locked
Blue Screen in Windows 7 Home Premium (Laptop) RRS feed

  • Question

  • I have a two-months-old laptop (samsung R480) and i installed many latest games.

    Everything's up to date. (MSE, Windows Update, Drivers, etc..)

    The bsod ONLY OCCURS sometimes when i press ALT+F4 when playing games like Mass Effect 2, Mafia2, and Prototype.

    The graphics card in my laptop has updated drivers (nvidia GT330M) so that's not the case.

    My processor is Intel Core i3 M350 2.27GHz

    I also have 4gb 1066 ddr3 ram (i cleaned the gold pins by pencil erasers, re-inserted them, running fine, then when i press alt+F4 while running Mafia2, bsod re-appears)

    Windows 7 Home Premium 64-bit OS

     

     

    WhoCrashed Log:

     

    On Fri 10/22/2010 7:17:10 AM your computer crashed
    This was likely caused by the following module: cdd.dll
    Bugcheck code: 0x50 (0xFFFFF900C25637A0, 0x0, 0xFFFFF960006FDC51, 0x0)
    Error: PAGE_FAULT_IN_NONPAGED_AREA
    Dump file: C:\windows\Minidump\102210-26707-01.dmp
    file path: C:\windows\system32\cdd.dll
    product: Microsoft® Windows® Operating System
    company: Microsoft Corporation
    description: Canonical Display Driver
    The crash took place in a standard Microsoft module. Your system configuration may be incorrect, possibly the culprit is in another driver on your system which cannot be identified at this time. 

    • Edited by Priq Saturday, October 23, 2010 4:55 PM added OS info
    Saturday, October 23, 2010 4:49 PM

Answers

  • I'd start out by ensuring that you have all of your graphics drivers up
    to date. I'd guess that you are running an nvidia card by the loaded
    modules, is this correct?.
     *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
     
    Use !analyze -v to get detailed debugging information.
     
    BugCheck 50, {fffff900c25637a0, 0, fffff960006fdc51, 0}
     Could not read faulting driver name
    Probably caused by : cdd.dll ( cdd!CddBitmapHw::Release+31 )
     
    Followup: MachineOwner
    ---------
     
    3: kd>  !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
     
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff900c25637a0, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff960006fdc51, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
     
    Debugging Details:
    ------------------
     Could not read faulting driver name
     
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003eab0e0
     fffff900c25637a0
     
    FAULTING_IP:
    cdd!CddBitmapHw::Release+31
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h]
     
    MM_INTERNAL_CODE:  0
     
    CUSTOMER_CRASH_COUNT:  1
     
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
     
    BUGCHECK_STR:  0x50
     
    PROCESS_NAME:  prototypef.exe
     
    CURRENT_IRQL:  0
     
    TRAP_FRAME:  fffff880023906b0 -- (.trap 0xfffff880023906b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff900c2563020 rbx=0000000000000000 rcx=fffff900c2b26370
    rdx=fffffa8007c81b60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff960006fdc51 rsp=fffff88002390840 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=00000000000046e0
    r11=fffff88002390860 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    cdd!CddBitmapHw::Release+0x31:
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h] ds:1128:fffff900`c25637a0=????????????????
    Resetting default scope
     
    LAST_CONTROL_TRANSFER:  from fffff80003cf3f14 to fffff80003c73740
     
    STACK_TEXT:
    fffff880`02390548 fffff800`03cf3f14 : 00000000`00000050 fffff900`c25637a0 00000000`00000000 fffff880`023906b0 : nt!KeBugCheckEx
    fffff880`02390550 fffff800`03c7182e : 00000000`00000000 fffff900`c00bf010 fffff880`02390800 fffff800`03c797ef : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`023906b0 fffff960`006fdc51 : 00000000`00000000 00001128`00000000 000017a0`00000000 fffff900`c244e010 : nt!KiPageFault+0x16e
    fffff880`02390840 fffff960`000e53f0 : 00000000`00000001 fffff900`c00bf010 00000000`00000001 fffff900`c0890010 : cdd!CddBitmapHw::Release+0x31
    fffff880`02390880 fffff960`000ed861 : 00000000`00000000 00000000`00000001 fffff900`c0890010 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x358
    fffff880`023909d0 fffff960`000e4c9c : 00000000`00001128 00000000`00000000 fffff900`c251d9e0 fffff960`00000000 : win32k!NtGdiCloseProcess+0x2c9
    fffff880`02390a30 fffff960`000e43e3 : fffffa80`08092000 00000000`00000001 fffffa80`07c81b60 00000000`7578351c : win32k!GdiProcessCallout+0x200
    fffff880`02390ab0 fffff800`03f58a01 : fffffa80`08092090 00000000`00000000 00000000`00000000 fffffa80`07c81b60 : win32k!W32pProcessCallout+0x6b
    fffff880`02390ae0 fffff800`03f3085b : 00000000`00000000 00000000`00000001 fffffa80`06db9000 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`02390ba0 fffff800`03c72993 : fffffa80`06db9060 00000000`00000000 00000000`7efdb001 fffffa80`07c81b60 : nt!NtTerminateProcess+0x25b
    fffff880`02390c20 00000000`7752001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7752001a
     STACK_COMMAND:  kb
     
