BSOD randomly, no rules!!

#1
hi guys,

im from croatia and i have a large issue with a new computer...

month ago, i bought a new computer, new components except the old ati graphics 3850 512 mb...

my components are these and its my personal build:

intel core i5 2500 3,3ghz
asrock pro3 p67 B3 chipset (so the new revision, i had the old one with the buggy chipset now i have the new with B3 chipset)
4 gb of RAM corsair1600 mhz
1tb samsung spinpoint f3
corsair 550 w

my cpu z prtscr are below with the minidump.zip!



the computer works great, except the BSOD that i thought they will be gone affter i changed my asrock pro 3 with buggy sata chipset with the new revision asrock motherboard pro 3 p67. but no, the BSOD are still happening...

there is no rule, it can work for 10 hours in a row and nothing can happen or it can go wild and display the BSOD 10 times in a row, after each reset... the BSOD that happened to me not 20 minutes ago are theese in the minidump folder...

if anyone can give me an advice what to do, i will be gratefull!!


also, the problems that are occuring me, this happens before the BSOD and when it happens i know in a couple of minutes the BSOD is gonna occure... its this..

im surfing the web, and suddenly, the AERO theme changes to normal nontransparent theme and there is a sound coming out from the speakers, its a windows 7 start up sound! then after a couple of minutes it changes back to aero!! and after that the BSOD can come up, or maybe not, there is no strict rule!!

i have genuine windows 7 professional edition, i did not make any update because i formated my disk not 2 days ago and im scared if i do so, the BSOD will even more pop out!!

anyone,please help

niksa , croatia!!

TNX
 


Attachments

Last edited:
#2
Something's not right with your RAM. Give me this stuff:

1) CPU-Z memory and CPU tabs snips
2) Rammon HTML report

http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html



Update drivers:

FNet User Proxy
FNETURPX.SYS Fri Oct 03 22:27:02 2008


ATI
atikmdag.sys Fri Apr 24 06:51:57 2009







CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032511-15522-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0285a000 PsLoadedModuleList = 0xfffff800`02a97e50
Debug session time: Fri Mar 25 11:42:08.674 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:18.938
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 34, {50830, fffff88005456408, fffff88005455c60, fffff800028d7170}

Probably caused by : ntkrnlmp.exe ( nt!ObFastReferenceObject+10 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff88005456408
Arg3: fffff88005455c60
Arg4: fffff800028d7170

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88005456408 -- (.exr 0xfffff88005456408)
ExceptionAddress: fffff800028d7170 (nt!ObFastReferenceObject+0x0000000000000010)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000040
Attempt to read from address 0000000000000040

CONTEXT:  fffff88005455c60 -- (.cxr 0xfffff88005455c60)
rax=0000000000000010 rbx=0000000000000010 rcx=0000000000000040
rdx=0000000000000022 rsi=fffff8a001d12810 rdi=0000000000000040
rip=fffff800028d7170 rsp=fffff88005456640 rbp=fffff880054568d0
 r8=fffffa8004c488cf  r9=fffffa800612fb60 r10=000000000000000f
r11=34b000011c6f5921 r12=fffffa8006192350 r13=fffffa800619f7c0
r14=0000000fffffffff r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!ObFastReferenceObject+0x10:
fffff800`028d7170 4c8b01          mov     r8,qword ptr [rcx] ds:002b:00000000`00000040=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000040

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b020e0
 0000000000000040 

FOLLOWUP_IP: 
nt!ObFastReferenceObject+10
fffff800`028d7170 4c8b01          mov     r8,qword ptr [rcx]

FAULTING_IP: 
nt!ObFastReferenceObject+10
fffff800`028d7170 4c8b01          mov     r8,qword ptr [rcx]

BUGCHECK_STR:  0x34

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff8000293bd49 to fffff800028d7170

