Windows 7 Blue screens experienced only during gameplay

romelako

New Member
Hello, everyone. I've been having a lot of trouble with my computer this past week because of blue screens during my gaming. I've been mostly playing SC2 and Heroes of Newerth, so crashing a bunch of times is not only annoying but it hurts my record as well. I just recently purchased an ATI Radeon HD 5670 along with an Athlon II x3 435 and G.Skill (2 x 2 GB) 4GB DDR2 RAM. I popped these into my system and it worked fine for the first day and suddenly I crash multiple times. They are completely random and the reasoning for the crash changes each time. Here are six minidumps:

Link Removed due to 404 Error

I've done the following things:

  • Update my ATI drivers to 2.1
  • Removed my old NVIDIA GeForce 9500 GT drivers
I was having the same issues with my old memory and BSOD's, except I would crash when Windows started up. I thought that it had to do something with the timing (because it was 5-5-5-18) so I purchased new memory, but I'm still blue screening. I ran memtest86+ on my old memory and it didn't show any errors.

Perhaps maybe it's a PSU issue, as it's only 480W. Maybe my GPU is overheating? I'm honestly not too sure. Hopefully by looking at the minidumps, you guys can enlighten me with this nuisance of a problem. Thanks in advanced!
 

Attachments

  • spec2.jpg
    spec2.jpg
    62.7 KB · Views: 381
  • spec1.jpg
    spec1.jpg
    79.5 KB · Views: 365
  • spec3.jpg
    spec3.jpg
    71.1 KB · Views: 389
0x50_dxgkrnl!DxgkRender

1. I see slot#1 only, attach SPD under the other slot too.


2. Attach dxdiag report.

If there is a hardware issue like faulty PSU, bad RAM, videocard, overclocking or whatever else, updating drivers won't help. Follow 1 and 2, attach the necessary info.




3. Uninstall Avast, install MSE:

avast! Uninstall Utility

Link Removed due to 404 Error




4. Update drivers:

Logitech SetPoint
LMouFilt.Sys Fri Sep 21 07:05:43 2007
LUsbFilt.Sys Fri Sep 21 07:05:46 2007


Realtek Audio
RTKVHD64.sys Tue Sep 15 07:02:10 2009


Atheros Extensible Wireless LAN device driver
athrx.sys Tue Jun 09 14:06:49 2009
















Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030911-12136-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c87e50
Debug session time: Wed Mar  9 03:52:25.328 2011 (UTC - 5:00)
System Uptime: 0 days 0:04:20.139
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff87fa15bd638, 0, fffff880045d07f6, 5}


Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff87fa15bd638, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880045d07f6, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf20e0
 fffff87fa15bd638 

FAULTING_IP: 
dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
fffff880`045d07f6 8b053ccefeff    mov     eax,dword ptr [dxgmms1!VIDMM_DMA_POOL::_FairDmaBufferBytes (fffff880`045bd638)]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800752c790 -- (.trap 0xfffff8800752c790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880045b98c0 rbx=0000000000000000 rcx=fffffa800651fad0
rdx=fffff8800752c9b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880045d07f6 rsp=fffff8800752c920 rbp=fffff8800752c9b8
 r8=fffff8800752cbf8  r9=fffff8800752cc00 r10=0000000000000000
r11=fffff8800752c2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+0xe:
fffff880`045d07f6 8b053ccefeff    mov     eax,dword ptr [dxgmms1!VIDMM_DMA_POOL::_FairDmaBufferBytes (fffff880`045bd638)] ds:fffff880`045bd638=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b398c1 to fffff80002aba740

