff880`0179a000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`066e6000 fffff880`066eb200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`06feb000 fffff880`07000000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06f8a000 fffff880`06fad000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ca2000 fffff880`00ce6000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`06f40000 fffff880`06f4f000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`06f7c000 fffff880`06f8a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03de3000 fffff880`03df2000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00dc4000 fffff880`00dde000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b69000 fffff880`02b81000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02b81000 fffff880`02bae000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`02bae000 fffff880`02bfc000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`02a00000 fffff880`02a23000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`011b5000 fffff880`011c0000   msahci   msahci.sys   Mon Aug 09 23:23:00 2010 (4C60C614)
fffff880`03a1b000 fffff880`03a26000   Msfs     Msfs.SYS     unavailable (00000000)
fffff880`00ebc000 fffff880`00ec6000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0146b000 fffff880`014c9000   msrpc    msrpc.sys    unavailable (00000000)
fffff880`0447c000 fffff880`04487000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0161d000 fffff880`0170f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03df2000 fffff880`03dfe000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06d4a000 fffff880`06d5d000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`066f6000 fffff880`06725000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06671000 fffff880`06686000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dab000 fffff880`02dba000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d50000 fffff880`02d95000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0170f000 fffff880`0176f000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`04a5f000 fffff880`052cb000   NETwNs64 NETwNs64.sys Tue Jan 04 14:29:41 2011 (4D237525)
fffff880`03a26000 fffff880`03a37000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04470000 fffff880`0447c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e0f000 fffff800`033eb000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01224000 fffff880`013c6000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`03bab000 fffff880`03bb4000   Null     Null.SYS     unavailable (00000000)
fffff880`0665a000 fffff880`06671000   nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
fffff880`052d8000 fffff880`05308000   nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
fffff880`061f0000 fffff880`061f1180   nvBridge nvBridge.kmd Sat Dec 04 05:43:33 2010 (4CFA1B55)
fffff880`06686000 fffff880`066a9000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D)
fffff880`05600000 fffff880`061efd00   nvlddmkm nvlddmkm.sys Sat Dec 04 05:46:15 2010 (4CFA1BF7)
fffff880`06cf7000 fffff880`06d4a000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02c9c000 fffff880`02cc2000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04a1a000 fffff880`04a37000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fc7000 fffff880`00fdc000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ec6000 fffff880`00ef9000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011c0000 fffff880`011d0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`00c5c000 fffff880`00c95000   pcmcia   pcmcia.sys   Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01556000 fffff880`01567000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08068000 fffff880`0810e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`066a9000 fffff880`066e6000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ce6000 fffff880`00cfa000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03c67000 fffff880`03c8b000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06725000 fffff880`06740000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`06740000 fffff880`06761000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`06761000 fffff880`0677b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0441f000 fffff880`04470000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0677b000 fffff880`06786000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`03a00000 fffff880`03a09000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03a09000 fffff880`03a12000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03a12000 fffff880`03a1b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bd000 fffff880`015f7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05368000 fffff880`0537e000   rimmpx64 rimmpx64.sys Thu Jun 25 04:04:18 2009 (4A432F82)
fffff880`0537e000 fffff880`05395000   rimspx64 rimspx64.sys Thu Jun 25 03:13:43 2009 (4A4323A7)
fffff880`053ec000 fffff880`053fa680   rismcx64 rismcx64.sys Mon Jul 20 05:30:52 2009 (4A64394C)
fffff880`05395000 fffff880`053ec000   rixdpx64 rixdpx64.sys Thu Jun 25 03:38:50 2009 (4A43298A)
fffff880`06d5d000 fffff880`06d75000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04a0c000 fffff880`04a1a000   scfilter scfilter.sys Mon Jul 13 19:50:17 2009 (4A5BC839)
fffff880`05348000 fffff880`05368000   sdbus    sdbus.sys    Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0810e000 fffff880`08119000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04a00000 fffff880`04a0c000   SMCLIB   SMCLIB.SYS   Mon Jul 13 20:00:35 2009 (4A5BCAA3)
fffff880`017f4000 fffff880`017fc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`084dd000 fffff880`08572000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`08158000 fffff880`081bf000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`08119000 fffff880`08146000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`06c75000 fffff880`06cf7000   stwrt64  stwrt64.sys  Thu Sep 09 03:12:10 2010 (4C8888CA)
fffff880`06786000 fffff880`06787480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`03c8c000 fffff880`03de3000   SynTP    SynTP.sys    Thu Jun 03 21:27:13 2010 (4C085671)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08146000 fffff880`08158000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03a37000 fffff880`03a44000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01200000 fffff880`0121e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dd5000 fffff880`02de9000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005c0000 fffff960`005ca000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`0456a000 fffff880`04590000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`067cb000 fffff880`067dd000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05308000 fffff880`05309f00   USBD     USBD.SYS     Mon Mar 28 23:32:09 2011 (4D9152B9)
fffff880`043c7000 fffff880`043d8000   usbehci  usbehci.sys  Mon Mar 28 23:32:16 2011 (4D9152C0)
fffff880`06600000 fffff880`0665a000   usbhub   usbhub.sys   Mon Mar 28 23:32:44 2011 (4D9152DC)
fffff880`045a6000 fffff880`045fc000   USBPORT  USBPORT.SYS  Mon Mar 28 23:32:20 2011 (4D9152C4)
fffff880`00fba000 fffff880`00fc7000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`03bbb000 fffff880`03bc9000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`03bc9000 fffff880`03bee000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017e4000 fffff880`017f4000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00daf000 fffff880`00dc4000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  unavailable (00000000)
fffff880`01571000 fffff880`015bd000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c00000 fffff880`02c93000   vsdatant vsdatant.sys Mon May 03 13:44:42 2010 (4BDF0B8A)
fffff880`052cb000 fffff880`052d8000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d95000 fffff880`02dab000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02dba000 fffff880`02dd5000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`03bee000 fffff880`03bfe000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c93000 fffff880`02c9c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00040000 fffff960`00352000   win32k   win32k.sys   unavailable (00000000)
fffff880`03c38000 fffff880`03c41000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00eb3000 fffff880`00ebc000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06fca000 fffff880`06feb000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08572000 fffff880`085e3000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`0145a000 fffff880`01468000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`03a52000 fffff880`03b6e000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0011C000
fffff880`03b6e000 fffff880`03b81000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


