Memory_management/System_Service_Exception/and more

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by adam380, Apr 25, 2011.

  1. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    Hi i have lately been having a few blue screens

    such as
    Memory_management
    System_Service_Exception
    System_Thread_Exception_Not_Handled_M
    Kmode_exception_not_handled

    also at the begginning of the year i was getting Driver_irql_not less or equal and bad_pool_header.

    My systems Specs are

    Processor:Amd phenom II x6 1055t stock clock
    Motherboard Asrock n68c-gs ucc
    Graphics Card: Asus HD 5770 1gb gddr5
    Ram: Kingston 4gb Not sure of timers
    Hard drives:1tb 5400rpm hdd and 80gb not sure of speed hdd for Os
    Operating System: Windows 7 ultimate 64 bit with sp1 update.

    Notes/What i have done to try stop bsod:Before i installed my 80gb hard drive the os i was getting the blue screens like irql not less or equal and bad pool header.

    I at 1st thaught this was a heat issue so i went and bought a new case Cooler master haf 922 along with 3x 120mm fans the case comes with 2x 200mm fans
    i then thaught it was cpu heat issue
    so i bought a new heatsink Hyper 212 plus with 120mm fan.

    neither of them worked so i rma'd my graphics card no luck after that i have ran memtest for over 6 hours with no fails.

    I have uploaded the only memory dumps i have i would have had more but i tried a fresh windows install about 3 times to try get rid of this problem.


    View attachment MiniDumps.rar

    Also 1st post new to forum :).

    Thanks.

    Adam.

    (Edit: I keep my system defragged aswell if that means anything)
     
    #1 adam380, Apr 25, 2011
    Last edited: Apr 25, 2011
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Most likely wrong clocks/timings/voltage.


    1. Attach 2 screenshots of CPUZ memory and CPU tabs.
    Attach Rammon HTML.zip.


    2. Uninstall MSI Afterburner


    3. Uninstall AVG

    AVG Worldwide - Download tools

    Virus, Spyware & Malware Protection | Microsoft Security Essentials



    4. Update drivers (it most likely won't fix you though)

    ATI
    atikmdag.sys Wed Jan 26 17:48:28 2011

    nForce
    nvmf6264.sys Thu Apr 30 15:45:59 2009

    VIA Audio
    viahduaa.sys Wed Nov 25 08:06:00 2009

    XBox USB wireless controller
    xusb21.sys Thu Aug 13 18:10:17 2009




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042311-30765-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
    Debug session time: Sat Apr 23 13:39:55.342 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:39.967
    Loading Kernel Symbols
    ...................................................
    Loading User Symbols
    Cannot read PEB32 from WOW64 TEB32 00080018 - Win32 error 0n30
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {403, fffff6800029f8f8, cdd0000099e4a867, ffdff6800029f8f8}
    
    Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000403, The subtype of the bugcheck.
    Arg2: fffff6800029f8f8
    Arg3: cdd0000099e4a867
    Arg4: ffdff6800029f8f8
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_403
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff8a003182130 to 00000000776fa834
    