STACK_TEXT:  
fffff880`0752c628 fffff800`02b398c1 : 00000000`00000050 fffff87f`a15bd638 00000000`00000000 fffff880`0752c790 : nt!KeBugCheckEx
fffff880`0752c630 fffff800`02ab882e : 00000000`00000000 fffffa80`0651fad0 fffff8a0`02162a00 fffffa80`0667b970 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`0752c790 fffff880`045d07f6 : 00000000`00000000 fffffa80`0592e000 00000000`00000002 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0752c920 fffff880`045ab2b7 : 00000000`00000000 fffff8a0`01bfbd80 00000000`00000002 fffff880`0752cca0 : dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+0xe
fffff880`0752c950 fffff880`045239ca : fffff8a0`01c0f440 fffff880`0752cca0 00000000`00000002 00000000`00000003 : dxgmms1!VidMmGetNextBuffersContractedSize+0x2b
fffff880`0752c980 fffff960`0018c9da : 00000000`022beba0 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkRender+0x6da
fffff880`0752cbf0 fffff800`02ab9993 : fffffa80`065eab60 00000000`022bfa00 000007fe`f8f3d610 fffffa80`00000000 : win32k!NtGdiDdDDIRender+0x12
fffff880`0752cc20 000007fe`fe3113ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`022beb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fe3113ba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e
fffff880`045d07f6 8b053ccefeff    mov     eax,dword ptr [dxgmms1!VIDMM_DMA_POOL::_FairDmaBufferBytes (fffff880`045bd638)]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa174

FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e

BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_DMA_POOL::NeedToBeTrimmed+e

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030911-11622-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a49000 PsLoadedModuleList = 0xfffff800`02c86e50
Debug session time: Wed Mar  9 02:59:45.944 2011 (UTC - 5:00)
System Uptime: 0 days 2:46:24.754
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8a4c, d, 0, fffff80002ac63aa}

Probably caused by : amdppm.sys ( amdppm!C1Halt+2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000008a4c, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ac63aa, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf10e0
 0000000000008a4c 

CURRENT_IRQL:  d

FAULTING_IP: 
nt!KiSecondaryClockInterrupt+13a
fffff800`02ac63aa ff11            call    qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f8b960 -- (.trap 0xfffff88002f8b960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=468bac616416aa00 rbx=0000000000000000 rcx=fffff80002a24b50
rdx=00000000000089f3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ac63aa rsp=fffff88002f8baf8 rbp=fffff88002f8bb80
 r8=000000000000a430  r9=0000000000000000 r10=0000000000018b30
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
nt!KiSecondaryClockInterrupt+0x13a:
fffff800`02ac63aa ff11            call    qword ptr [rcx] ds:fffff800`02a24b50=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ab8ca9 to fffff80002ab9740

STACK_TEXT:  
fffff880`02f8b818 fffff800`02ab8ca9 : 00000000`0000000a 00000000`00008a4c 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8b820 fffff800`02ab7920 : fffff880`02f8ba88 00000000`00000000 fffffa80`0586f018 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b960 fffff800`02ac63aa : 00000000`00000011 00000000`00000000 fffff880`02f8bb80 fffff880`02f63180 : nt!KiPageFault+0x260
fffff880`02f8baf8 fffff880`0409e7f2 : fffff800`02ac724a 00000000`002b6965 fffffa80`04df8598 fffffa80`051b1260 : nt!KiSecondaryClockInterrupt+0x13a
fffff880`02f8bc98 fffff800`02ac724a : 00000000`002b6965 fffffa80`04df8598 fffffa80`051b1260 fffffa80`03995410 : amdppm!C1Halt+0x2
fffff880`02f8bca0 fffff800`02ac1ebc : fffff880`02f63180 fffff880`00000000 00000000`00000000 fffff880`0421c480 : nt!PoIdle+0x53a
fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x2c


STACK_COMMAND:  kb

FOLLOWUP_IP: 
amdppm!C1Halt+2
fffff880`0409e7f2 c3              ret

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  amdppm!C1Halt+2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc0fd

FAILURE_BUCKET_ID:  X64_0xA_amdppm!C1Halt+2

BUCKET_ID:  X64_0xA_amdppm!C1Halt+2

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030911-11356-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
Debug session time: Wed Mar  9 03:47:20.380 2011 (UTC - 5:00)
System Uptime: 0 days 0:16:50.190
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff87fefad00ec, 1, fffff88004511ad9, 5}


Could not read faulting driver name
Probably caused by : dxgkrnl.sys ( dxgkrnl!DxgkRender+7e9 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff87fefad00ec, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88004511ad9, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb20e0
 fffff87fefad00ec 

