BSOD randomly, no rules!!

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by mujagawudakhi, Mar 25, 2011.

  1. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    hi guys,

    im from croatia and i have a large issue with a new computer...

    month ago, i bought a new computer, new components except the old ati graphics 3850 512 mb...

    my components are these and its my personal build:

    intel core i5 2500 3,3ghz
    asrock pro3 p67 B3 chipset (so the new revision, i had the old one with the buggy chipset now i have the new with B3 chipset)
    4 gb of RAM corsair1600 mhz
    1tb samsung spinpoint f3
    corsair 550 w

    my cpu z prtscr are below with the minidump.zip!



    the computer works great, except the BSOD that i thought they will be gone affter i changed my asrock pro 3 with buggy sata chipset with the new revision asrock motherboard pro 3 p67. but no, the BSOD are still happening...

    there is no rule, it can work for 10 hours in a row and nothing can happen or it can go wild and display the BSOD 10 times in a row, after each reset... the BSOD that happened to me not 20 minutes ago are theese in the minidump folder...

    if anyone can give me an advice what to do, i will be gratefull!!


    also, the problems that are occuring me, this happens before the BSOD and when it happens i know in a couple of minutes the BSOD is gonna occure... its this..

    im surfing the web, and suddenly, the AERO theme changes to normal nontransparent theme and there is a sound coming out from the speakers, its a windows 7 start up sound! then after a couple of minutes it changes back to aero!! and after that the BSOD can come up, or maybe not, there is no strict rule!!

    i have genuine windows 7 professional edition, i did not make any update because i formated my disk not 2 days ago and im scared if i do so, the BSOD will even more pop out!!

    anyone,please help

    niksa , croatia!!

    TNX
     

    Attached Files:

    #1 mujagawudakhi, Mar 25, 2011
    Last edited: Mar 25, 2011
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Something's not right with your RAM. Give me this stuff:

    1) CPU-Z memory and CPU tabs snips
    2) Rammon HTML report

    http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html



    Update drivers:

    FNet User Proxy
    FNETURPX.SYS Fri Oct 03 22:27:02 2008


    ATI
    atikmdag.sys Fri Apr 24 06:51:57 2009







    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032511-15522-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0285a000 PsLoadedModuleList = 0xfffff800`02a97e50
    Debug session time: Fri Mar 25 11:42:08.674 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:18.938
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 34, {50830, fffff88005456408, fffff88005455c60, fffff800028d7170}
    
    Probably caused by : ntkrnlmp.exe ( nt!ObFastReferenceObject+10 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CACHE_MANAGER (34)
        See the comment for FAT_FILE_SYSTEM (0x23)
    Arguments:
    Arg1: 0000000000050830
    Arg2: fffff88005456408
    Arg3: fffff88005455c60
    Arg4: fffff800028d7170
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff88005456408 -- (.exr 0xfffff88005456408)
    ExceptionAddress: fffff800028d7170 (nt!ObFastReferenceObject+0x0000000000000010)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 0000000000000040
    Attempt to read from address 0000000000000040
    
    CONTEXT:  fffff88005455c60 -- (.cxr 0xfffff88005455c60)
    rax=0000000000000010 rbx=0000000000000010 rcx=0000000000000040
    rdx=0000000000000022 rsi=fffff8a001d12810 rdi=0000000000000040
    rip=fffff800028d7170 rsp=fffff88005456640 rbp=fffff880054568d0
     r8=fffffa8004c488cf  r9=fffffa800612fb60 r10=000000000000000f
    r11=34b000011c6f5921 r12=fffffa8006192350 r13=fffffa800619f7c0
    r14=0000000fffffffff r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
    nt!ObFastReferenceObject+0x10:
    fffff800`028d7170 4c8b01          mov     r8,qword ptr [rcx] ds:002b:00000000`00000040=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000040
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b020e0
     0000000000000040 
    
    FOLLOWUP_IP: 
    nt!ObFastReferenceObject+10
    fffff800`028d7170 4c8b01          mov     r8,qword ptr [rcx]
    
    FAULTING_IP: 
    nt!ObFastReferenceObject+10
    fffff800`028d7170 4c8b01          mov     r8,qword ptr [rcx]
    