    STACK_TEXT:  
    00000000`0012dcc0 fffff8a0`03182130 : 00000000`05420000 fa800392`2da80460 02000000`00025c1a 00000000`0008b2b6 : 0x776fa834
    00000000`0012dcc8 00000000`05420000 : fa800392`2da80460 02000000`00025c1a 00000000`0008b2b6 00000000`00085860 : 0xfffff8a0`03182130
    00000000`0012dcd0 fa800392`2da80460 : 02000000`00025c1a 00000000`0008b2b6 00000000`00085860 fffff8a0`02f27860 : 0x5420000
    00000000`0012dcd8 02000000`00025c1a : 00000000`0008b2b6 00000000`00085860 fffff8a0`02f27860 00000000`05420000 : 0xfa800392`2da80460
    00000000`0012dce0 00000000`0008b2b6 : 00000000`00085860 fffff8a0`02f27860 00000000`05420000 fa800381`b67004e0 : 0x2000000`00025c1a
    00000000`0012dce8 00000000`00085860 : fffff8a0`02f27860 00000000`05420000 fa800381`b67004e0 02000000`000881e5 : 0x8b2b6
    00000000`0012dcf0 fffff8a0`02f27860 : 00000000`05420000 fa800381`b67004e0 02000000`000881e5 00000000`00000c68 : 0x85860
    00000000`0012dcf8 00000000`05420000 : fa800381`b67004e0 02000000`000881e5 00000000`00000c68 00000000`00000003 : 0xfffff8a0`02f27860
    00000000`0012dd00 fa800381`b67004e0 : 02000000`000881e5 00000000`00000c68 00000000`00000003 fffff8a0`02c66fa8 : 0x5420000
    00000000`0012dd08 02000000`000881e5 : 00000000`00000c68 00000000`00000003 fffff8a0`02c66fa8 00000000`05460001 : 0xfa800381`b67004e0
    00000000`0012dd10 00000000`00000c68 : 00000000`00000003 fffff8a0`02c66fa8 00000000`05460001 fa80058e`1f9004c0 : 0x2000000`000881e5
    00000000`0012dd18 00000000`00000003 : fffff8a0`02c66fa8 00000000`05460001 fa80058e`1f9004c0 02000000`0008662a : 0xc68
    00000000`0012dd20 fffff8a0`02c66fa8 : 00000000`05460001 fa80058e`1f9004c0 02000000`0008662a 00000000`00086a9d : 0x3
    00000000`0012dd28 00000000`05460001 : fa80058e`1f9004c0 02000000`0008662a 00000000`00086a9d 00000000`0008819b : 0xfffff8a0`02c66fa8
    00000000`0012dd30 fa80058e`1f9004c0 : 02000000`0008662a 00000000`00086a9d 00000000`0008819b fffff8a0`032d11d0 : 0x5460001
    00000000`0012dd38 02000000`0008662a : 00000000`00086a9d 00000000`0008819b fffff8a0`032d11d0 00000000`01420000 : 0xfa80058e`1f9004c0
    00000000`0012dd40 00000000`00086a9d : 00000000`0008819b fffff8a0`032d11d0 00000000`01420000 fa800387`8f9004c0 : 0x2000000`0008662a
    00000000`0012dd48 00000000`0008819b : fffff8a0`032d11d0 00000000`01420000 fa800387`8f9004c0 02000000`00080dc5 : 0x86a9d
    00000000`0012dd50 fffff8a0`032d11d0 : 00000000`01420000 fa800387`8f9004c0 02000000`00080dc5 00000000`0008629d : 0x8819b
    00000000`0012dd58 00000000`01420000 : fa800387`8f9004c0 02000000`00080dc5 00000000`0008629d 00000000`0007d49d : 0xfffff8a0`032d11d0
    00000000`0012dd60 fa800387`8f9004c0 : 02000000`00080dc5 00000000`0008629d 00000000`0007d49d fffff680`000a106a : 0x1420000
    00000000`0012dd68 02000000`00080dc5 : 00000000`0008629d 00000000`0007d49d fffff680`000a106a 00000000`00400000 : 0xfa800387`8f9004c0
    00000000`0012dd70 00000000`0008629d : 00000000`0007d49d fffff680`000a106a 00000000`00400000 00000000`00000080 : 0x2000000`00080dc5
    00000000`0012dd78 00000000`0007d49d : fffff680`000a106a 00000000`00400000 00000000`00000080 00000000`0007b381 : 0x8629d
    00000000`0012dd80 fffff680`000a106a : 00000000`00400000 00000000`00000080 00000000`0007b381 00000000`00085d97 : 0x7d49d