FAULTING_IP: 
dxgkrnl!DxgkRender+7e9
fffff880`04511ad9 488d4c2448      lea     rcx,[rsp+48h]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  hon.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800764d7f0 -- (.trap 0xfffff8800764d7f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000fffb rbx=0000000000000000 rcx=fffffa8005898000
rdx=fffffa800685db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004511ad9 rsp=fffff8800764d980 rbp=fffff8800764dca0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=fffff8800764d2e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
dxgkrnl!DxgkRender+0x7e9:
fffff880`04511ad9 488d4c2448      lea     rcx,[rsp+48h]
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002af98c1 to fffff80002a7a740

STACK_TEXT:  
fffff880`0764d688 fffff800`02af98c1 : 00000000`00000050 fffff87f`efad00ec 00000000`00000001 fffff880`0764d7f0 : nt!KeBugCheckEx
fffff880`0764d690 fffff800`02a7882e : 00000000`00000001 fffff8a0`0399b890 00000000`00000000 fffff880`044a4333 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`0764d7f0 fffff880`04511ad9 : fffff8a0`0399b890 fffff8a0`0399b890 00000000`00000002 00000000`00000003 : nt!KiPageFault+0x16e
fffff880`0764d980 fffff960`0019c9da : 00000000`05b4e6b0 fffffa80`00000200 00000000`00000c00 00000000`fffa4000 : dxgkrnl!DxgkRender+0x7e9
fffff880`0764dbf0 fffff800`02a79993 : fffffa80`0685db60 00000000`000003e0 00000000`00000000 fffffa80`03aeed20 : win32k!NtGdiDdDDIRender+0x12
fffff880`0764dc20 00000000`7407143a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05b4e688 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7407143a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DxgkRender+7e9
fffff880`04511ad9 488d4c2448      lea     rcx,[rsp+48h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgkrnl!DxgkRender+7e9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa1a0

FAILURE_BUCKET_ID:  X64_0x50_dxgkrnl!DxgkRender+7e9

BUCKET_ID:  X64_0x50_dxgkrnl!DxgkRender+7e9

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031011-11918-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a60000 PsLoadedModuleList = 0xfffff800`02c9de50
Debug session time: Thu Mar 10 17:46:08.389 2011 (UTC - 5:00)
System Uptime: 0 days 0:26:57.200
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3434323231333631
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9c328 -- (.exr 0xfffff80000b9c328)
ExceptionAddress: fffff80002ad50a2 (nt!KiDeferredReadyThread+0x00000000000001c2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9c3d0 -- (.trap 0xfffff80000b9c3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=88fff80002c58b80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ad50a2 rsp=fffff80000b9c560 rbp=0000000000000001
 r8=0000000000000007  r9=0000000000000000 r10=fffff80002a60000
r11=fffff880031c4c00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiDeferredReadyThread+0x1c2:
fffff800`02ad50a2 663b5048        cmp     dx,word ptr [rax+48h] ds:88fff800`02c58bc8=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ac846e to fffff80002ad0710