    BUGCHECK_STR:  0x34
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from fffff8000293bd49 to fffff800028d7170
    
    STACK_TEXT:  
    fffff880`05456640 fffff800`0293bd49 : 00000000`00000008 00000000`00000010 fffff8a0`01d12808 fffffa80`0620a6f8 : nt!ObFastReferenceObject+0x10
    fffff880`05456670 fffff800`028e8e6f : fffff6fc`c0035680 00000000`00000001 fffff880`00000010 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x2a34d
    fffff880`054567e0 fffff800`0291080e : fffff980`06ac0000 00000000`000c9000 00000000`00000000 00000000`00000005 : nt!MmCheckCachedPageStates+0x3ef
    fffff880`05456990 fffff800`02b300ce : 00000000`00100000 00000000`00100000 00000000`000c9000 00000000`00040001 : nt!CcFetchDataForRead+0x10e
    fffff880`054569f0 fffff800`0287cb2c : fffffa80`03c9db30 00000000`00100000 00000000`00040000 fffff800`02a6f501 : nt!CcMapAndCopyFromCache+0xba
    fffff880`05456a90 fffff800`028bfdb6 : fffffa80`06192350 00000000`00000000 fffff800`00000005 fffff800`02bb2201 : nt!CcPerformReadAhead+0x3b8
    fffff880`05456bc0 fffff800`028d9161 : fffffa80`03cd5d60 fffff800`028bfb98 fffff800`02ad1150 00000000`00000002 : nt!CcWorkerThread+0x21e
    fffff880`05456c70 fffff800`02b6f166 : 00000000`0387ee39 fffffa80`0612fb60 00000000`00000080 fffffa80`03cb8040 : nt!ExpWorkerThread+0x111
    fffff880`05456d00 fffff800`028aa486 : fffff880`009e9180 fffffa80`0612fb60 fffffa80`04ba7b60 fffff880`0124fa90 : nt!PspSystemThreadStartup+0x5a
    fffff880`05456d40 00000000`00000000 : fffff880`05457000 fffff880`05451000 fffff880`054566a0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ObFastReferenceObject+10
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    STACK_COMMAND:  .cxr 0xfffff88005455c60 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x34_nt!ObFastReferenceObject+10
    
    BUCKET_ID:  X64_0x34_nt!ObFastReferenceObject+10
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032411-17206-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02815000 PsLoadedModuleList = 0xfffff800`02a52e50
    Debug session time: Thu Mar 24 11:41:51.598 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:31.520
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41790, fffffa80014449e0, ffff, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041790, The subtype of the bugcheck.
    Arg2: fffffa80014449e0
    Arg3: 000000000000ffff
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41790
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  dllhost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800028f926e to fffff80002886f00
    
    STACK_TEXT:  
    fffff880`0678f928 fffff800`028f926e : 00000000`0000001a 00000000`00041790 fffffa80`014449e0 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`0678f930 fffff800`028c8c4a : 00000000`00000000 00000000`0381afff fffffa80`00000000 fffffa80`04d08b30 : nt! ?? ::FNODOBFM::`string'+0x339d6
    fffff880`0678faf0 fffff800`02886153 : ffffffff`ffffffff 00000000`0263d330 00000000`0263d2f8 ffffffff`00008000 : nt!NtFreeVirtualMemory+0x5ca
    fffff880`0678fbe0 00000000`7753009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0263d268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7753009a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+339d6
    fffff800`028f926e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+339d6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032411-19063-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02858000 PsLoadedModuleList = 0xfffff800`02a95e50
    Debug session time: Thu Mar 24 11:36:49.014 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:15.310
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    ...................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff800029fbf8c, fffff88005f2dea0, 0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
    
    Followup: Pool_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800029fbf8c, Address of the instruction which caused the bugcheck
    Arg3: fffff88005f2dea0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+100
    fffff800`029fbf8c 4c8b02          mov     r8,qword ptr [rdx]
    
