BSOD Page fault error

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by mikekollar, May 6, 2011.

  1. mikekollar

    mikekollar New Member

    Joined:
    May 6, 2011
    Messages:
    8
    Likes Received:
    0
    I purchased an Acer 5552-7803 laptop for my son to take to college. I have had it for a week but it seems to randomly crash with a BSOD, if I can get any help, advice, assistance I would greatly appreciate it.
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321



    1. Attach as requested in this thread, CPU/MEMORY/SPD:

    http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html


    2. Update drivers:

    Pure Networks, Inc. Network Magic NDIS Relay Driver
    purendis.sys Wed Jan 02 19:39:32 2008

    Fingerprint Biometrics
    mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009
    mwlPSDNServ.sys Tue Jun 02 06:07:39 2009



    3. Uninstall Eset (for now) since it caused one of your crashes. Replace with MSE.



    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050211-20576-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`03047e90
    Debug session time: Mon May  2 21:52:16.621 2011 (UTC - 4:00)
    System Uptime: 0 days 0:09:28.400
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41287, 38, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46585 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041287, The subtype of the bugcheck.
    Arg2: 0000000000000038
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41287
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  iTunesHelper.e
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88003316900 -- (.trap 0xfffff88003316900)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8005e201f8 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffff8a000107238 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f7fdf7 rsp=fffff88003316a90 rbp=0000000000000000
     r8=fffffa8006610006  r9=fffffa8003b2c048 r10=fffffa80055bbe60
    r11=fffffa80055bab60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiEmptyPageAccessLog+0xe7:
    fffff800`02f7fdf7 8b4138          mov     eax,dword ptr [rcx+38h] ds:ca60:00000000`00000038=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e1562e to fffff80002e82640
    
    STACK_TEXT:  
    fffff880`03316798 fffff800`02e1562e : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033167a0 fffff800`02e8076e : 00000000`00000000 00000000`00000038 00000000`00000000 00000000`00162406 : nt! ?? ::FNODOBFM::`string'+0x46585
    fffff880`03316900 fffff800`02f7fdf7 : fffffa80`066140e0 fffffa80`055bbea0 00000000`00000002 fffff880`02f637f0 : nt!KiPageFault+0x16e
    fffff880`03316a90 fffff800`02efb6d3 : fffffa80`066140e0 00000003`00000000 00000000`00000000 fffffa80`05e201f8 : nt!MiEmptyPageAccessLog+0xe7
    fffff880`03316b00 fffff800`02e6d206 : 00000000`00000239 00000000`00000000 fffffa80`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4d8db
    fffff880`03316b80 fffff800`02e6d6c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
    fffff880`03316bd0 fffff800`0311fcce : fffffa80`033eca60 00000000`00000080 fffffa80`033c7040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
    fffff880`03316d40 fffff800`02e73fe6 : fffff880`02f63180 fffffa80`033eca60 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`03316d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+46585
    fffff800`02e1562e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+46585
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+46585
    
    BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+46585
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050311-19827-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`03051e90
    Debug session time: Wed May  4 01:44:22.631 2011 (UTC - 4:00)
    System Uptime: 0 days 0:03:51.410
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {28, 2, 0, fffff80002ed3628}
    
    Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ed3628, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bd0e8
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiFindNodeOrParent+0
    fffff800`02ed3628 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  mscorsvw.exe
    
    TRAP_FRAME:  fffff88003316810 -- (.trap 0xfffff88003316810)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ed3628 rsp=fffff880033169a8 rbp=0000000000000000
     r8=fffff880033169f0  r9=0000000000000000 r10=fffffa80053bf6d0
    r11=fffffa80053bb4c0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiFindNodeOrParent:
    fffff800`02ed3628 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:00000000`00000028=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e8bbe9 to fffff80002e8c640
    