STACK_TEXT:  
fffff800`00b9b418 fffff800`02ac846e : fffffa80`00000000 00000000`00000000 fffff800`00b9bb90 fffff800`02afd668 : nt!KeBugCheck
fffff800`00b9b420 fffff800`02af640d : fffff800`02cdeb7c fffff800`02c18ea4 fffff800`02a60000 fffff800`00b9c328 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b450 fffff800`02afda90 : fffff800`02c1fb34 fffff800`00b9b4c8 fffff800`00b9c328 fffff800`02a60000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b480 fffff800`02b0a9ef : fffff800`00b9c328 fffff800`00b9bb90 fffff800`00000000 fffffa80`039045b0 : nt!RtlDispatchException+0x410
fffff800`00b9bb60 fffff800`02acfd82 : fffff800`00b9c328 fffff880`009e4180 fffff800`00b9c3d0 fffff800`02c4ae80 : nt!KiDispatchException+0x16f
fffff800`00b9c1f0 fffff800`02ace68a : fffffa80`04c551a0 fffffa80`00000000 00000000`00000000 fffff800`02ade3a1 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c3d0 fffff800`02ad50a2 : fffffa80`03eaf068 fffffa80`03eaf068 00000000`00000000 fffffa80`03eaf060 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c560 fffff800`02adbe67 : fffffa80`03eaf060 fffffa80`039046b8 fffffa80`039046b8 00000000`00000000 : nt!KiDeferredReadyThread+0x1c2
fffff800`00b9c5e0 fffff800`02adc4be : 00000003`c3ed2ad0 fffff800`00b9cc58 00000000`000194f2 fffff800`02c4f0c8 : nt!KiProcessExpiredTimerList+0x157
fffff800`00b9cc30 fffff800`02adbcb7 : 00000001`124f37c2 00000001`000194f2 00000001`124f3742 00000000`000000f2 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`02ad8eea : fffff800`02c4ae80 fffff800`02c58c40 00000000`00000000 fffff880`014fb0c0 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02ac846e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00e0f000 fffff880`00e66000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03663000 fffff880`036ed000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04456000 fffff880`0446c000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03f0e000 fffff880`03f23000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e00000 fffff880`00e0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`05bf4000 fffff880`05bfd000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
fffff880`03e5f000 fffff880`03e99000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
fffff880`036ed000 fffff880`036f7000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
fffff880`03e9f000 fffff880`03ee8000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
fffff880`01847000 fffff880`01857000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
fffff880`04278000 fffff880`043d0000   athrx    athrx.sys    Tue Jun 09 14:06:49 2009 (4A2EA4B9)
fffff880`04879000 fffff880`05175000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`03f95000 fffff880`03fe3000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff960`00950000 fffff960`009b1000   ATMFD    ATMFD.DLL    unavailable (00000000)
fffff880`0199b000 fffff880`019a2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`01857000 fffff880`01868000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05ee7000 fffff880`05f05000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00700000 fffff960`00727000   cdd      cdd.dll      unavailable (00000000)
fffff880`05a9c000 fffff880`05ab9000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`01968000 fffff880`01992000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c88000 fffff880`00d48000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018ce000 fffff880`018fe000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c2a000 fffff880`00c88000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010e4000 fffff880`01157000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04446000 fffff880`04456000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05fbb000 fffff880`05fc4000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`05b67000 fffff880`05b75000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`037d9000 fffff880`037f7000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`037ca000 fffff880`037d9000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`018b8000 fffff880`018ce000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03e3d000 fffff880`03e5f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05b75000 fffff880`05b7f000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05bbe000 fffff880`05bd1000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05b7f000 fffff880`05bbe000   dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`05a90000 fffff880`05a9c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044ca000 fffff880`045be000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04400000 fffff880`04446000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`01072000 fffff880`01086000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01026000 fffff880`01072000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d9000 fffff880`013e3000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0187e000 fffff880`018b8000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015ab000 fffff880`015f5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`043dd000 fffff880`043ea000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02a17000 fffff800`02a60000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04200000 fffff880`04224000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05a34000 fffff880`05a90000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05ae6000 fffff880`05aff000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05aff000 fffff880`05b07080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05ad8000 fffff880`05ae6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05e1f000 fffff880`05ee7000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0149d000 fffff880`014a6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`044b7000 fffff880`044c6000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05b08000 fffff880`05b16000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bbd000 fffff800`00bc7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`051b0000 fffff880`051f3000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013ae000 fffff880`013c8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`059ec000 fffff880`059f1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05b34000 fffff880`05b47000   LHidFilt LHidFilt.Sys Fri Sep 21 07:05:39 2007 (46F3A583)
fffff880`03fe3000 fffff880`03ff8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05b54000 fffff880`05b67000   LMouFilt LMouFilt.Sys Fri Sep 21 07:05:43 2007 (46F3A587)
fffff880`05bd1000 fffff880`05bf4000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`05b24000 fffff880`05b34000   LUsbFilt LUsbFilt.Sys Fri Sep 21 07:05:46 2007 (46F3A58A)