    CONTEXT:  fffff88005f2dea0 -- (.cxr 0xfffff88005f2dea0)
    rax=fffff8a005b73000 rbx=0000000000000000 rcx=fffff8a005f72b40
    rdx=0000018002580320 rsi=fffff8a005b73000 rdi=fffff8a005f66010
    rip=fffff800029fbf8c rsp=fffff88005f2e880 rbp=000000000000000e
     r8=0000018002580320  r9=0000000000000000 r10=fffff8a005f76b40
    r11=0000000000000000 r12=fffffa8003c493c0 r13=0000000000000000
    r14=000000000000000f r15=0000000000000001
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!ExDeferredFreePool+0x100:
    fffff800`029fbf8c 4c8b02          mov     r8,qword ptr [rdx] ds:002b:00000180`02580320=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800029fbf8c
    
    STACK_TEXT:  
    fffff880`05f2e880 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100
    
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+100
    fffff800`029fbf8c 4c8b02          mov     r8,qword ptr [rdx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+100
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    STACK_COMMAND:  .cxr 0xfffff88005f2dea0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100
    
    BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032511-16614-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0285b000 PsLoadedModuleList = 0xfffff800`02a98e50
    Debug session time: Fri Mar 25 11:48:01.911 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:55.176
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 120993, 3, 11fa0a}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 0000000000120993, page frame number
    Arg3: 0000000000000003, current page state
    Arg4: 000000000011fa0a, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  WmiPrvSE.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000295b32c to fffff800028ccf00
    