    STACK_TEXT:  
    fffff880`033166c8 fffff800`02e8bbe9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033166d0 fffff800`02e8a860 : 00000000`00000049 00000000`00000001 fffff880`02fd3180 fffffa80`053bf718 : nt!KiBugCheckDispatch+0x69
    fffff880`03316810 fffff800`02ed3628 : fffff800`02ed5807 fffff880`00000000 00000000`00000000 fffff880`02fd3180 : nt!KiPageFault+0x260
    fffff880`033169a8 fffff800`02ed5807 : fffff880`00000000 00000000`00000000 fffff880`02fd3180 00000000`00000000 : nt!MiFindNodeOrParent
    fffff880`033169b0 fffff800`02ed58dd : fffffa80`03406a60 fffff880`00000000 fffff880`03316a60 00000000`00000000 : nt!MiLocateAddressInTree+0x17
    fffff880`033169e0 fffff800`02ed5958 : 00000000`00000000 fffffa80`03457000 fffffa80`0452b048 fffffa80`053bf750 : nt!MiGetSharedProtosAtDpcLevel+0xbd
    fffff880`03316a30 fffff800`02e2397b : fffffa80`06a91060 fffff800`00000003 fffff880`03316ba0 00000000`00000000 : nt!MiGetSharedProtos+0x18
    fffff880`03316a60 fffff800`02f89e70 : 00000000`00000000 fffffa80`053bf710 00000000`00000002 fffff880`02fd37f0 : nt! ?? ::FNODOBFM::`string'+0x938b
    fffff880`03316a90 fffff800`02f056d3 : fffffa80`06a91060 00000003`00000000 fffffa80`053bf6d0 fffffa80`053bf750 : nt!MiEmptyPageAccessLog+0x160
    fffff880`03316b00 fffff800`02e77206 : 00000000`000000e8 00000000`00000000 fffffa80`00000000 00000000`00000003 : nt! ?? ::FNODOBFM::`string'+0x4d8db
    fffff880`03316b80 fffff800`02e776c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
    fffff880`03316bd0 fffff800`03129cce : fffffa80`03406a60 00000000`00000080 fffffa80`033e1040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
    fffff880`03316d40 fffff800`02e7dfe6 : fffff880`02f63180 fffffa80`03406a60 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`03316d80 00000000`00000000 : fffff880`03317000 fffff880`03311000 fffff880`03316700 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiFindNodeOrParent+0
    fffff800`02ed3628 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiFindNodeOrParent+0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0
    
    BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050311-20888-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03049e90
    Debug session time: Wed May  4 00:54:43.283 2011 (UTC - 4:00)
    System Uptime: 0 days 0:12:19.062
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff88002828608, fffff8800835b850, 0}
    
    Probably caused by : eamonm.sys ( eamonm+4608 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff88002828608, Address of the instruction which caused the bugcheck
    Arg3: fffff8800835b850, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    eamonm+4608
    fffff880`02828608 418d5010        lea     edx,[r8+10h]
    
    CONTEXT:  fffff8800835b850 -- (.cxr 0xfffff8800835b850)
    rax=0001000000027d68 rbx=0000000000010000 rcx=fffff8800835c2a0
    rdx=fffff8800835cc01 rsi=0000000000000000 rdi=0000000000027d68
    rip=fffff88002828608 rsp=fffff8800835c230 rbp=fffffa8006620d10
     r8=0000000000000000  r9=fffff880009e8180 r10=fffffa8003400e00
    r11=fffffa80033ed800 r12=0000000000000100 r13=fffff8800835c500
    r14=0000000000000160 r15=0000000000000001
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    eamonm+0x4608:
    fffff880`02828608 418d5010        lea     edx,[r8+10h]
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  WmiPrvSE.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88002828608
    
    STACK_TEXT:  
    fffff880`0835c230 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : eamonm+0x4608
    
    
    FOLLOWUP_IP: 
    eamonm+4608
    fffff880`02828608 418d5010        lea     edx,[r8+10h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  eamonm+4608
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: eamonm
    
    IMAGE_NAME:  eamonm.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d006930
    
    STACK_COMMAND:  .cxr 0xfffff8800835b850 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_eamonm+4608
    
    BUCKET_ID:  X64_0x3B_eamonm+4608
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050311-22573-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
    Debug session time: Wed May  4 01:46:47.828 2011 (UTC - 4:00)
    System Uptime: 0 days 0:01:32.607
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4A, {732f2e09, 2, 0, fffff880085efca0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a)
    Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL.
    Arguments:
    Arg1: 00000000732f2e09, Address of system function (system call routine)
    Arg2: 0000000000000002, Current IRQL
    Arg3: 0000000000000000, 0
    Arg4: fffff880085efca0, 0
    
    Debugging Details:
    ------------------
    
    
    PROCESS_NAME:  firefox.exe
    
    BUGCHECK_STR:  RAISED_IRQL_FAULT
    
    FAULTING_IP: 
    +3465333639643035
    00000000`732f2e09 ??              ???
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002ee7be9 to fffff80002ee8640
    
    STACK_TEXT:  
    fffff880`085efad8 fffff800`02ee7be9 : 00000000`0000004a 00000000`732f2e09 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`085efae0 fffff800`02ee7b20 : fffffa80`0699ba10 00000000`00000000 00000000`00000000 00000000`04500101 : nt!KiBugCheckDispatch+0x69
    fffff880`085efc20 00000000`732f2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
    00000000`000ce948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x732f2e09
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemServiceExit+245
    fffff800`02ee7b20 4883ec50        sub     rsp,50h
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiSystemServiceExit+245
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_RAISED_IRQL_FAULT_firefox.exe_nt!KiSystemServiceExit+245
    