STACK_TEXT:  
fffff880`05456640 fffff800`0293bd49 : 00000000`00000008 00000000`00000010 fffff8a0`01d12808 fffffa80`0620a6f8 : nt!ObFastReferenceObject+0x10
fffff880`05456670 fffff800`028e8e6f : fffff6fc`c0035680 00000000`00000001 fffff880`00000010 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x2a34d
fffff880`054567e0 fffff800`0291080e : fffff980`06ac0000 00000000`000c9000 00000000`00000000 00000000`00000005 : nt!MmCheckCachedPageStates+0x3ef
fffff880`05456990 fffff800`02b300ce : 00000000`00100000 00000000`00100000 00000000`000c9000 00000000`00040001 : nt!CcFetchDataForRead+0x10e
fffff880`054569f0 fffff800`0287cb2c : fffffa80`03c9db30 00000000`00100000 00000000`00040000 fffff800`02a6f501 : nt!CcMapAndCopyFromCache+0xba
fffff880`05456a90 fffff800`028bfdb6 : fffffa80`06192350 00000000`00000000 fffff800`00000005 fffff800`02bb2201 : nt!CcPerformReadAhead+0x3b8
fffff880`05456bc0 fffff800`028d9161 : fffffa80`03cd5d60 fffff800`028bfb98 fffff800`02ad1150 00000000`00000002 : nt!CcWorkerThread+0x21e
fffff880`05456c70 fffff800`02b6f166 : 00000000`0387ee39 fffffa80`0612fb60 00000000`00000080 fffffa80`03cb8040 : nt!ExpWorkerThread+0x111
fffff880`05456d00 fffff800`028aa486 : fffff880`009e9180 fffffa80`0612fb60 fffffa80`04ba7b60 fffff880`0124fa90 : nt!PspSystemThreadStartup+0x5a
fffff880`05456d40 00000000`00000000 : fffff880`05457000 fffff880`05451000 fffff880`054566a0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObFastReferenceObject+10

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

STACK_COMMAND:  .cxr 0xfffff88005455c60 ; kb

FAILURE_BUCKET_ID:  X64_0x34_nt!ObFastReferenceObject+10

BUCKET_ID:  X64_0x34_nt!ObFastReferenceObject+10

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032411-17206-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02815000 PsLoadedModuleList = 0xfffff800`02a52e50
Debug session time: Thu Mar 24 11:41:51.598 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:31.520
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa80014449e0, ffff, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80014449e0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41790

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  dllhost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800028f926e to fffff80002886f00

STACK_TEXT:  
fffff880`0678f928 fffff800`028f926e : 00000000`0000001a 00000000`00041790 fffffa80`014449e0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0678f930 fffff800`028c8c4a : 00000000`00000000 00000000`0381afff fffffa80`00000000 fffffa80`04d08b30 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`0678faf0 fffff800`02886153 : ffffffff`ffffffff 00000000`0263d330 00000000`0263d2f8 ffffffff`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`0678fbe0 00000000`7753009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0263d268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7753009a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`028f926e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+339d6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6

BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032411-19063-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02858000 PsLoadedModuleList = 0xfffff800`02a95e50
Debug session time: Thu Mar 24 11:36:49.014 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:15.310
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800029fbf8c, fffff88005f2dea0, 0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )

Followup: Pool_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800029fbf8c, Address of the instruction which caused the bugcheck
Arg3: fffff88005f2dea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExDeferredFreePool+100
fffff800`029fbf8c 4c8b02          mov     r8,qword ptr [rdx]

CONTEXT:  fffff88005f2dea0 -- (.cxr 0xfffff88005f2dea0)
rax=fffff8a005b73000 rbx=0000000000000000 rcx=fffff8a005f72b40
rdx=0000018002580320 rsi=fffff8a005b73000 rdi=fffff8a005f66010
rip=fffff800029fbf8c rsp=fffff88005f2e880 rbp=000000000000000e
 r8=0000018002580320  r9=0000000000000000 r10=fffff8a005f76b40
r11=0000000000000000 r12=fffffa8003c493c0 r13=0000000000000000
r14=000000000000000f r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ExDeferredFreePool+0x100:
fffff800`029fbf8c 4c8b02          mov     r8,qword ptr [rdx] ds:002b:00000180`02580320=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800029fbf8c