    STACK_TEXT:  
    fffff880`03a2c0b8 fffff800`0295b32c : 00000000`0000004e 00000000`00000099 00000000`00120993 00000000`00000003 : nt!KeBugCheckEx
    fffff880`03a2c0c0 fffff800`02882545 : 00000000`00000000 fffff680`00001758 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
    fffff880`03a2c100 fffff800`028a1493 : fffffa80`0519ab30 fffff700`00000669 0000007f`fffffff8 fffff8a0`05f9b468 : nt! ?? ::FNODOBFM::`string'+0x322ac
    fffff880`03a2c190 fffff800`0289feee : fffffa80`0519ab30 fffffa80`00000007 00000000`000001bc fffff800`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
    fffff880`03a2ca40 fffff800`02baf7af : fffff8a0`025f7af0 00000000`00000001 00000000`00000000 fffffa80`06404450 : nt!MmCleanProcessAddressSpace+0x96
    fffff880`03a2ca90 fffff800`02b88cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x47f
    fffff880`03a2cb60 fffff800`028cc153 : fffffa80`0519ab30 fffff880`00000000 fffffa80`06404450 fffffa80`04f9ec70 : nt!NtTerminateProcess+0x138
    fffff880`03a2cbe0 00000000`7789017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`001cfd18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7789017a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`0295b32c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00f27000 fffff880`00f7e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cc1000 fffff880`02d4b000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`06a00000 fffff880`06a16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00dd1000 fffff880`00ddc000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`03944000 fffff880`0394f000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00d9e000 fffff880`00da7000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00da7000 fffff880`00dd1000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`06a23000 fffff880`06f45000   atikmdag atikmdag.sys Fri Apr 24 06:51:57 2009 (49F199CD)
    fffff880`01927000 fffff880`0192e000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`069e2000 fffff880`069f3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02508000 fffff880`02526000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0757a000 fffff880`075a4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cc4000 fffff880`00d84000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`0188e000 fffff880`018be000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c66000 fffff880`00cc4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01114000 fffff880`01187000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`06fde000 fffff880`06fee000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`07471000 fffff880`0747f000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`06941000 fffff880`069c4000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`069c4000 fffff880`069e2000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`06932000 fffff880`06941000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01878000 fffff880`0188e000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0743d000 fffff880`0745f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`02c00000 fffff880`02c43000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
    fffff880`0748b000 fffff880`07494000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0747f000 fffff880`0748b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`07494000 fffff880`074a7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`07465000 fffff880`07471000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`07285000 fffff880`07379000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`07379000 fffff880`073bf000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`07559000 fffff880`07562c00   EtronHub3 EtronHub3.sys Fri Jan 28 16:46:45 2011 (4D433945)
    fffff880`07267000 fffff880`07276c00   EtronXHCI EtronXHCI.sys Fri Jan 28 16:46:43 2011 (4D433943)
    fffff880`07277000 fffff880`07284000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`010a2000 fffff880`010b6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01056000 fffff880`010a2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01821000 fffff880`0182e000   FNETTBOH_305 FNETTBOH_305.SYS Wed Nov 03 02:24:26 2010 (4CD1001A)
    fffff880`0192e000 fffff880`01937000   FNETURPX FNETURPX.SYS Fri Oct 03 22:27:02 2008 (48E6D476)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0183e000 fffff880`01878000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`01187000 fffff880`011d1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02812000 fffff800`0285b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`073bf000 fffff880`073e3000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`075a4000 fffff880`07600000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`073e3000 fffff880`073f4000   HECIx64  HECIx64.sys  Tue Oct 19 19:33:43 2010 (4CBE2AD7)
    fffff880`02ca8000 fffff880`02cc1000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`069f3000 fffff880`069fb080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`02c9a000 fffff880`02ca8000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02440000 fffff880`02508000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`014b5000 fffff880`014be000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`06f9b000 fffff880`06fb9000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06fc8000 fffff880`06fde000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`06fb9000 fffff880`06fc8000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00b9a000 fffff800`00ba4000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`074aa000 fffff880`074ed000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`0745f000 fffff880`07464200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`018d9000 fffff880`018ee000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`019dc000 fffff880`019ff000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c0e000 fffff880`00c52000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`02c8c000 fffff880`02c9a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`068b5000 fffff880`068c4000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02deb000 fffff880`02df8000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d84000 fffff880`00d9e000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02526000 fffff880`0253e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0253e000 fffff880`0256a000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
    fffff880`0256a000 fffff880`025b7000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
    fffff880`025b7000 fffff880`025da000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
    fffff880`01995000 fffff880`019a0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f87000 fffff880`00f91000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010b6000 fffff880`01114000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`06927000 fffff880`06932000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`014a3000 fffff880`014b5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014ca000 fffff880`015bc000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`06a16000 fffff880`06a22000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0684a000 fffff880`06879000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`07565000 fffff880`0757a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02dbf000 fffff880`02dce000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d4b000 fffff880`02d90000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`019a0000 fffff880`019b1000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0691b000 fffff880`06927000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0285b000 fffff800`02e38000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`0125b000 fffff880`013fe000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0191e000 fffff880`01927000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02d99000 fffff880`02dbf000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fd1000 fffff880`00fe6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f91000 fffff880`00fc4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`02889000 fffff880`0292f000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`07400000 fffff880`0743d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c52000 fffff880`00c66000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`06826000 fffff880`0684a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`06879000 fffff880`06894000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`06894000 fffff880`068b5000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`02c72000 fffff880`02c8c000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`068ca000 fffff880`0691b000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`06fee000 fffff880`06ff9000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`0197a000 fffff880`01983000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01983000 fffff880`0198c000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0198c000 fffff880`01995000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015bc000 fffff880`015f6000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`018ee000 fffff880`01906000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06f45000 fffff880`06f9b000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`0292f000 fffff880`0293a000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`073f4000 fffff880`07400000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02dce000 fffff880`02deb000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`0149b000 fffff880`014a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`038d3000 fffff880`03944000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`0383b000 fffff880`038d3000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
    fffff880`02979000 fffff880`029e2000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`0293a000 fffff880`02967000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
    fffff880`06ff9000 fffff880`06ffa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`02967000 fffff880`02979000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`019cf000 fffff880`019dc000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`019b1000 fffff880`019cf000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02c5e000 fffff880`02c72000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`06800000 fffff880`06826000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`074ed000 fffff880`074ff000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`07563000 fffff880`07564f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`07200000 fffff880`07211000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`074ff000 fffff880`07559000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`07211000 fffff880`07267000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`018be000 fffff880`018d9000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00fc4000 fffff880`00fd1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01937000 fffff880`01945000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01945000 fffff880`0196a000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fe6000 fffff880`00ffb000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02c43000 fffff880`02c5e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`0196a000 fffff880`0197a000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e74000 fffff880`00f18000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f18000 fffff880`00f27000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d90000 fffff880`02d99000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff880`00f7e000 fffff880`00f87000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01800000 fffff880`01821000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`018be000 fffff880`018cc000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018cc000 fffff880`018d8000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018d8000 fffff880`018e1000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018e1000 fffff880`018f4000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`018f4000 fffff880`0191e000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002A000
    
    
     
  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
  4. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    hi guys,

    there, ive put my rammon text in the attachments...

    tnx for the effort!!
     