    FOLLOWUP_IP:
    cdd!CddBitmapHw::Release+31
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h]
     
    SYMBOL_STACK_INDEX:  3
     
    SYMBOL_NAME:  cdd!CddBitmapHw::Release+31
     
    FOLLOWUP_NAME:  MachineOwner
     
    MODULE_NAME: cdd
     
    IMAGE_NAME:  cdd.dll
     
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bf4408a
     
    FAILURE_BUCKET_ID:  X64_0x50_cdd!CddBitmapHw::Release+31
     
    BUCKET_ID:  X64_0x50_cdd!CddBitmapHw::Release+31
     
    Followup: MachineOwner
    ---------
     
    3: kd>  .trap 0xfffff880023906b0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff900c2563020 rbx=0000000000000000 rcx=fffff900c2b26370
    rdx=fffffa8007c81b60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff960006fdc51 rsp=fffff88002390840 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=00000000000046e0
    r11=fffff88002390860 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    cdd!CddBitmapHw::Release+0x31:
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h] ds:1128:fffff900`c25637a0=????????????????
    3: kd>  kv
      *** Stack trace for last set context - .thread/.cxr resets it
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    fffff880`02390840 fffff960`000e53f0 : 00000000`00000001 fffff900`c00bf010 00000000`00000001 fffff900`c0890010 : cdd!CddBitmapHw::Release+0x31
    fffff880`02390880 fffff960`000ed861 : 00000000`00000000 00000000`00000001 fffff900`c0890010 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x358
    fffff880`023909d0 fffff960`000e4c9c : 00000000`00001128 00000000`00000000 fffff900`c251d9e0 fffff960`00000000 : win32k!NtGdiCloseProcess+0x2c9
    fffff880`02390a30 fffff960`000e43e3 : fffffa80`08092000 00000000`00000001 fffffa80`07c81b60 00000000`7578351c : win32k!GdiProcessCallout+0x200
    fffff880`02390ab0 fffff800`03f58a01 : fffffa80`08092090 00000000`00000000 00000000`00000000 fffffa80`07c81b60 : win32k!W32pProcessCallout+0x6b
    fffff880`02390ae0 fffff800`03f3085b : 00000000`00000000 00000000`00000001 fffffa80`06db9000 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`02390ba0 fffff800`03c72993 : fffffa80`06db9060 00000000`00000000 00000000`7efdb001 fffffa80`07c81b60 : nt!NtTerminateProcess+0x25b
    fffff880`02390c20 00000000`7752001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`02390c20)
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7752001a
    3: kd>  .trap fffff880`02390c20
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000b2ee80
    rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
    rip=000000007752001a rsp=000000000008e308 rbp=0000000000b2eeec
     r8=000000000000002b  r9=00000000776cf982 r10=0000000000000000
    r11=0000000000000202 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    0033:00000000`7752001a ??              ???
    3: kd>  kv
      *** Stack trace for last set context - .thread/.cxr resets it
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7752001a
    3: kd>  lmvm cdd
    start             end                 module name
    fffff960`006f0000 fffff960`00717000   cdd        (pdb symbols)          c:\symbols\cdd.pdb\5ACDF17B965E4796B5FFE7DA9990149D1\cdd.pdb
        Loaded symbol image file: cdd.dll
        Mapped memory image file: c:\symbols\cdd.dll\4BF4408A27000\cdd.dll
        Image path: \SystemRoot\System32\cdd.dll
        Image name: cdd.dll
        Timestamp:        Wed May 19 13:48:26 2010 (4BF4408A)
        CheckSum:         00024F49
        ImageSize:        00027000
        File version:     6.1.7600.16595
        Product version:  6.1.7600.16595
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        3.4 Driver
        File date:        00000000.00000000
        Translations:     0000.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     cdd.dll
        OriginalFilename: cdd.dll
        ProductVersion:   6.1.7600.16595
        FileVersion:      6.1.7600.16595 (win7_gdr.100518-2047)
        FileDescription:  Canonical Display Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
    3: kd>  !sysinfo machineid
    Machine ID Information [From Smbios 2.6, DMIVersion 0, Size=2211]
    BiosMajorRelease = 0
    BiosMinorRelease = 0
    BiosVendor = Phoenix Technologies Ltd.
    BiosVersion = 10SZ.M001.20100622.XW
    BiosReleaseDate = 06/22/2010
    SystemManufacturer = SAMSUNG ELECTRONICS CO., LTD.
    SystemProductName = R480/R431/R481
    SystemVersion = Not Applicable
    BaseBoardManufacturer = SAMSUNG ELECTRONICS CO., LTD.
    BaseBoardProduct = R480/R431/R481
    BaseBoardVersion = Not Applicable
     
