Windows 7 Help? BSOD, inept user (sorry)

kalipsonoin

New Member
I've been subject to BSODs ever since I built this computer (November?). And it has bothered me on and off but I haven't had the time or the energy to pursue it. It went a few weeks without major problems, only died a couple of times, but the last two or three days it has BSODed at least twice a day.
As I'm working on my thesis, it's getting more nerve-wracking when I might potentially lose important stuff, so now’s probably a good time to work on fixing it.
I am completely technologically impaired, so any help would be enormously appreciated, especially in language I could understand (seriously, you can't underestimate how little I know).
THANK YOU.
Have tried reinstalling Windows, problem still happened.

Currently using Microsoft Security Essentials, if that means anything.
:( Please help. Any suggestions at all will be ridiculously enormously appreciated.
 

Attachments

  • BSODd.rar
    435.3 KB · Views: 338
  • SPD.PNG
    SPD.PNG
    27.7 KB · Views: 451
  • Memory.PNG
    Memory.PNG
    25.6 KB · Views: 407
Hello and welcome to windows7forums,

1. http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html
----> Attach RamMon HTML report PassMark RAMMon - Identify RAM type, speed & memory timings


2. Start > Accessories > Command Prompt > chkdsk /f


3. Start > Accessories > Command Prompt > sfc /scannow


4. Your drivers look OK. You might benefit updating to the latest:

Realtek Audio Realtek

Realtek LAN Realtek

Motherboard driver for USB 3.0 ASUSTeK Computer Inc.-Support-






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022211-18954-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03066000 PsLoadedModuleList = 0xfffff800`032a3e50
Debug session time: Tue Feb 22 15:59:04.325 2011 (UTC - 5:00)
System Uptime: 0 days 3:28:55.057
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff9600009b068, fffff8801667b320, 0}

Probably caused by : win32k.sys ( win32k!ESTROBJ::vInit+d8 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff9600009b068, Address of the instruction which caused the bugcheck
Arg3: fffff8801667b320, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
win32k!ESTROBJ::vInit+d8
fffff960`0009b068 0fbaa33807000012 bt      dword ptr [rbx+738h],12h

CONTEXT:  fffff8801667b320 -- (.cxr 0xfffff8801667b320)
rax=fffff900c1eae020 rbx=fff7f900c00bf010 rcx=fffff900c00bfe10
rdx=fffff900c0081054 rsi=fffff8801667c000 rdi=0000000041800000
rip=fffff9600009b068 rsp=fffff8801667bcf0 rbp=0000000000000000
 r8=0000000000000001  r9=000000000000001e r10=fffff900c0081054
r11=fffff8801667c2b0 r12=0000000000000000 r13=fffff8801667be20
r14=fffff8801667c2b0 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
win32k!ESTROBJ::vInit+0xd8:
fffff960`0009b068 0fbaa33807000012 bt      dword ptr [rbx+738h],12h ds:002b:fff7f900`c00bf748=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff960000728de to fffff9600009b068

STACK_TEXT:  
fffff880`1667bcf0 fffff960`000728de : fffff900`41800000 00000000`00000000 fffff900`00000001 fffff880`1667c2b0 : win32k!ESTROBJ::vInit+0xd8
fffff880`1667bd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!GreExtTextOutWLocked+0xb12


FOLLOWUP_IP: 
win32k!ESTROBJ::vInit+d8
fffff960`0009b068 0fbaa33807000012 bt      dword ptr [rbx+738h],12h

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!ESTROBJ::vInit+d8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0

STACK_COMMAND:  .cxr 0xfffff8801667b320 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32k!ESTROBJ::vInit+d8

BUCKET_ID:  X64_0x3B_win32k!ESTROBJ::vInit+d8

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\021911-23290-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03015000 PsLoadedModuleList = 0xfffff800`03252e50
Debug session time: Sat Feb 19 12:17:50.208 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:12.940
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031b8f8c, fffff88003833790, 0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031b8f8c, Address of the instruction which caused the bugcheck
Arg3: fffff88003833790, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExDeferredFreePool+100
fffff800`031b8f8c 4c8b02          mov     r8,qword ptr [rdx]