Hi cybercore :-)) Thanks so much for the unbelieveable quick reply..

I have uninstalled the 2 offenders, installed the MS security essentials and updated the drivers as you suggested..

My question now is, I'm not running any external Firewall or Antivirus software on the OS.....is this ok or can you suggest some others that won't contribute towards a Blue Screen?

Also, something else that is screaming for an answer is, why is it that Avira and Zone Alarm cause these problems when they are both supposed to be 64 bit compliant on 7?

If there is another forum that deals with these questions, sorry for posting the questions here...

So cybercore, thanks again and I'll monitor what happens with the laptop and report back if anything changes..

All the best
DJ
 


My question now is, I'm not running any external Firewall or Antivirus software on the OS.....is this ok or can you suggest some others that won't contribute towards a Blue Screen?

Also, something else that is screaming for an answer is, why is it that Avira and Zone Alarm cause these problems when they are both supposed to be 64 bit compliant on 7?


Avira is not a good idea alongside ZoneAlarm, more than one real-time protection systems are a frequent causer of UNEXPECTED_KERNEL_MODE_TRAP error - your crash dumps are all about this error with nt!KiDoubleFaultAbort. Microsoft Security Essentials does not cause blue screens and is always recommended whenever the causer is not completely clear.
 


Solution
Just a quick update to cybercore..My notebook hasn't crashed once since I took your advice. Very stable, very happy thanks very much for the help. :-)
 


Hi all,

I have the same problems with the Elitebook 8540p. When playing movies or sometimes Flash, my laptop is crashing (my laptop doesn't respond, hard reboot needed). The problem always occurs when im playing movies and sometimes I get BlueScreen.