     

    -- Mike Burr
    • Marked as answer by Miya Yao Wednesday, November 3, 2010 2:56 AM
    Monday, October 25, 2010 11:03 PM

All replies

  • Hi,
     
    Can you zip up all of the files in C:\Windows\Minidump and post to
    skydrive for further analysis,
     
     

    -- Mike Burr
    Saturday, October 23, 2010 4:58 PM
  • http://cid-8a7dc94878449122.office.live.com/embedicon.aspx/Files/102210-26707-01.rar

     

    i copied from skydrive

    there's the dump file

    Saturday, October 23, 2010 5:22 PM
  • I'd start out by ensuring that you have all of your graphics drivers up
    to date. I'd guess that you are running an nvidia card by the loaded
    modules, is this correct?.
     *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
     
    Use !analyze -v to get detailed debugging information.
     
    BugCheck 50, {fffff900c25637a0, 0, fffff960006fdc51, 0}
     Could not read faulting driver name
    Probably caused by : cdd.dll ( cdd!CddBitmapHw::Release+31 )
     
    Followup: MachineOwner
    ---------
     
    3: kd>  !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
     
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff900c25637a0, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff960006fdc51, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
     
    Debugging Details:
    ------------------
     Could not read faulting driver name
     
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003eab0e0
     fffff900c25637a0
     
    FAULTING_IP:
    cdd!CddBitmapHw::Release+31
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h]
     
    MM_INTERNAL_CODE:  0
     
    CUSTOMER_CRASH_COUNT:  1
     
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
     
    BUGCHECK_STR:  0x50
     
    PROCESS_NAME:  prototypef.exe
     
    CURRENT_IRQL:  0
     
    TRAP_FRAME:  fffff880023906b0 -- (.trap 0xfffff880023906b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff900c2563020 rbx=0000000000000000 rcx=fffff900c2b26370
    rdx=fffffa8007c81b60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff960006fdc51 rsp=fffff88002390840 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=00000000000046e0
    r11=fffff88002390860 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    cdd!CddBitmapHw::Release+0x31:
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h] ds:1128:fffff900`c25637a0=????????????????
    Resetting default scope
     
    LAST_CONTROL_TRANSFER:  from fffff80003cf3f14 to fffff80003c73740
     
    STACK_TEXT:
    fffff880`02390548 fffff800`03cf3f14 : 00000000`00000050 fffff900`c25637a0 00000000`00000000 fffff880`023906b0 : nt!KeBugCheckEx
    fffff880`02390550 fffff800`03c7182e : 00000000`00000000 fffff900`c00bf010 fffff880`02390800 fffff800`03c797ef : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`023906b0 fffff960`006fdc51 : 00000000`00000000 00001128`00000000 000017a0`00000000 fffff900`c244e010 : nt!KiPageFault+0x16e
    fffff880`02390840 fffff960`000e53f0 : 00000000`00000001 fffff900`c00bf010 00000000`00000001 fffff900`c0890010 : cdd!CddBitmapHw::Release+0x31
    fffff880`02390880 fffff960`000ed861 : 00000000`00000000 00000000`00000001 fffff900`c0890010 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x358
    fffff880`023909d0 fffff960`000e4c9c : 00000000`00001128 00000000`00000000 fffff900`c251d9e0 fffff960`00000000 : win32k!NtGdiCloseProcess+0x2c9
    fffff880`02390a30 fffff960`000e43e3 : fffffa80`08092000 00000000`00000001 fffffa80`07c81b60 00000000`7578351c : win32k!GdiProcessCallout+0x200
    fffff880`02390ab0 fffff800`03f58a01 : fffffa80`08092090 00000000`00000000 00000000`00000000 fffffa80`07c81b60 : win32k!W32pProcessCallout+0x6b
    fffff880`02390ae0 fffff800`03f3085b : 00000000`00000000 00000000`00000001 fffffa80`06db9000 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`02390ba0 fffff800`03c72993 : fffffa80`06db9060 00000000`00000000 00000000`7efdb001 fffffa80`07c81b60 : nt!NtTerminateProcess+0x25b
    fffff880`02390c20 00000000`7752001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7752001a
     STACK_COMMAND:  kb
     
    FOLLOWUP_IP:
    cdd!CddBitmapHw::Release+31
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h]
     