CONTEXT:  fffff88003833790 -- (.cxr 0xfffff88003833790)
rax=fffffa8003963610 rbx=0000000000000003 rcx=fffffa8003963610
rdx=fff7f8a008e9dd00 rsi=0000000000000000 rdi=fffff8a008f23920
rip=fffff800031b8f8c rsp=fffff88003834160 rbp=0000000000000000
 r8=fff7f8a008e9dd00  r9=0000000000000000 r10=fffff8a008e9dbe0
r11=0000000000000001 r12=fffffa80039633c0 r13=0000000000000000
r14=0000000000000016 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ExDeferredFreePool+0x100:
fffff800`031b8f8c 4c8b02          mov     r8,qword ptr [rdx] ds:002b:fff7f8a0`08e9dd00=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031b8f8c

STACK_TEXT:  
fffff880`03834160 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100


FOLLOWUP_IP: 
nt!ExDeferredFreePool+100
fffff800`031b8f8c 4c8b02          mov     r8,qword ptr [rdx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExDeferredFreePool+100

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff88003833790 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100

BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100

Followup: Pool_corruption
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022011-22105-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
Debug session time: Sun Feb 20 12:38:43.993 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:15.806
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880037c3688, fffff880037c2ef0, fffff88001300535}

Probably caused by : Ntfs.sys ( Ntfs!NtfsExpandHashTable+75 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880037c3688
Arg3: fffff880037c2ef0
Arg4: fffff88001300535

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880037c3688 -- (.exr 0xfffff880037c3688)
ExceptionAddress: fffff88001300535 (Ntfs!NtfsExpandHashTable+0x0000000000000075)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880037c2ef0 -- (.cxr 0xfffff880037c2ef0)
rax=0000000000000fff rbx=fffffa8004a3f350 rcx=fff7f8a001d01c70
rdx=0000000000001000 rsi=fffffa8004230850 rdi=00000000000003ff
rip=fffff88001300535 rsp=fffff880037c38c0 rbp=000000002b7e998a
 r8=fffff8a0025f0230  r9=fffff8a0095dc230 r10=fffffa8003961148
r11=0000000000000001 r12=fffff8a0030605f0 r13=0000000000000010
r14=fffff8a0097c7e10 r15=fffff8800e9ba4b0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
Ntfs!NtfsExpandHashTable+0x75:
fffff880`01300535 234110          and     eax,dword ptr [rcx+10h] ds:002b:fff7f8a0`01d01c80=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032aa0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsExpandHashTable+75
fffff880`01300535 234110          and     eax,dword ptr [rcx+10h]

FAULTING_IP: 
Ntfs!NtfsExpandHashTable+75
fffff880`01300535 234110          and     eax,dword ptr [rcx+10h]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880012f9896 to fffff88001300535

STACK_TEXT:  
fffff880`037c38c0 fffff880`012f9896 : fffffa80`04a3f350 fffffa80`04a3f350 00000000`2b7e998a 00000000`00000000 : Ntfs!NtfsExpandHashTable+0x75
fffff880`037c38f0 fffff880`012bf149 : 00000000`00000000 fffffa80`042d1660 fffffa80`04230850 00000000`000007ff : Ntfs!NtfsInsertHashEntry+0x152
fffff880`037c3970 fffff880`012e2b04 : fffff880`0e9ba4b0 fffffa80`042d1660 fffffa80`04230850 00000000`00000000 : Ntfs!NtfsOpenFile+0x61d
fffff880`037c3b50 fffff880`0124bc0d : fffffa80`04230850 fffffa80`042d1660 fffff880`0e9ba4b0 fffffa80`03fed000 : Ntfs!NtfsCommonCreate+0xc54
fffff880`037c3d30 fffff800`0306a5c7 : fffff880`0e9ba420 122930cf`6b38447d 6d3d33be`4788fb53 4e08a555`45fa5a64 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`037c3d60 fffff800`0306a581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0e9ba2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsExpandHashTable+75

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff880037c2ef0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsExpandHashTable+75

BUCKET_ID:  X64_0x24_Ntfs!NtfsExpandHashTable+75

Followup: MachineOwner
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022211-33431-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0305d000 PsLoadedModuleList = 0xfffff800`0329ae50
Debug session time: Tue Feb 22 16:00:58.083 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:13.815
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1, {77bcf72a, 0, ffff, fffff88008b2eca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them.  A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 0000000077bcf72a, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88008b2eca0, Previous KernelApcDisable

Debugging Details:
------------------


FAULTING_IP: 
+3337313634396637
00000000`77bcf72a ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800030ccca9 to fffff800030cd740