STACK_TEXT:  
fffff880`05f2e880 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100


FOLLOWUP_IP: 
nt!ExDeferredFreePool+100
fffff800`029fbf8c 4c8b02          mov     r8,qword ptr [rdx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExDeferredFreePool+100

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff88005f2dea0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100

BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100

Followup: Pool_corruption
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032511-16614-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0285b000 PsLoadedModuleList = 0xfffff800`02a98e50
Debug session time: Fri Mar 25 11:48:01.911 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:55.176
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 120993, 3, 11fa0a}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000120993, page frame number
Arg3: 0000000000000003, current page state
Arg4: 000000000011fa0a, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000295b32c to fffff800028ccf00

STACK_TEXT:  
fffff880`03a2c0b8 fffff800`0295b32c : 00000000`0000004e 00000000`00000099 00000000`00120993 00000000`00000003 : nt!KeBugCheckEx
fffff880`03a2c0c0 fffff800`02882545 : 00000000`00000000 fffff680`00001758 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`03a2c100 fffff800`028a1493 : fffffa80`0519ab30 fffff700`00000669 0000007f`fffffff8 fffff8a0`05f9b468 : nt! ?? ::FNODOBFM::`string'+0x322ac
fffff880`03a2c190 fffff800`0289feee : fffffa80`0519ab30 fffffa80`00000007 00000000`000001bc fffff800`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`03a2ca40 fffff800`02baf7af : fffff8a0`025f7af0 00000000`00000001 00000000`00000000 fffffa80`06404450 : nt!MmCleanProcessAddressSpace+0x96
fffff880`03a2ca90 fffff800`02b88cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x47f
fffff880`03a2cb60 fffff800`028cc153 : fffffa80`0519ab30 fffff880`00000000 fffffa80`06404450 fffffa80`04f9ec70 : nt!NtTerminateProcess+0x138
fffff880`03a2cbe0 00000000`7789017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001cfd18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7789017a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`0295b32c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00f27000 fffff880`00f7e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cc1000 fffff880`02d4b000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06a00000 fffff880`06a16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dd1000 fffff880`00ddc000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03944000 fffff880`0394f000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00d9e000 fffff880`00da7000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da7000 fffff880`00dd1000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`06a23000 fffff880`06f45000   atikmdag atikmdag.sys Fri Apr 24 06:51:57 2009 (49F199CD)
fffff880`01927000 fffff880`0192e000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`069e2000 fffff880`069f3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02508000 fffff880`02526000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      unavailable (00000000)
fffff880`0757a000 fffff880`075a4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cc4000 fffff880`00d84000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0188e000 fffff880`018be000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c66000 fffff880`00cc4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01114000 fffff880`01187000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`06fde000 fffff880`06fee000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`07471000 fffff880`0747f000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`06941000 fffff880`069c4000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`069c4000 fffff880`069e2000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`06932000 fffff880`06941000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01878000 fffff880`0188e000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0743d000 fffff880`0745f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02c00000 fffff880`02c43000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`0748b000 fffff880`07494000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0747f000 fffff880`0748b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`07494000 fffff880`074a7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`07465000 fffff880`07471000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`07285000 fffff880`07379000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`07379000 fffff880`073bf000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`07559000 fffff880`07562c00   EtronHub3 EtronHub3.sys Fri Jan 28 16:46:45 2011 (4D433945)
fffff880`07267000 fffff880`07276c00   EtronXHCI EtronXHCI.sys Fri Jan 28 16:46:43 2011 (4D433943)
fffff880`07277000 fffff880`07284000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`010a2000 fffff880`010b6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01056000 fffff880`010a2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01821000 fffff880`0182e000   FNETTBOH_305 FNETTBOH_305.SYS Wed Nov 03 02:24:26 2010 (4CD1001A)
fffff880`0192e000 fffff880`01937000   FNETURPX FNETURPX.SYS Fri Oct 03 22:27:02 2008 (48E6D476)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0183e000 fffff880`01878000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01187000 fffff880`011d1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02812000 fffff800`0285b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`073bf000 fffff880`073e3000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`075a4000 fffff880`07600000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`073e3000 fffff880`073f4000   HECIx64  HECIx64.sys  Tue Oct 19 19:33:43 2010 (4CBE2AD7)