fffff880`00c09000 fffff880`00c16000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05b16000 fffff880`05b24000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`045ed000 fffff880`045fc000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05b47000 fffff880`05b54000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00f3f000 fffff880`00f59000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05f05000 fffff880`05f1d000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05f1d000 fffff880`05f4a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05f4a000 fffff880`05f98000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05f98000 fffff880`05fbb000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e6f000 fffff880`00e79000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01086000 fffff880`010e4000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`037bf000 fffff880`037ca000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0148b000 fffff880`0149d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014b9000 fffff880`015ab000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04490000 fffff880`0449c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05a21000 fffff880`05a34000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`045be000 fffff880`045ed000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043ea000 fffff880`043ff000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03781000 fffff880`03790000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`036f7000 fffff880`0373c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03651000 fffff880`0365d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a60000 fffff800`0303d000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0120b000 fffff880`013ae000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01992000 fffff880`0199b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04224000 fffff880`04275500   nvmf6264 nvmf6264.sys Thu Jul 30 19:48:18 2009 (4A723142)
fffff880`00f59000 fffff880`00f98000   nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`018fe000 fffff880`01951000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03745000 fffff880`0376b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00eb9000 fffff880`00ece000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e79000 fffff880`00eac000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`013c8000 fffff880`013d9000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0629b000 fffff880`06341000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`03e00000 fffff880`03e3d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c16000 fffff880`00c2a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0446c000 fffff880`04490000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0449c000 fffff880`044b7000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`05175000 fffff880`05196000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`05196000 fffff880`051b0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03600000 fffff880`03651000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019e5000 fffff880`019ee000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019ee000 fffff880`019f7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019f7000 fffff880`01a00000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011a3000 fffff880`011dd000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`013e3000 fffff880`013fb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05804000 fffff880`059eba80   RTKVHD64 RTKVHD64.sys Tue Sep 15 07:02:10 2009 (4AAF7432)
fffff880`06341000 fffff880`0634c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`015f5000 fffff880`015fd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06200000 fffff880`06296000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0638b000 fffff880`063f2000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0634c000 fffff880`06379000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`00f98000 fffff880`00ffa000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`045fc000 fffff880`045fd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06379000 fffff880`0638b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`037ab000 fffff880`037bf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03ee8000 fffff880`03f0e000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04800000 fffff880`04812000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05ab9000 fffff880`05ad6000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05ad6000 fffff880`05ad7f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03f84000 fffff880`03f95000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04812000 fffff880`0486c000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03f23000 fffff880`03f2e000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03f2e000 fffff880`03f84000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00eac000 fffff880`00eb9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019a2000 fffff880`019b0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019b0000 fffff880`019d5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00ece000 fffff880`00ee3000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00ee3000 fffff880`00f3f000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01157000 fffff880`011a3000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`043d0000 fffff880`043dd000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`0376b000 fffff880`03781000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03790000 fffff880`037ab000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019d5000 fffff880`019e5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d48000 fffff880`00dec000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00dec000 fffff880`00dfb000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0373c000 fffff880`03745000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003c0000   win32k   win32k.sys   unavailable (00000000)
fffff880`00e66000 fffff880`00e6f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05a00000 fffff880`05a21000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`094fe000 fffff880`0956f000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`018fe000 fffff880`0190c000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0190c000 fffff880`01916000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`01916000 fffff880`01955000   dump_nvstor6
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003F000
fffff880`01955000 fffff880`01968000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
I've done all of the above things and I still receive the blue screen error. However, I don't get the ATIKMDAG.sys error anymore. Only the "ntoskrnl.exe" error (0x50, 0x1e, and 0x0a). I've attached the second memory slot below. Here are my specs:

http://speccy.piriform.com/results/TGpXO63Jz9V0bkqn0oej4wr

Right now I'm using a 480W PSU. Could the fact that my GPU requires at least 400W and my processor requires 95W be the cause of the problem? Let me know. Thanks. :)
 

Attachments

  • spd2.jpg
    spd2.jpg
    67.5 KB · Views: 405
Right now I'm using a 480W PSU. Could the fact that my GPU requires at least 400W and my processor requires 95W be the cause of the problem? Let me know. Thanks

If your system crashes only on peak load that would likely be the lack of Watts in the power supply.

Your GSkill sticks are identical and are set right.

Attach your latest crash dump.

Run Memtest86+ - Advanced Memory Diagnostic Tool 10 passes overnight.
 
Any suggestions for a PSU that'll actually fit in my PC? My computer is a COMPAQ CQ5500F and most PSU's I'm seeing above 500W are going to be way too big for my case.
 
The problem isn't a GPU problem as I put in my old GeForce 9500 GT in, which only requires 300W, and I'm still experiencing the errors. Any ideas?
 
Back
Top