    Attached Files:

  5. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    hi guys,

    there, ive put my rammon text in the attachments...

    tnx for the effort!!
     

    Attached Files:

  6. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    You have 2 identical sticks of Corsair CMX4GX3M2A1600C9:

    DDR3 1600
    9-9-9-24
    1.65V



    From what I see in your screenshots, you have it set right. However, you may need to set the voltage in the bios manually 1.65v. Update the 2 drivers mentioned in my 1st post. Then, if you get more crashes, run 10 passes of memtest.
     
  7. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    hi and tnx for the replys,

    ive already set my xmp profile in the bios and i think ive set the voltage to 1.65, memtest also i ran for 6 passes it reported no errors but i think i will leave it workin one day for maybe 10 15 passess!
    can anyone tell me about the mysterious sound and the aero change problem?? i will update my driver but the problem is that i think it will happen again beacuse i tried it on my first build month ago with buggy asrock pro3....
     
  8. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    hi,

    tnx for the reply ,

    ive allready set my ram voltage to 1,65V and ive set my xmp profile to profile 1 and it has its own preferences, it was on auto... but still i think the problem is not resolved...

    i will update the drivers soon in a couple of minutes...
     
  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Your memory looks good: 2 identical Corsair's CMX4GX3M2A1600C9 1600Mhz 9 9 9 24 1.65v.


    1. Update the drivers as listed in my 1st post.


    2. If you get more crashes, set the voltage manually 1.65.
     
  10. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    ive updated ati drivers but im not sure how to update the fnet proxy???

    if you can help, ive google it but i cant find any site that i think it can help me...

    sorry for my ignorrance...

    :(

    and tnx!!
     
  11. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    If you get more crashes, then just uninstall the fnet proxy.
     
  12. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    ive deleted my fnet proxy driver in the system32 folder, i hope it helps...

    if i get more crashes ill post here...

    tnx again!!
     
  13. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    hi cybercore,

    ive done as youve told me 3 days ago and removed the fnret proxy driver but this morning i got extra 3 BSOD's when i started my computer... also ive got that wierd change from aero to nontransparent theme and the google chrome crashed for a couple of times before the BSOD...

    what else are you suggesting to me??

    also, all you other guys...
    :(

    tnx
     

    Attached Files:

    #13 mujagawudakhi, Mar 29, 2011
    Last edited: Mar 29, 2011
  14. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    IRQL_NOT_LESS_OR_EQUAL (a)
    MEMORY_MANAGEMENT (1a)
    memory_corruption


    RAM is the culprit of your latest crashes.





    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032911-22729-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a05000 PsLoadedModuleList = 0xfffff800`02c42e50
    Debug session time: Tue Mar 29 04:16:46.408 2011 (UTC - 4:00)
    System Uptime: 0 days 0:03:54.329
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41790, fffffa80014c6940, ffff, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041790, The subtype of the bugcheck.
    Arg2: fffffa80014c6940
    Arg3: 000000000000ffff
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41790
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002ae8f9e to fffff80002a75740
    
    STACK_TEXT:  
    fffff880`097c07e8 fffff800`02ae8f9e : 00000000`0000001a 00000000`00041790 fffffa80`014c6940 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`097c07f0 fffff800`02aa8df9 : 00000000`00000000 00000000`713eafff fffffa80`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
    fffff880`097c09b0 fffff800`02d8c010 : fffffa80`06574160 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
    fffff880`097c0ad0 fffff800`02d8c41b : 00000980`00000000 00000000`713a0000 fffffa80`00000001 fffffa80`066e8e60 : nt!MiUnmapViewOfSection+0x1b0
    fffff880`097c0b90 fffff800`02a74993 : 00000000`00000000 00000000`0032db48 fffffa80`067a29e0 fffffa80`03d6de60 : nt!NtUnmapViewOfSection+0x5f
    fffff880`097c0be0 00000000`775cf95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0011e188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775cf95a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+33906
    fffff800`02ae8f9e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+33906
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
    
    BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032911-23384-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a16000 PsLoadedModuleList = 0xfffff800`02c53e50
    Debug session time: Tue Mar 29 04:12:19.826 2011 (UTC - 4:00)
    System Uptime: 0 days 0:02:38.122
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41790, fffffa80014e35c0, ffff, 0}
    
    Probably caused by : win32k.sys ( win32k!NtGdiCreateDIBSection+3e4 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041790, The subtype of the bugcheck.
    Arg2: fffffa80014e35c0
    Arg3: 000000000000ffff
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41790
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002af9f9e to fffff80002a86740
    
    STACK_TEXT:  
    fffff880`093f94f8 fffff800`02af9f9e : 00000000`0000001a 00000000`00041790 fffffa80`014e35c0 00000000`0000ffff : nt!KeBugCheckEx
    fffff880`093f9500 fffff800`02ab9df9 : 00000000`00000000 00000000`04be3fff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
    fffff880`093f96c0 fffff800`02d9d010 : fffffa80`061ab6d0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
    fffff880`093f97e0 fffff800`02d9d41b : 00000000`00000000 00000000`048c0000 fffffa80`00000001 00000000`00000000 : nt!MiUnmapViewOfSection+0x1b0
    fffff880`093f98a0 fffff800`02a85993 : 00000000`04aa2000 00000000`00000000 fffffa80`06a17060 fffff880`093f9b10 : nt!NtUnmapViewOfSection+0x5f
    fffff880`093f98f0 fffff800`02a81f30 : fffff960`00194c58 fffff880`093f9c60 fffffa80`05d88060 00000000`0022e088 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`093f9a88 fffff960`00194c58 : fffff880`093f9c60 fffffa80`05d88060 00000000`0022e088 fffff880`093f9b90 : nt!KiServiceLinkage
    fffff880`093f9a90 fffff800`02a85993 : 00000000`1c010295 00000000`00000134 00000000`00000000 00000000`00000000 : win32k!NtGdiCreateDIBSection+0x3e4
    fffff880`093f9b70 00000000`7319056a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0022e068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7319056a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!NtGdiCreateDIBSection+3e4
    fffff960`00194c58 488bcf          mov     rcx,rdi
    
    SYMBOL_STACK_INDEX:  7
    
    SYMBOL_NAME:  win32k!NtGdiCreateDIBSection+3e4
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0
    
    FAILURE_BUCKET_ID:  X64_0x1a_41790_win32k!NtGdiCreateDIBSection+3e4
    
    BUCKET_ID:  X64_0x1a_41790_win32k!NtGdiCreateDIBSection+3e4
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032911-37549-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c51e50
    Debug session time: Tue Mar 29 04:21:59.524 2011 (UTC - 4:00)
    System Uptime: 0 days 0:03:57.445
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 0, fffff80002b4157b}
    
    Probably caused by : memory_corruption ( nt!MiStoreSetEvictPageFile+b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002b4157b, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbc0e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiStoreSetEvictPageFile+b
    fffff800`02b4157b 488b5008        mov     rdx,qword ptr [rax+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  WerFault.exe
    
    TRAP_FRAME:  fffff88006457770 -- (.trap 0xfffff88006457770)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8005955740
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002b4157b rsp=fffff88006457908 rbp=0000000000000000
     r8=0000000000000000  r9=fffffa8003f673f8 r10=0000000fffffffff
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiStoreSetEvictPageFile+0xb:
    fffff800`02b4157b 488b5008        mov     rdx,qword ptr [rax+8] ds:6970:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a83ca9 to fffff80002a84740
    