fffff880`02ca8000 fffff880`02cc1000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`069f3000 fffff880`069fb080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`02c9a000 fffff880`02ca8000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02440000 fffff880`02508000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`014b5000 fffff880`014be000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`06f9b000 fffff880`06fb9000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`06fc8000 fffff880`06fde000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`06fb9000 fffff880`06fc8000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b9a000 fffff800`00ba4000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`074aa000 fffff880`074ed000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`0745f000 fffff880`07464200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`018d9000 fffff880`018ee000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`019dc000 fffff880`019ff000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c0e000 fffff880`00c52000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02c8c000 fffff880`02c9a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`068b5000 fffff880`068c4000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02deb000 fffff880`02df8000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d84000 fffff880`00d9e000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02526000 fffff880`0253e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0253e000 fffff880`0256a000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`0256a000 fffff880`025b7000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`025b7000 fffff880`025da000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`01995000 fffff880`019a0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f87000 fffff880`00f91000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010b6000 fffff880`01114000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`06927000 fffff880`06932000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014a3000 fffff880`014b5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014ca000 fffff880`015bc000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06a16000 fffff880`06a22000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0684a000 fffff880`06879000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07565000 fffff880`0757a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dbf000 fffff880`02dce000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d4b000 fffff880`02d90000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019a0000 fffff880`019b1000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0691b000 fffff880`06927000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0285b000 fffff800`02e38000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0125b000 fffff880`013fe000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0191e000 fffff880`01927000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d99000 fffff880`02dbf000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fd1000 fffff880`00fe6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f91000 fffff880`00fc4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`02889000 fffff880`0292f000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`07400000 fffff880`0743d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c52000 fffff880`00c66000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`06826000 fffff880`0684a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06879000 fffff880`06894000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`06894000 fffff880`068b5000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02c72000 fffff880`02c8c000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`068ca000 fffff880`0691b000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`06fee000 fffff880`06ff9000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0197a000 fffff880`01983000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01983000 fffff880`0198c000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0198c000 fffff880`01995000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bc000 fffff880`015f6000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`018ee000 fffff880`01906000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06f45000 fffff880`06f9b000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`0292f000 fffff880`0293a000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`073f4000 fffff880`07400000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02dce000 fffff880`02deb000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0149b000 fffff880`014a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`038d3000 fffff880`03944000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0383b000 fffff880`038d3000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`02979000 fffff880`029e2000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`0293a000 fffff880`02967000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`06ff9000 fffff880`06ffa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`02967000 fffff880`02979000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019cf000 fffff880`019dc000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`019b1000 fffff880`019cf000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c5e000 fffff880`02c72000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`06800000 fffff880`06826000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`074ed000 fffff880`074ff000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`07563000 fffff880`07564f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`07200000 fffff880`07211000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`074ff000 fffff880`07559000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`07211000 fffff880`07267000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`018be000 fffff880`018d9000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00fc4000 fffff880`00fd1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01937000 fffff880`01945000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01945000 fffff880`0196a000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fe6000 fffff880`00ffb000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c43000 fffff880`02c5e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0196a000 fffff880`0197a000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e74000 fffff880`00f18000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f18000 fffff880`00f27000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d90000 fffff880`02d99000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00f7e000 fffff880`00f87000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01800000 fffff880`01821000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`018be000 fffff880`018cc000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018cc000 fffff880`018d8000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018d8000 fffff880`018e1000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018e1000 fffff880`018f4000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`018f4000 fffff880`0191e000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 


#3
Need your Rammon html.
 


#4
hi guys,

there, ive put my rammon text in the attachments...

tnx for the effort!!
 


Attachments

#5
hi guys,

there, ive put my rammon text in the attachments...

tnx for the effort!!
 