STACK_TEXT:  
fffff880`08b2ea68 fffff800`030ccca9 : 00000000`00000001 00000000`77bcf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08b2ea70 fffff800`030ccbe0 : 00000000`00001045 00000000`00000738 00000000`00000000 0000007f`ffffffff : nt!KiBugCheckDispatch+0x69
fffff880`08b2ebb0 00000000`77bcf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`027ae918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bcf72a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceExit+245
fffff800`030ccbe0 4883ec50        sub     rsp,50h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceExit+245

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245

BUCKET_ID:  X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`03f90000 fffff880`03fce000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00e72000 fffff880`00ec9000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b6b000 fffff880`02bf5000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06da1000 fffff880`06db7000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03dc2000 fffff880`03dd7000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`06d1d000 fffff880`06d25000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`03d96000 fffff880`03d9c000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03d90000 fffff880`03d96000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00fd3000 fffff880`00fdc000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01409000 fffff880`01411000   AtiPcie  AtiPcie.sys  Mon Aug 24 04:25:26 2009 (4A924E76)
fffff880`02abf000 fffff880`02ac6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d7f000 fffff880`03d90000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07ccd000 fffff880`07ceb000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007a0000 fffff960`007c7000   cdd      cdd.dll      unavailable (00000000)
fffff880`02a5b000 fffff880`02a85000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c9b000 fffff880`00d5b000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c3d000 fffff880`00c9b000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010ee000 fffff880`01161000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`06d91000 fffff880`06da1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`094e9000 fffff880`094f7000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03d61000 fffff880`03d7f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03d52000 fffff880`03d61000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`011e7000 fffff880`011fd000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`07e99000 fffff880`07ebb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`03c78000 fffff880`03cbb000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`09503000 fffff880`0950c000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`094f7000 fffff880`09503000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0950c000 fffff880`0951f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`094cf000 fffff880`094db000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e32000 fffff880`03f26000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`03f26000 fffff880`03f6c000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0107c000 fffff880`01090000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01030000 fffff880`0107c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e2000 fffff880`013ec000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00e35000 fffff880`00e6f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0159b000 fffff880`015e5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03e00000 fffff880`03e0d000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03014000 fffff800`0305d000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03f6c000 fffff880`03f90000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`07e00000 fffff880`07e5c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`0952d000 fffff880`09546000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`09546000 fffff880`0954e080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0951f000 fffff880`0952d000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07c05000 fffff880`07ccd000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01400000 fffff880`01409000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`06c85000 fffff880`06c94000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`09579000 fffff880`09587000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcb000 fffff800`00bd5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`07ed2000 fffff880`07f15000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013b7000 fffff880`013d1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01570000 fffff880`0159b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`07ebb000 fffff880`07ec0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`095cb000 fffff880`095e0000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`09587000 fffff880`095aa000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c1c000 fffff880`00c29000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`094db000 fffff880`094e9000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`06c94000 fffff880`06ca3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0956c000 fffff880`09579000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fb9000 fffff880`00fd3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a85000 fffff880`02ab6000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`09600000 fffff880`09610000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`07ceb000 fffff880`07d03000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07d03000 fffff880`07d30000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07d30000 fffff880`07d7e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07d7e000 fffff880`07da1000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02b24000 fffff880`02b2f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ed2000 fffff880`00edc000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01090000 fffff880`010ee000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03d47000 fffff880`03d52000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015ed000 fffff880`015ff000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0141e000 fffff880`01510000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06ddb000 fffff880`06de7000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`09253000 fffff880`09266000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`06c00000 fffff880`06c2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07f99000 fffff880`07fae000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03c4c000 fffff880`03c5b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a00000 fffff880`02a45000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01510000 fffff880`01570000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`07da1000 fffff880`07db6000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`02b2f000 fffff880`02b40000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03d3b000 fffff880`03d47000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0305d000 fffff800`0363a000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01214000 fffff880`013b7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02ab6000 fffff880`02abf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`07f27000 fffff880`07f3f000   nusb3hub nusb3hub.sys Tue Feb 23 21:10:14 2010 (4B848A86)
fffff880`03fce000 fffff880`03ffe000   nusb3xhc nusb3xhc.sys Tue Feb 23 21:10:16 2010 (4B848A88)
fffff880`07bf6000 fffff880`07bf7180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`0701c000 fffff880`07bf5a80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`09200000 fffff880`09253000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03c10000 fffff880`03c36000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f1c000 fffff880`00f31000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00edc000 fffff880`00f0f000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fa2000 fffff880`00fa9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fa9000 fffff880`00fb9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d1000 fffff880`013e2000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`09611000 fffff880`096b7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`07e5c000 fffff880`07e99000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c29000 fffff880`00c3d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`06db7000 fffff880`06ddb000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06c2f000 fffff880`06c4a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`06c4a000 fffff880`06c6b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`06c6b000 fffff880`06c85000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03cea000 fffff880`03d3b000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02b09000 fffff880`02b12000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b12000 fffff880`02b1b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b1b000 fffff880`02b24000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011ad000 fffff880`011e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`09266000 fffff880`0927e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06d31000 fffff880`06d88000   Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`09292000 fffff880`094ce280   RTKVHD64 RTKVHD64.sys Tue Apr 20 04:46:52 2010 (4BCD69FC)
fffff880`096b7000 fffff880`096c2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`06d25000 fffff880`06d31000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03c5b000 fffff880`03c78000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015e5000 fffff880`015ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`09768000 fffff880`097fe000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`09701000 fffff880`09768000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`096c2000 fffff880`096ef000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`06ca3000 fffff880`06ca4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`096ef000 fffff880`09701000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b5e000 fffff880`02b6b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b40000 fffff880`02b5e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03cd6000 fffff880`03cea000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03d9c000 fffff880`03dc2000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`07f15000 fffff880`07f27000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0954f000 fffff880`0956c000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`03ffe000 fffff880`03ffff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`06d0c000 fffff880`06d1d000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`07f3f000 fffff880`07f99000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e0d000 fffff880`03e18000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`06cb6000 fffff880`06d0c000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f0f000 fffff880`00f1c000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02ac6000 fffff880`02ad4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02ad4000 fffff880`02af9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f31000 fffff880`00f46000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f46000 fffff880`00fa2000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01161000 fffff880`011ad000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c36000 fffff880`03c4c000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03cbb000 fffff880`03cd6000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02af9000 fffff880`02b09000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d5b000 fffff880`00dff000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00c00000 fffff880`00c0f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a45000 fffff880`02a4e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`003a0000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`06d88000 fffff880`06d91000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ec9000 fffff880`00ed2000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`095aa000 fffff880`095cb000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`013ec000 fffff880`013fa000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01411000 fffff880`0141d000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01200000 fffff880`01209000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`00fdc000 fffff880`00fef000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
You got 2 GSkills nominally rated DDR1333 9-9-9-24 -- is this correct?
Could you give me a link to .pdf or a web page with the specs for your RAM?
Does your motherboard support DDR1333 and DDR1600?
 