I have attached my last error file dump :

Microsoft (R) Windows Debugger Version 6.2.8229.0 AMD64Copyright (c) Microsoft Corporation. All rights reserved.




Loading Dump File [C:\Windows\Minidump\041312-18720-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16973.amd64fre.win7_gdr.120305-1504
Machine Name:
Kernel base = 0xfffff800`02e0d000 PsLoadedModuleList = 0xfffff800`03049e70
Debug session time: Fri Apr 13 13:29:49.103 2012 (UTC + 2:00)
System Uptime: 0 days 1:52:38.679
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
..................
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\oca.ini, error 2
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\winxp\triage.ini, error 2
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************


Use !analyze -v to get detailed debugging information.


BugCheck 116, {fffffa8008f57010, fffff880101c3db0, 0, 2}


Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
Probably caused by : nvlddmkm.sys ( nvlddmkm+1b1db0 )


Followup: MachineOwner
---------


3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************


VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8008f57010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff880101c3db0, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.


Debugging Details:
------------------


TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2


FAULTING_IP:
nvlddmkm+1b1db0
fffff880`101c3db0 4883ec28 sub rsp,28h


DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT


CUSTOMER_CRASH_COUNT: 1


BUGCHECK_STR: 0x116


PROCESS_NAME: System


CURRENT_IRQL: 0


STACK_TEXT:
fffff880`055db9c8 fffff880`06cd6000 : 00000000`00000116 fffffa80`08f57010 fffff880`101c3db0 00000000`00000000 : nt!KeBugCheckEx
fffff880`055db9d0 fffff880`06cd5d0a : fffff880`101c3db0 fffffa80`08f57010 fffffa80`0665bd50 fffffa80`06649290 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`055dba10 fffff880`06d7cf07 : fffffa80`08f57010 00000000`00000000 fffffa80`0665bd50 fffffa80`06649290 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`055dba40 fffff880`06da6b75 : 00000000`ffffffff 00000000`00069b03 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`055dbb20 fffff880`06da52bb : 00000000`00000102 00000000`00000000 00000000`00069b03 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`055dbb50 fffff880`06d782c6 : ffffffff`ff676980 fffffa80`06649290 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`055dbbf0 fffff880`06da4e7a : 00000000`00000000 fffffa80`04710160 00000000`00000080 fffffa80`06649290 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`055dbd00 fffff800`0311c6e6 : 00000000`fffffc32 fffffa80`06660060 fffffa80`03b71ae0 fffffa80`06660060 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`055dbd40 fffff800`02e5bac6 : fffff880`031d3180 fffffa80`06660060 fffff880`031ddfc0 fffff880`0145f2b4 : nt!PspSystemThreadStartup+0x5a
fffff880`055dbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16




STACK_COMMAND: .bugcheck ; kb


FOLLOWUP_IP:
nvlddmkm+1b1db0
fffff880`101c3db0 4883ec28 sub rsp,28h


SYMBOL_NAME: nvlddmkm+1b1db0


FOLLOWUP_NAME: MachineOwner


MODULE_NAME: nvlddmkm


IMAGE_NAME: nvlddmkm.sys


DEBUG_FLR_IMAGE_TIMESTAMP: 4f6b8533


FAILURE_BUCKET_ID: X64_0x116_IMAGE_nvlddmkm.sys


BUCKET_ID: X64_0x116_IMAGE_nvlddmkm.sys


Followup: MachineOwner
---------

When I connect a projector (VGA connector, Samsung LCD display, 17"), I don't get theses crashes (I also don't get crashes in Ubuntu distribution).

I have this problem since 6months and any help would be really appreciated.


For information, my antivirus is BitDefender Internet Security 2012, and it is up to date.


Ps: Sorry for my English, Im French.


Thanks in advance!
 


Back
Top