Attachments

#6
You have 2 identical sticks of Corsair CMX4GX3M2A1600C9:

DDR3 1600
9-9-9-24
1.65V



From what I see in your screenshots, you have it set right. However, you may need to set the voltage in the bios manually 1.65v. Update the 2 drivers mentioned in my 1st post. Then, if you get more crashes, run 10 passes of memtest.
 


#7
hi and tnx for the replys,

ive already set my xmp profile in the bios and i think ive set the voltage to 1.65, memtest also i ran for 6 passes it reported no errors but i think i will leave it workin one day for maybe 10 15 passess!
can anyone tell me about the mysterious sound and the aero change problem?? i will update my driver but the problem is that i think it will happen again beacuse i tried it on my first build month ago with buggy asrock pro3....
 


#8
You have 2 identical sticks of Corsair CMX4GX3M2A1600C9:

DDR3 1600
9-9-9-24
1.65V



From what I see in your screenshots, you have it set right. However, you may need to set the voltage in the bios manually 1.65v. Update the 2 drivers mentioned in my 1st post. Then, if you get more crashes, run 10 passes of memtest.
hi,

tnx for the reply ,

ive allready set my ram voltage to 1,65V and ive set my xmp profile to profile 1 and it has its own preferences, it was on auto... but still i think the problem is not resolved...

i will update the drivers soon in a couple of minutes...
 


#9
Your memory looks good: 2 identical Corsair's CMX4GX3M2A1600C9 1600Mhz 9 9 9 24 1.65v.


1. Update the drivers as listed in my 1st post.


2. If you get more crashes, set the voltage manually 1.65.
 


#10
ive updated ati drivers but im not sure how to update the fnet proxy???

if you can help, ive google it but i cant find any site that i think it can help me...

sorry for my ignorrance...

:(

and tnx!!
 


#11
If you get more crashes, then just uninstall the fnet proxy.
 


#12
ive deleted my fnet proxy driver in the system32 folder, i hope it helps...

if i get more crashes ill post here...

tnx again!!
 


#13
If you get more crashes, then just uninstall the fnet proxy.
hi cybercore,

ive done as youve told me 3 days ago and removed the fnret proxy driver but this morning i got extra 3 BSOD's when i started my computer... also ive got that wierd change from aero to nontransparent theme and the google chrome crashed for a couple of times before the BSOD...

what else are you suggesting to me??

also, all you other guys...
:(

tnx
 


Attachments

Last edited:
#14
IRQL_NOT_LESS_OR_EQUAL (a)
MEMORY_MANAGEMENT (1a)
memory_corruption


RAM is the culprit of your latest crashes.


032911-22729-01.dmp
BugCheck 1A, {41790, fffffa80014c6940, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )

032911-23384-01.dmp
BugCheck 1A, {41790, fffffa80014e35c0, ffff, 0}
Probably caused by : win32k.sys ( win32k!NtGdiCreateDIBSection+3e4 )

032911-37549-01.dmp
BugCheck A, {8, 2, 0, fffff80002b4157b}
Probably caused by : memory_corruption ( nt!MiStoreSetEvictPageFile+b )



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-22729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a05000 PsLoadedModuleList = 0xfffff800`02c42e50
Debug session time: Tue Mar 29 04:16:46.408 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:54.329
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa80014c6940, ffff, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80014c6940
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41790

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ae8f9e to fffff80002a75740

STACK_TEXT:  
fffff880`097c07e8 fffff800`02ae8f9e : 00000000`0000001a 00000000`00041790 fffffa80`014c6940 00000000`0000ffff : nt!KeBugCheckEx
fffff880`097c07f0 fffff800`02aa8df9 : 00000000`00000000 00000000`713eafff fffffa80`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`097c09b0 fffff800`02d8c010 : fffffa80`06574160 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`097c0ad0 fffff800`02d8c41b : 00000980`00000000 00000000`713a0000 fffffa80`00000001 fffffa80`066e8e60 : nt!MiUnmapViewOfSection+0x1b0
fffff880`097c0b90 fffff800`02a74993 : 00000000`00000000 00000000`0032db48 fffffa80`067a29e0 fffffa80`03d6de60 : nt!NtUnmapViewOfSection+0x5f
fffff880`097c0be0 00000000`775cf95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0011e188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775cf95a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+33906
fffff800`02ae8f9e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+33906

