none
bsod help RRS feed

  • Question

  • I am having a lot of blue screens and I don't know what is going on. I know where the logs are, but I don't have the tools to open them.
    Sunday, October 11, 2015 2:20 PM

All replies

  • Try this free online crash dump decoder here.

    If it still won't make any sense for you, find a tech. support person or consultant.


    Sunday, October 11, 2015 2:24 PM
  • I got this on one of them:

    Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
    Online Crash Dump Analysis Service
    See http://www.osronline.com for more information
    Windows 8 Kernel Version 10240 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 10240.16515.amd64fre.th1.150916-2039
    Machine Name:
    Kernel base = 0xfffff800`bac19000 PsLoadedModuleList = 0xfffff800`baf3e010
    Debug session time: Sun Oct 11 08:48:55.810 2015 (UTC - 4:00)
    System Uptime: 0 days 0:07:26.820
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041793, The subtype of the bugcheck.
    Arg2: fffff68074aa4870
    Arg3: 0000000000000004
    Arg4: 0000000000000003

    Debugging Details:
    ------------------

    TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

    BUGCHECK_STR:  0x1a_41793

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    PROCESS_NAME:  svchost.exe

    CURRENT_IRQL:  2

    LAST_CONTROL_TRANSFER:  from fffff800bad9680e to fffff800bad67240

    STACK_TEXT: 
    ffffd001`b4ed67e8 fffff800`bad9680e : 00000000`0000001a 00000000`00041793 fffff680`74aa4870 00000000`00000004 : nt!KeBugCheckEx
    ffffd001`b4ed67f0 fffff800`bac45df0 : 00000000`0000775e ffffd001`b4ed6ab9 ffffe001`ebc3bc78 ffffe001`ed5ad8a0 : nt! ?? ::FNODOBFM::`string'+0x20a0e
    ffffd001`b4ed69f0 fffff800`bb0252ac : 000000e9`4fe00000 ffffe001`ed4e1110 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x4b0
    ffffd001`b4ed6b20 fffff800`bb025967 : 00000001`00001000 00000000`00000008 000000e9`4fe00000 00007ffe`63fd6701 : nt!MiUnmapViewOfSection+0xec
    ffffd001`b4ed6bf0 fffff800`bad71863 : ffffe001`ed47b080 000000e9`4ee03c28 ffffe001`ed47b080 ffffe001`ebc3b780 : nt!NtUnmapViewOfSectionEx+0x77
    ffffd001`b4ed6c40 00007ffe`7dd24fea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    000000e9`49f9d368 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffe`7dd24fea


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt! ?? ::FNODOBFM::`string'+20a0e
    fffff800`bad9680e cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+20a0e

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  55fa569b

    FAILURE_BUCKET_ID:  X64_0x1a_41793_nt!_??_::FNODOBFM::_string_+20a0e

    BUCKET_ID:  X64_0x1a_41793_nt!_??_::FNODOBFM::_string_+20a0e

    Sunday, October 11, 2015 10:05 PM
  • another one was:

    Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
    Online Crash Dump Analysis Service
    See http://www.osronline.com for more information
    Windows 8 Kernel Version 10240 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 10240.16515.amd64fre.th1.150916-2039
    Machine Name:
    Kernel base = 0xfffff803`24c08000 PsLoadedModuleList = 0xfffff803`24f2d010
    Debug session time: Sat Oct 10 14:33:59.239 2015 (UTC - 4:00)
    System Uptime: 0 days 20:24:16.250
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
    Arg2: 0000000000001e00, The watchdog period.
    Arg3: 0000000000000000
    Arg4: 0000000000000000

    Debugging Details:
    ------------------

    TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  0x133

    PROCESS_NAME:  System

    CURRENT_IRQL:  d

    LAST_CONTROL_TRANSFER:  from fffff80324d6ee7a to fffff80324d56240

    STACK_TEXT: 
    ffffd000`8fb29c78 fffff803`24d6ee7a : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
    ffffd000`8fb29c80 fffff803`24c121cf : ffffd000`8fb29ea0 00000000`00000041 00000000`00000002 00000000`0047bc10 : nt! ?? ::FNODOBFM::`string'+0xa07a
    ffffd000`8fb29d10 fffff803`2545cd15 : 00000000`00400a02 fffff803`24ce4475 ffffe000`d1b43200 00000000`00000000 : nt!KeClockInterruptNotify+0x9f
    ffffd000`8fb29f40 fffff803`24cd9257 : ffffd000`8fb29f60 fffff803`24db0135 ffffd000`8fb29f50 00000000`00000010 : hal!HalpTimerClockIpiRoutine+0x15
    ffffd000`8fb29f70 fffff803`24d5760a : ffffe000`d1b43200 00000000`00384000 ffffc000`3448dee0 ffffc000`3448c870 : nt!KiCallInterruptServiceRoutine+0x87
    ffffd000`8fb29fb0 fffff803`24d57a37 : 00000000`00384000 80000011`37c3cb8a 00000000`00000000 00001f80`00000200 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
    ffffd000`243288f0 fffff803`24c719c6 : 00000000`00000000 00000000`00002011 00000000`00000011 00000000`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37
    ffffd000`24328a80 fffff803`2503db6f : 00000000`00002000 ffffc000`00002001 00000000`00000000 fffffa80`0100a6d0 : nt!MiDeleteSegmentPages+0xd6
    ffffd000`24328b20 fffff803`24c36679 : 00000000`00000002 00000000`00000000 ffffe000`d8653500 ffff72f5`d51d0d72 : nt!MiSegmentDelete+0x63
    ffffd000`24328b60 fffff803`25033558 : ffffc000`3565b8e0 fffff800`468463b0 00000000`00000000 00000000`00000000 : nt!MiCheckControlArea+0x229
    ffffd000`24328bc0 fffff803`24c4f96f : 00000000`00000000 00000000`00000000 fffff800`468463b0 ffffc000`3565b910 : nt!ObpRemoveObjectRoutine+0x78
    ffffd000`24328c20 fffff800`468463dd : ffffe000`d7447890 ffffe000`d7447890 ffffe000`d2b2a1d0 00000000`00000000 : nt!ObfDereferenceObject+0xbf
    ffffd000`24328c60 fffff803`24c806a9 : fffff803`24fe1340 ffffe000`d2d70040 fffff800`468463b0 ffffe000`d7447890 : dxgmms1!VidMmProcessAsyncOperation+0x2d
    ffffd000`24328cb0 fffff803`24ceee88 : fffff901`40810580 00000000`00000080 fffff803`24fe1340 ffffe000`d2d70040 : nt!ExpWorkerThread+0xe9
    ffffd000`24328d40 fffff803`24d5b326 : fffff803`24f6b180 ffffe000`d2d70040 ffffe000`d71ce800 00000000`00000001 : nt!PspSystemThreadStartup+0x58
    ffffd000`24328da0 00000000`00000000 : ffffd000`24329000 ffffd000`24323000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    dxgmms1!VidMmProcessAsyncOperation+2d
    fffff800`468463dd 8b05dde9fdff    mov     eax,dword ptr [dxgmms1!Microsoft_Windows_DxgKrnlEnableBits (fffff800`46824dc0)]