    STACK_TEXT:  
    fffff880`06457628 fffff800`02a83ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06457630 fffff800`02a82920 : 00000000`77527000 fffffa80`03e57b60 00000000`7748a000 000007fe`fe480000 : nt!KiBugCheckDispatch+0x69
    fffff880`06457770 fffff800`02b4157b : fffff800`02b42abe 00000000`001df000 fffffa80`03e57b60 fffffa80`05955740 : nt!KiPageFault+0x260
    fffff880`06457908 fffff800`02b42abe : 00000000`001df000 fffffa80`03e57b60 fffffa80`05955740 00000000`77a30000 : nt!MiStoreSetEvictPageFile+0xb
    fffff880`06457910 fffff800`02a34af6 : 00000000`00400000 00000000`0000000b 00000000`00400000 00000000`00000002 : nt!MiReleaseConfirmedPageFileSpace+0x7e
    fffff880`06457990 fffff800`02a583f4 : fffffa80`03f673f8 00000000`00000001 00000000`00000000 fffffa80`0000001c : nt! ?? ::FNODOBFM::`string'+0x20a32
    fffff880`06457a10 fffff800`02a57686 : 00000000`00000001 fffffa80`03f67060 fffffa80`03f67060 00000000`00000001 : nt!MiDeleteAllHashMappings+0xe4
    fffff880`06457a50 fffff800`02d67abf : fffff8a0`0b160060 00000000`00000001 00000000`00000000 fffffa80`03e57b60 : nt!MmCleanProcessAddressSpace+0xa2
    fffff880`06457aa0 fffff800`02d4095b : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92f
    fffff880`06457b60 fffff800`02a83993 : fffffa80`03f67060 fffff880`00000000 00000000`001a3a70 fffffa80`03e57b60 : nt!NtTerminateProcess+0x25b
    fffff880`06457be0 00000000`77a5f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0012f8f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a5f97a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiStoreSetEvictPageFile+b
    fffff800`02b4157b 488b5008        mov     rdx,qword ptr [rax+8]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiStoreSetEvictPageFile+b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiStoreSetEvictPageFile+b
    