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906

BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-23384-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a16000 PsLoadedModuleList = 0xfffff800`02c53e50
Debug session time: Tue Mar 29 04:12:19.826 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:38.122
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa80014e35c0, ffff, 0}

Probably caused by : win32k.sys ( win32k!NtGdiCreateDIBSection+3e4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80014e35c0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41790

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002af9f9e to fffff80002a86740

STACK_TEXT:  
fffff880`093f94f8 fffff800`02af9f9e : 00000000`0000001a 00000000`00041790 fffffa80`014e35c0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`093f9500 fffff800`02ab9df9 : 00000000`00000000 00000000`04be3fff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`093f96c0 fffff800`02d9d010 : fffffa80`061ab6d0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`093f97e0 fffff800`02d9d41b : 00000000`00000000 00000000`048c0000 fffffa80`00000001 00000000`00000000 : nt!MiUnmapViewOfSection+0x1b0
fffff880`093f98a0 fffff800`02a85993 : 00000000`04aa2000 00000000`00000000 fffffa80`06a17060 fffff880`093f9b10 : nt!NtUnmapViewOfSection+0x5f
fffff880`093f98f0 fffff800`02a81f30 : fffff960`00194c58 fffff880`093f9c60 fffffa80`05d88060 00000000`0022e088 : nt!KiSystemServiceCopyEnd+0x13
fffff880`093f9a88 fffff960`00194c58 : fffff880`093f9c60 fffffa80`05d88060 00000000`0022e088 fffff880`093f9b90 : nt!KiServiceLinkage
fffff880`093f9a90 fffff800`02a85993 : 00000000`1c010295 00000000`00000134 00000000`00000000 00000000`00000000 : win32k!NtGdiCreateDIBSection+0x3e4
fffff880`093f9b70 00000000`7319056a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022e068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7319056a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!NtGdiCreateDIBSection+3e4
fffff960`00194c58 488bcf          mov     rcx,rdi

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  win32k!NtGdiCreateDIBSection+3e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0

FAILURE_BUCKET_ID:  X64_0x1a_41790_win32k!NtGdiCreateDIBSection+3e4

BUCKET_ID:  X64_0x1a_41790_win32k!NtGdiCreateDIBSection+3e4

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-37549-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c51e50
Debug session time: Tue Mar 29 04:21:59.524 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:57.445
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff80002b4157b}

Probably caused by : memory_corruption ( nt!MiStoreSetEvictPageFile+b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002b4157b, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbc0e0
 0000000000000008 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiStoreSetEvictPageFile+b
fffff800`02b4157b 488b5008        mov     rdx,qword ptr [rax+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  WerFault.exe

TRAP_FRAME:  fffff88006457770 -- (.trap 0xfffff88006457770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8005955740
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b4157b rsp=fffff88006457908 rbp=0000000000000000
 r8=0000000000000000  r9=fffffa8003f673f8 r10=0000000fffffffff
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiStoreSetEvictPageFile+0xb:
fffff800`02b4157b 488b5008        mov     rdx,qword ptr [rax+8] ds:6970:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a83ca9 to fffff80002a84740