[FONT=&quot]1. ...yes?
[/FONT]

[FONT=&quot]G.SKILL Ripjaws Series 4GB (2 x 2GB) 240-Pin DDR3 SDRAM DDR3 1600 (PC3 12800) Desktop Memory Model F3-12800CL9D-4GBRL

2. Link Removed - Invalid URL[/FONT]
probably not what you were looking for, but product site
3. Memory standard is : DDR3 2000(O.C.) / 1333 / 1066
 
Link Removed - Invalid URL

Well this means you got the settings wrong at the moment, 1333 while it's rated 1600.

Set it 1600Mhz 9-9-9-24 1.5v.
 
That's what it should be, correct?
So far it hasn't crashed today, and I'm crossing my fingers that that's a good sign. It does it so irregularly, though, that I don't know if that is what would have done it or not.
 
That's what it should be, correct?
So far it hasn't crashed today, and I'm crossing my fingers that that's a good sign. It does it so irregularly, though, that I don't know if that is what would have done it or not.


Correct,

Link Removed - Invalid URL is rated 1600Mhz 9-9-9-24 1.5v.
 
Any BSOD is caused by either faulty hardware or bad drivers or wrong software configurations.




me said:
2. Start > Accessories > Command Prompt > chkdsk /f


3. Start > Accessories > Command Prompt > sfc /scannow


4. Your drivers look OK. You might benefit updating to the latest:

Realtek Audio Realtek

Realtek LAN Realtek

Motherboard driver for USB 3.0 ASUSTeK Computer Inc.-Support-


Have you followed these?
 
Back
Top