    BUCKET_ID:  X64_RAISED_IRQL_FAULT_firefox.exe_nt!KiSystemServiceExit+245
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00ee0000 fffff880`00f37000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`02c9e000 fffff880`02d27000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`045c8000 fffff880`045de000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`011d0000 fffff880`011e5000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e14000 fffff880`00e1f000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`0424e000 fffff880`04474000   athrx    athrx.sys    Thu May 06 20:00:58 2010 (4BE3583A)
    fffff880`041b4000 fffff880`041d4000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
    fffff880`04818000 fffff880`04fec000   atikmdag atikmdag.sys Thu Oct 28 11:34:12 2010 (4CC997F4)
    fffff880`03e66000 fffff880`03eb1000   atikmpag atikmpag.sys Thu Oct 28 11:03:39 2010 (4CC990CB)
    fffff880`019a4000 fffff880`019ac000   AtiPcie64 AtiPcie64.sys Wed Mar 10 09:33:45 2010 (4B97ADC9)
    fffff880`00fa8000 fffff880`00fb4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`019f6000 fffff880`019fd000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02c5f000 fffff880`02c70000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`0283a000 fffff880`02858000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`01600000 fffff880`0162a000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cd7000 fffff880`00d97000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01974000 fffff880`019a4000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c79000 fffff880`00cd7000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`045b3000 fffff880`045b7500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`010ea000 fffff880`0115c000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`00f9f000 fffff880`00fa8000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`045b8000 fffff880`045c8000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`05ed8000 fffff880`05ee6000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02c41000 fffff880`02c5f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`02c32000 fffff880`02c41000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0195e000 fffff880`01974000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`041d4000 fffff880`041f6000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05ee6000 fffff880`05ef2000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05efd000 fffff880`05f10000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05ef2000 fffff880`05efd000   dump_msahci dump_msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
    fffff880`05e73000 fffff880`05e7f000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03eb1000 fffff880`03fa5000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`03fa5000 fffff880`03feb000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`02880000 fffff880`02959000   eamonm   eamonm.sys   Thu Dec 09 00:29:20 2010 (4D006930)
    fffff880`01581000 fffff880`015a6000   ehdrv    ehdrv.sys    Thu Dec 09 00:29:58 2010 (4D006956)
    fffff880`0467e000 fffff880`0469f000   epfwwfpr epfwwfpr.sys Thu Dec 09 00:26:09 2010 (4D006871)
    fffff880`01078000 fffff880`0108c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0102c000 fffff880`01078000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01924000 fffff880`0195e000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`01831000 fffff880`0187b000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`04491000 fffff880`0449e000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02e1f000 fffff800`02e68000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`05f33000 fffff880`05ffc000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`0191b000 fffff880`01924000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`0451d000 fffff880`0453b000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04046000 fffff880`040a7000   k57nd60a k57nd60a.sys Sat May 15 08:51:06 2010 (4BEE98BA)
    fffff880`0453b000 fffff880`0454a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00bbd000 fffff800`00bc7000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
    fffff880`040f0000 fffff880`04133000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`013e4000 fffff880`013ff000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`01556000 fffff880`01581000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`041f6000 fffff880`041fb200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0297a000 fffff880`0298f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05f10000 fffff880`05f33000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c58000 fffff880`00c65000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`05eca000 fffff880`05ed8000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0459b000 fffff880`045aa000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00fe0000 fffff880`00ffa000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`02858000 fffff880`02870000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03e24000 fffff880`03e51000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
    fffff880`0460d000 fffff880`0465a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`0465a000 fffff880`0467e000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`00e09000 fffff880`00e14000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
    fffff880`01224000 fffff880`0122f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f40000 fffff880`00f4a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0108c000 fffff880`010ea000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`02c27000 fffff880`02c32000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01909000 fffff880`0191b000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`019e4000 fffff880`019ed000   mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:07:30 2009 (4A24F9E2)
    fffff880`02c1f000 fffff880`02c27000   mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:07:39 2009 (4A24F9EB)
    fffff880`02c0c000 fffff880`02c1f000   mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009 (4A24FBC1)
    fffff880`01403000 fffff880`014f6000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`04224000 fffff880`04230000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`029e2000 fffff880`029f5000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`040a7000 fffff880`040d6000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`0419f000 fffff880`041b4000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`02d6c000 fffff880`02d7b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`0118b000 fffff880`011d0000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`014f6000 fffff880`01556000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`0122f000 fffff880`01240000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c00000 fffff880`02c0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e68000 fffff800`03452000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01241000 fffff880`013e4000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