STACK_TEXT:  
fffff880`06457628 fffff800`02a83ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06457630 fffff800`02a82920 : 00000000`77527000 fffffa80`03e57b60 00000000`7748a000 000007fe`fe480000 : nt!KiBugCheckDispatch+0x69
fffff880`06457770 fffff800`02b4157b : fffff800`02b42abe 00000000`001df000 fffffa80`03e57b60 fffffa80`05955740 : nt!KiPageFault+0x260
fffff880`06457908 fffff800`02b42abe : 00000000`001df000 fffffa80`03e57b60 fffffa80`05955740 00000000`77a30000 : nt!MiStoreSetEvictPageFile+0xb
fffff880`06457910 fffff800`02a34af6 : 00000000`00400000 00000000`0000000b 00000000`00400000 00000000`00000002 : nt!MiReleaseConfirmedPageFileSpace+0x7e
fffff880`06457990 fffff800`02a583f4 : fffffa80`03f673f8 00000000`00000001 00000000`00000000 fffffa80`0000001c : nt! ?? ::FNODOBFM::`string'+0x20a32
fffff880`06457a10 fffff800`02a57686 : 00000000`00000001 fffffa80`03f67060 fffffa80`03f67060 00000000`00000001 : nt!MiDeleteAllHashMappings+0xe4
fffff880`06457a50 fffff800`02d67abf : fffff8a0`0b160060 00000000`00000001 00000000`00000000 fffffa80`03e57b60 : nt!MmCleanProcessAddressSpace+0xa2
fffff880`06457aa0 fffff800`02d4095b : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`06457b60 fffff800`02a83993 : fffffa80`03f67060 fffff880`00000000 00000000`001a3a70 fffffa80`03e57b60 : nt!NtTerminateProcess+0x25b
fffff880`06457be0 00000000`77a5f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012f8f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a5f97a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiStoreSetEvictPageFile+b
fffff800`02b4157b 488b5008        mov     rdx,qword ptr [rax+8]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiStoreSetEvictPageFile+b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MiStoreSetEvictPageFile+b