    BUCKET_ID:  X64_0xA_nt!MiStoreSetEvictPageFile+b
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00f7d000 fffff880`00fd4000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c16000 fffff880`02ca0000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`07bcb000 fffff880`07be1000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`0a4ab000 fffff880`0a4b6000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00de3000 fffff880`00dec000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`07226000 fffff880`07b22000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`03f69000 fffff880`03fb7000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff880`018fe000 fffff880`01905000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03f32000 fffff880`03f43000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`038cc000 fffff880`038ea000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00650000 fffff960`00677000   cdd      cdd.dll      unavailable (00000000)
    fffff880`00d09000 fffff880`00dc9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01865000 fffff880`01895000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cab000 fffff880`00d09000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010da000 fffff880`0114d000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`07bbb000 fffff880`07bcb000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`039a0000 fffff880`039a9000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
    fffff880`06c28000 fffff880`06c36000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03e91000 fffff880`03f14000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03f14000 fffff880`03f32000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02dc9000 fffff880`02dd8000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0184f000 fffff880`01865000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06c00000 fffff880`06c22000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06c42000 fffff880`06c4b000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06c36000 fffff880`06c42000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06c4b000 fffff880`06c5e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06df2000 fffff880`06dfe000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`06a90000 fffff880`06b84000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`06b84000 fffff880`06bca000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`06d0e000 fffff880`06d17c00   EtronHub3 EtronHub3.sys Fri Jan 28 16:46:45 2011 (4D433945)
    fffff880`06a67000 fffff880`06a76c00   EtronXHCI EtronXHCI.sys Fri Jan 28 16:46:43 2011 (4D433943)
    fffff880`06a77000 fffff880`06a84000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`01068000 fffff880`0107c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0101c000 fffff880`01068000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`025ad000 fffff880`025ba000   FNETTBOH_305 FNETTBOH_305.SYS Wed Nov 03 02:24:26 2010 (4CD1001A)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01815000 fffff880`0184f000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`01597000 fffff880`015e1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02ff1000 fffff800`0303a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`06bca000 fffff880`06bee000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`06d59000 fffff880`06db5000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`06bee000 fffff880`06bff000   HECIx64  HECIx64.sys  Tue Oct 19 19:33:43 2010 (4CBE2AD7)
    fffff880`0258b000 fffff880`025a4000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`025a4000 fffff880`025ac080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0257d000 fffff880`0258b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`03804000 fffff880`038cc000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`0121b000 fffff880`01224000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`07b78000 fffff880`07b96000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`07ba5000 fffff880`07bbb000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`07b96000 fffff880`07ba5000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00baa000 fffff800`00bb4000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`06c5f000 fffff880`06ca2000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`0156c000 fffff880`01597000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`06c22000 fffff880`06c27200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02444000 fffff880`02459000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02400000 fffff880`02423000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c53000 fffff880`00c97000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`025d5000 fffff880`025e3000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03e56000 fffff880`03e65000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`025e3000 fffff880`025f0000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00dc9000 fffff880`00de3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`038ea000 fffff880`03902000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03902000 fffff880`0392f000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0392f000 fffff880`0397d000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0397d000 fffff880`039a0000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01963000 fffff880`0196e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fdd000 fffff880`00fe7000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0107c000 fffff880`010da000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02dbe000 fffff880`02dc9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01400000 fffff880`01412000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0141a000 fffff880`0150c000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`07be1000 fffff880`07bed000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03fb7000 fffff880`03fe6000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`06d1a000 fffff880`06d2f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d14000 fffff880`02d23000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02ca0000 fffff880`02ce5000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0150c000 fffff880`0156c000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0196e000 fffff880`0197f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02db2000 fffff880`02dbe000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a14000 fffff800`02ff1000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`018f5000 fffff880`018fe000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02cee000 fffff880`02d14000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fe7000 fffff880`00fee000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fee000 fffff880`00ffe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`03a97000 fffff880`03b3d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`06db5000 fffff880`06df2000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c97000 fffff880`00cab000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`07200000 fffff880`07224000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03e00000 fffff880`03e1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03e1b000 fffff880`03e3c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03e3c000 fffff880`03e56000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`019aa000 fffff880`019fb000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`07bed000 fffff880`07bf8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01948000 fffff880`01951000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01951000 fffff880`0195a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0195a000 fffff880`01963000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01199000 fffff880`011d3000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02459000 fffff880`02471000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`07b22000 fffff880`07b78000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`03b3d000 fffff880`03b48000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`06a84000 fffff880`06a90000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d23000 fffff880`02d40000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`015f1000 fffff880`015f9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0a43a000 fffff880`0a4ab000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`03a00000 fffff880`03a96000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`03b87000 fffff880`03bee000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`03b48000 fffff880`03b75000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`07bf8000 fffff880`07bf9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`03b75000 fffff880`03b87000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0199d000 fffff880`019aa000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0197f000 fffff880`0199d000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d9e000 fffff880`02db2000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03f43000 fffff880`03f69000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`06ca2000 fffff880`06cb4000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`06d18000 fffff880`06d19f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`06a00000 fffff880`06a11000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`06cb4000 fffff880`06d0e000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`06a11000 fffff880`06a67000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`025ba000 fffff880`025d5000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01905000 fffff880`01913000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01913000 fffff880`01938000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015e1000 fffff880`015f1000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0114d000 fffff880`01199000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d83000 fffff880`02d9e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01938000 fffff880`01948000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eca000 fffff880`00f6e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f6e000 fffff880`00f7d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02ce5000 fffff880`02cee000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00070000 fffff960`00380000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
    fffff880`00fd4000 fffff880`00fdd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02423000 fffff880`02444000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`024cf000 fffff880`0257d000   xnacc    xnacc.sys    Mon Jul 13 20:01:05 2009 (4A5BCAC1)
    
    Unloaded modules:
    fffff880`02d40000 fffff880`02d83000   dtsoftbus01.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00043000
    fffff880`06d2f000 fffff880`06d59000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002A000
    fffff880`01895000 fffff880`018a3000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018a3000 fffff880`018af000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018af000 fffff880`018b8000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018b8000 fffff880`018cb000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`018cb000 fffff880`018f5000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002A000
    
    
     
  15. mujagawudakhi

    mujagawudakhi New Member

    Joined:
    Mar 25, 2011
    Messages:
    18
    Likes Received:
    0
    im at work now, i left my computer to run memtest for 9 hours, and when i get home i hope it says it has error because im really pissed at my computer... :(.... yesterday i installed dawn of war 2 and steam, played for a couple of hours, today in the morning i turned on my computer and it crashed... when i did a system resotre to a point before i installed the game, computer wokred normally for 4 hours until i left for work today...

    ???

    is that maybe helpful??

    if its the RAM ill go to the store and change them for new ....

    tnx and peace
     
  16. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    It's a good idea to first test sticks one by one and in different slots, to be sure the motherboard is OK.
     

Share This Page

Loading...