    fffff880`04489000 fffff880`04491000   NTIDrvr  NTIDrvr.sys  Mon Apr 19 21:37:59 2010 (4BCD0577)
    fffff880`019ed000 fffff880`019f6000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0298f000 fffff880`029e2000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02d30000 fffff880`02d56000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00f8a000 fffff880`00f9f000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f4a000 fffff880`00f7d000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00fc9000 fffff880`00fd0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fd0000 fffff880`00fe0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0469f000 fffff880`04745000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`02800000 fffff880`0280c000   pnarp    pnarp.sys    Tue Apr 01 04:44:59 2008 (47F1F60B)
    fffff880`04000000 fffff880`0403d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c65000 fffff880`00c79000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0280c000 fffff880`02818000   purendis purendis.sys Wed Jan 02 19:39:32 2008 (477C2EC4)
    fffff880`04200000 fffff880`04224000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`04230000 fffff880`0424b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`045de000 fffff880`045ff000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`040d6000 fffff880`040f0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02daa000 fffff880`02dfb000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`015e9000 fffff880`015f2000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015f2000 fffff880`015fb000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0121b000 fffff880`01224000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`018cf000 fffff880`01909000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`02818000 fffff880`02830000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05c13000 fffff880`05e72400   RTKVHD64 RTKVHD64.sys Tue Sep 21 04:09:43 2010 (4C986847)
    fffff880`04745000 fffff880`04750000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`018c7000 fffff880`018cf000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06239000 fffff880`062d1000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
    fffff880`04793000 fffff880`047fd000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
    fffff880`04750000 fffff880`04781000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
    fffff880`0424b000 fffff880`0424c480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`0454a000 fffff880`04599000   SynTP    SynTP.sys    Thu Dec 10 21:30:38 2009 (4B21AECE)
    fffff880`0162d000 fffff880`01831000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`04781000 fffff880`04793000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`0117e000 fffff880`0118b000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`0115c000 fffff880`0117e000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`02d96000 fffff880`02daa000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`02c70000 fffff880`02c96000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`04481000 fffff880`04489000   UBHelper UBHelper.sys Tue Jul 06 00:19:26 2010 (4C32AECE)
    fffff880`04133000 fffff880`04145000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`05e7f000 fffff880`05e9c000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`04599000 fffff880`0459af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`0450c000 fffff880`0451d000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
    fffff880`044ff000 fffff880`0450c000   usbfilter usbfilter.sys Thu Apr 29 06:43:06 2010 (4BD962BA)
    fffff880`04145000 fffff880`0419f000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`0449e000 fffff880`044a9000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`044a9000 fffff880`044ff000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05e9c000 fffff880`05ec9280   usbvideo usbvideo.sys Sat Nov 20 05:44:34 2010 (4CE7A692)
    fffff880`00f7d000 fffff880`00f8a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`015a6000 fffff880`015b4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`015b4000 fffff880`015d9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fb4000 fffff880`00fc9000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00d97000 fffff880`00df3000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`0187b000 fffff880`018c7000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04474000 fffff880`04481000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02d56000 fffff880`02d6c000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02830000 fffff880`0283a000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
    fffff880`02d7b000 fffff880`02d96000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`015d9000 fffff880`015e9000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e2d000 fffff880`00ed1000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ed1000 fffff880`00ee0000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d27000 fffff880`02d30000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00060000 fffff960`00372000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
    fffff880`045aa000 fffff880`045b3000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f37000 fffff880`00f40000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02959000 fffff880`0297a000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`019ac000 fffff880`019ba000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`019ba000 fffff880`019c6000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`019c6000 fffff880`019d1000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    fffff880`019d1000 fffff880`019e4000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. mikekollar

    mikekollar New Member

    Joined:
    May 6, 2011
    Messages:
    8
    Likes Received:
    0
    My apologies, here are the screen shots for the CPU and SPD.
     

    Attached Files:

  4. mikekollar

    mikekollar New Member

    Joined:
    May 6, 2011
    Messages:
    8
    Likes Received:
    0
    These are the last two snips, hopefully they help.
     

    Attached Files:

  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. Passmark Rammon HTML.zip

    2. CPU-Z MEMORY tab
     
  6. mikekollar

    mikekollar New Member

    Joined:
    May 6, 2011
    Messages:
    8
    Likes Received:
    0
    Wow, you guys are quick, I appreciate all the help
     

    Attached Files:

  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

Share This Page

Loading...