BUCKET_ID:  X64_0xA_nt!MiStoreSetEvictPageFile+b

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00f7d000 fffff880`00fd4000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c16000 fffff880`02ca0000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`07bcb000 fffff880`07be1000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0a4ab000 fffff880`0a4b6000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00de3000 fffff880`00dec000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`07226000 fffff880`07b22000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`03f69000 fffff880`03fb7000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`018fe000 fffff880`01905000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f32000 fffff880`03f43000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`038cc000 fffff880`038ea000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00650000 fffff960`00677000   cdd      cdd.dll      unavailable (00000000)
fffff880`00d09000 fffff880`00dc9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01865000 fffff880`01895000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cab000 fffff880`00d09000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010da000 fffff880`0114d000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`07bbb000 fffff880`07bcb000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`039a0000 fffff880`039a9000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`06c28000 fffff880`06c36000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e91000 fffff880`03f14000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f14000 fffff880`03f32000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dc9000 fffff880`02dd8000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0184f000 fffff880`01865000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`06c00000 fffff880`06c22000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06c42000 fffff880`06c4b000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06c36000 fffff880`06c42000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06c4b000 fffff880`06c5e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06df2000 fffff880`06dfe000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`06a90000 fffff880`06b84000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`06b84000 fffff880`06bca000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`06d0e000 fffff880`06d17c00   EtronHub3 EtronHub3.sys Fri Jan 28 16:46:45 2011 (4D433945)
fffff880`06a67000 fffff880`06a76c00   EtronXHCI EtronXHCI.sys Fri Jan 28 16:46:43 2011 (4D433943)
fffff880`06a77000 fffff880`06a84000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`01068000 fffff880`0107c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0101c000 fffff880`01068000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`025ad000 fffff880`025ba000   FNETTBOH_305 FNETTBOH_305.SYS Wed Nov 03 02:24:26 2010 (4CD1001A)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01815000 fffff880`0184f000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01597000 fffff880`015e1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ff1000 fffff800`0303a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`06bca000 fffff880`06bee000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06d59000 fffff880`06db5000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`06bee000 fffff880`06bff000   HECIx64  HECIx64.sys  Tue Oct 19 19:33:43 2010 (4CBE2AD7)
fffff880`0258b000 fffff880`025a4000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`025a4000 fffff880`025ac080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0257d000 fffff880`0258b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03804000 fffff880`038cc000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0121b000 fffff880`01224000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`07b78000 fffff880`07b96000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`07ba5000 fffff880`07bbb000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`07b96000 fffff880`07ba5000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00baa000 fffff800`00bb4000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`06c5f000 fffff880`06ca2000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0156c000 fffff880`01597000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`06c22000 fffff880`06c27200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02444000 fffff880`02459000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02400000 fffff880`02423000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c53000 fffff880`00c97000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`025d5000 fffff880`025e3000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e56000 fffff880`03e65000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`025e3000 fffff880`025f0000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dc9000 fffff880`00de3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`038ea000 fffff880`03902000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03902000 fffff880`0392f000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0392f000 fffff880`0397d000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0397d000 fffff880`039a0000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01963000 fffff880`0196e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fdd000 fffff880`00fe7000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0107c000 fffff880`010da000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dbe000 fffff880`02dc9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01400000 fffff880`01412000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0141a000 fffff880`0150c000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`07be1000 fffff880`07bed000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03fb7000 fffff880`03fe6000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06d1a000 fffff880`06d2f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d14000 fffff880`02d23000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ca0000 fffff880`02ce5000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0150c000 fffff880`0156c000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0196e000 fffff880`0197f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02db2000 fffff880`02dbe000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a14000 fffff800`02ff1000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018f5000 fffff880`018fe000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02cee000 fffff880`02d14000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fe7000 fffff880`00fee000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fee000 fffff880`00ffe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03a97000 fffff880`03b3d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`06db5000 fffff880`06df2000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c97000 fffff880`00cab000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`07200000 fffff880`07224000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e00000 fffff880`03e1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03e1b000 fffff880`03e3c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03e3c000 fffff880`03e56000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`019aa000 fffff880`019fb000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`07bed000 fffff880`07bf8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01948000 fffff880`01951000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01951000 fffff880`0195a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0195a000 fffff880`01963000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01199000 fffff880`011d3000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02459000 fffff880`02471000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`07b22000 fffff880`07b78000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`03b3d000 fffff880`03b48000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`06a84000 fffff880`06a90000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d23000 fffff880`02d40000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015f1000 fffff880`015f9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0a43a000 fffff880`0a4ab000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`03a00000 fffff880`03a96000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`03b87000 fffff880`03bee000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`03b48000 fffff880`03b75000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`07bf8000 fffff880`07bf9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`03b75000 fffff880`03b87000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0199d000 fffff880`019aa000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0197f000 fffff880`0199d000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d9e000 fffff880`02db2000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03f43000 fffff880`03f69000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`06ca2000 fffff880`06cb4000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06d18000 fffff880`06d19f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`06a00000 fffff880`06a11000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`06cb4000 fffff880`06d0e000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`06a11000 fffff880`06a67000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`025ba000 fffff880`025d5000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01905000 fffff880`01913000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01913000 fffff880`01938000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015e1000 fffff880`015f1000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0114d000 fffff880`01199000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d83000 fffff880`02d9e000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01938000 fffff880`01948000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eca000 fffff880`00f6e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f6e000 fffff880`00f7d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ce5000 fffff880`02cee000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`00fd4000 fffff880`00fdd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02423000 fffff880`02444000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`024cf000 fffff880`0257d000   xnacc    xnacc.sys    Mon Jul 13 20:01:05 2009 (4A5BCAC1)

Unloaded modules:
fffff880`02d40000 fffff880`02d83000   dtsoftbus01.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00043000
fffff880`06d2f000 fffff880`06d59000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
fffff880`01895000 fffff880`018a3000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018a3000 fffff880`018af000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018af000 fffff880`018b8000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018b8000 fffff880`018cb000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`018cb000 fffff880`018f5000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 


#15
im at work now, i left my computer to run memtest for 9 hours, and when i get home i hope it says it has error because im really pissed at my computer... :(.... yesterday i installed dawn of war 2 and steam, played for a couple of hours, today in the morning i turned on my computer and it crashed... when i did a system resotre to a point before i installed the game, computer wokred normally for 4 hours until i left for work today...

???

is that maybe helpful??

if its the RAM ill go to the store and change them for new ....

tnx and peace
 


#16
It's a good idea to first test sticks one by one and in different slots, to be sure the motherboard is OK.
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.