    SYMBOL_STACK_INDEX:  c

    SYMBOL_NAME:  dxgmms1!VidMmProcessAsyncOperation+2d

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: dxgmms1

    IMAGE_NAME:  dxgmms1.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  55fa55ae

    FAILURE_BUCKET_ID:  X64_0x133_dxgmms1!VidMmProcessAsyncOperation+2d

    BUCKET_ID:  X64_0x133_dxgmms1!VidMmProcessAsyncOperation+2d

    Sunday, October 11, 2015 10:06 PM
  • and:

    Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
    Online Crash Dump Analysis Service
    See http://www.osronline.com for more information
    Windows 8 Kernel Version 10240 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 10240.16515.amd64fre.th1.150916-2039
    Machine Name:
    Kernel base = 0xfffff800`f0080000 PsLoadedModuleList = 0xfffff800`f03a5010
    Debug session time: Sat Oct 10 21:53:06.551 2015 (UTC - 4:00)
    System Uptime: 0 days 7:18:30.265
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800f016400c, Address of the instruction which caused the bugcheck
    Arg3: ffffd00136074de0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
    
    FAULTING_IP: 
    nt!MiCaptureProtectionFromProto+14
    fffff800`f016400c 488b01          mov     rax,qword ptr [rcx]
    
    CONTEXT:  ffffd00136074de0 -- (.cxr 0xffffd00136074de0)
    rax=0000000000000000 rbx=ffffe001483d4578 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000001
    rip=fffff800f016400c rsp=ffffd00136075800 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000001 r10=0000000000000000
    r11=0000000000000000 r12=00000000ffffffff r13=fffff6804334afd8
    r14=ffffe001483d4080 r15=fffffa8000445710
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    nt!MiCaptureProtectionFromProto+0x14:
    fffff800`f016400c 488b01          mov     rax,qword ptr [rcx] ds:002b:00000000`00000000=0000000000000000
    Resetting default scope
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  MicrosoftEdge.
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800f00a653a to fffff800f016400c
    
    STACK_TEXT:  
    ffffd001`36075800 fffff800`f00a653a : ffffe001`483d4578 00000000`00000000 00000000`00000000 00000086`695fbfff : nt!MiCaptureProtectionFromProto+0x14
    ffffd001`36075830 fffff800`f00ab451 : 00000000`00000001 00000000`00000080 00000086`695fb000 ffffe001`00000001 : nt!MiGetPageProtection+0x23a
    ffffd001`36075880 fffff800`f04870b9 : 00000000`00000000 ffffd001`36075a00 ffffd001`00000000 00000000`00000000 : nt!MiCommitExistingVad+0x701
    ffffd001`36075990 fffff800`f0486d70 : 00000086`00000000 ffffe001`43acb640 00000000`00000000 00000000`00000000 : nt!MiAllocateVirtualMemory+0x339
    ffffd001`36075b70 fffff800`f01d8863 : fffff6fb`402198c8 fffff680`43319328 ffff329c`666969e5 ffffd001`36075cc0 : nt!NtAllocateVirtualMemory+0x40
    ffffd001`36075bd0 00007ffc`2bf3367a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000086`63a77f38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffc`2bf3367a
    
    
    FOLLOWUP_IP: 
    nt!MiCaptureProtectionFromProto+14
    fffff800`f016400c 488b01          mov     rax,qword ptr [rcx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiCaptureProtectionFromProto+14
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  55fa569b
    
    STACK_COMMAND:  .cxr 0xffffd00136074de0 ; kb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!MiCaptureProtectionFromProto+14
    
    BUCKET_ID:  X64_0x3B_nt!MiCaptureProtectionFromProto+14
    

    Sunday, October 11, 2015 10:07 PM
  • bought in 2012 and the warranty is expired. it is an hp off the shelf.
    Wednesday, October 14, 2015 1:37 AM
  • laptop

    Wednesday, October 14, 2015 1:45 AM
  • ask what?
    Wednesday, October 14, 2015 10:14 PM
  • Ask how to proceed with this issue.

    Thursday, October 15, 2015 3:07 PM