    SYMBOL_STACK_INDEX:  3
     
    SYMBOL_NAME:  cdd!CddBitmapHw::Release+31
     
    FOLLOWUP_NAME:  MachineOwner
     
    MODULE_NAME: cdd
     
    IMAGE_NAME:  cdd.dll
     
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bf4408a
     
    FAILURE_BUCKET_ID:  X64_0x50_cdd!CddBitmapHw::Release+31
     
    BUCKET_ID:  X64_0x50_cdd!CddBitmapHw::Release+31
     
    Followup: MachineOwner
    ---------
     
    3: kd>  .trap 0xfffff880023906b0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff900c2563020 rbx=0000000000000000 rcx=fffff900c2b26370
    rdx=fffffa8007c81b60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff960006fdc51 rsp=fffff88002390840 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=00000000000046e0
    r11=fffff88002390860 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    cdd!CddBitmapHw::Release+0x31:
    fffff960`006fdc51 483b9080070000  cmp     rdx,qword ptr [rax+780h] ds:1128:fffff900`c25637a0=????????????????
    3: kd>  kv
      *** Stack trace for last set context - .thread/.cxr resets it
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    fffff880`02390840 fffff960`000e53f0 : 00000000`00000001 fffff900`c00bf010 00000000`00000001 fffff900`c0890010 : cdd!CddBitmapHw::Release+0x31
    fffff880`02390880 fffff960`000ed861 : 00000000`00000000 00000000`00000001 fffff900`c0890010 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x358
    fffff880`023909d0 fffff960`000e4c9c : 00000000`00001128 00000000`00000000 fffff900`c251d9e0 fffff960`00000000 : win32k!NtGdiCloseProcess+0x2c9
    fffff880`02390a30 fffff960`000e43e3 : fffffa80`08092000 00000000`00000001 fffffa80`07c81b60 00000000`7578351c : win32k!GdiProcessCallout+0x200
    fffff880`02390ab0 fffff800`03f58a01 : fffffa80`08092090 00000000`00000000 00000000`00000000 fffffa80`07c81b60 : win32k!W32pProcessCallout+0x6b
    fffff880`02390ae0 fffff800`03f3085b : 00000000`00000000 00000000`00000001 fffffa80`06db9000 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`02390ba0 fffff800`03c72993 : fffffa80`06db9060 00000000`00000000 00000000`7efdb001 fffffa80`07c81b60 : nt!NtTerminateProcess+0x25b
    fffff880`02390c20 00000000`7752001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`02390c20)
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7752001a
    3: kd>  .trap fffff880`02390c20
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000b2ee80
    rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
    rip=000000007752001a rsp=000000000008e308 rbp=0000000000b2eeec
     r8=000000000000002b  r9=00000000776cf982 r10=0000000000000000
    r11=0000000000000202 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    0033:00000000`7752001a ??              ???
    3: kd>  kv
      *** Stack trace for last set context - .thread/.cxr resets it
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7752001a
    3: kd>  lmvm cdd
    start             end                 module name
    fffff960`006f0000 fffff960`00717000   cdd        (pdb symbols)          c:\symbols\cdd.pdb\5ACDF17B965E4796B5FFE7DA9990149D1\cdd.pdb
        Loaded symbol image file: cdd.dll
        Mapped memory image file: c:\symbols\cdd.dll\4BF4408A27000\cdd.dll
        Image path: \SystemRoot\System32\cdd.dll
        Image name: cdd.dll
        Timestamp:        Wed May 19 13:48:26 2010 (4BF4408A)
        CheckSum:         00024F49
        ImageSize:        00027000
        File version:     6.1.7600.16595
        Product version:  6.1.7600.16595
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        3.4 Driver
        File date:        00000000.00000000
        Translations:     0000.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     cdd.dll
        OriginalFilename: cdd.dll
        ProductVersion:   6.1.7600.16595
        FileVersion:      6.1.7600.16595 (win7_gdr.100518-2047)
        FileDescription:  Canonical Display Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
    3: kd>  !sysinfo machineid
    Machine ID Information [From Smbios 2.6, DMIVersion 0, Size=2211]
    BiosMajorRelease = 0
    BiosMinorRelease = 0
    BiosVendor = Phoenix Technologies Ltd.
    BiosVersion = 10SZ.M001.20100622.XW
    BiosReleaseDate = 06/22/2010
    SystemManufacturer = SAMSUNG ELECTRONICS CO., LTD.
    SystemProductName = R480/R431/R481
    SystemVersion = Not Applicable
    BaseBoardManufacturer = SAMSUNG ELECTRONICS CO., LTD.
    BaseBoardProduct = R480/R431/R481
    BaseBoardVersion = Not Applicable
     
     

    -- Mike Burr
    • Marked as answer by Miya Yao Wednesday, November 3, 2010 2:56 AM
    Monday, October 25, 2010 11:03 PM