    00000000`0012dd88 00000000`00400000 : 00000000`00000080 00000000`0007b381 00000000`00085d97 00000000`00086e6f : 0xfffff680`000a106a
    00000000`0012dd90 00000000`00000080 : 00000000`0007b381 00000000`00085d97 00000000`00086e6f fffff8a0`03208188 : 0x400000
    00000000`0012dd98 00000000`0007b381 : 00000000`00085d97 00000000`00086e6f fffff8a0`03208188 00000000`05420000 : 0x80
    00000000`0012dda0 00000000`00085d97 : 00000000`00086e6f fffff8a0`03208188 00000000`05420000 fa8004ac`7ea80460 : 0x7b381
    00000000`0012dda8 00000000`00086e6f : fffff8a0`03208188 00000000`05420000 fa8004ac`7ea80460 02000000`00087c8e : 0x85d97
    00000000`0012ddb0 fffff8a0`03208188 : 00000000`05420000 fa8004ac`7ea80460 02000000`00087c8e 00000000`00085e9f : 0x86e6f
    00000000`0012ddb8 00000000`05420000 : fa8004ac`7ea80460 02000000`00087c8e 00000000`00085e9f 00000000`0008669f : 0xfffff8a0`03208188
    00000000`0012ddc0 fa8004ac`7ea80460 : 02000000`00087c8e 00000000`00085e9f 00000000`0008669f fffff680`00227eca : 0x5420000
    00000000`0012ddc8 02000000`00087c8e : 00000000`00085e9f 00000000`0008669f fffff680`00227eca 00000000`00400000 : 0xfa8004ac`7ea80460
    00000000`0012ddd0 00000000`00085e9f : 00000000`0008669f fffff680`00227eca 00000000`00400000 00000000`00000080 : 0x2000000`00087c8e
    00000000`0012ddd8 00000000`0008669f : fffff680`00227eca 00000000`00400000 00000000`00000080 00000000`0008119b : 0x85e9f
    00000000`0012dde0 fffff680`00227eca : 00000000`00400000 00000000`00000080 00000000`0008119b 00000000`00027aa0 : 0x8669f
    00000000`0012dde8 00000000`00400000 : 00000000`00000080 00000000`0008119b 00000000`00027aa0 00000000`000872a0 : 0xfffff680`00227eca
    00000000`0012ddf0 00000000`00000080 : 00000000`0008119b 00000000`00027aa0 00000000`000872a0 fffff680`00127802 : 0x400000
    00000000`0012ddf8 00000000`0008119b : 00000000`00027aa0 00000000`000872a0 fffff680`00127802 00000000`00400000 : 0x80
    00000000`0012de00 00000000`00027aa0 : 00000000`000872a0 fffff680`00127802 00000000`00400000 00000000`00000080 : 0x8119b
    00000000`0012de08 00000000`000872a0 : fffff680`00127802 00000000`00400000 00000000`00000080 00000000`00079e52 : 0x27aa0
    00000000`0012de10 fffff680`00127802 : 00000000`00400000 00000000`00000080 00000000`00079e52 00000000`000860a1 : 0x872a0
    00000000`0012de18 00000000`00400000 : 00000000`00000080 00000000`00079e52 00000000`000860a1 00000000`0008cea1 : 0xfffff680`00127802
    00000000`0012de20 00000000`00000080 : 00000000`00079e52 00000000`000860a1 00000000`0008cea1 fffff680`0034a182 : 0x400000
    00000000`0012de28 00000000`00079e52 : 00000000`000860a1 00000000`0008cea1 fffff680`0034a182 00000000`00400000 : 0x80
    00000000`0012de30 00000000`000860a1 : 00000000`0008cea1 fffff680`0034a182 00000000`00400000 00000000`00000080 : 0x79e52
    00000000`0012de38 00000000`0008cea1 : fffff680`0034a182 00000000`00400000 00000000`00000080 00000000`000843ba : 0x860a1
    00000000`0012de40 fffff680`0034a182 : 00000000`00400000 00000000`00000080 00000000`000843ba 00000000`0005b6b4 : 0x8cea1
    00000000`0012de48 00000000`00400000 : 00000000`00000080 00000000`000843ba 00000000`0005b6b4 00000000`00000001 : 0xfffff680`0034a182
    00000000`0012de50 00000000`00000080 : 00000000`000843ba 00000000`0005b6b4 00000000`00000001 fffff680`0033b828 : 0x400000
    00000000`0012de58 00000000`000843ba : 00000000`0005b6b4 00000000`00000001 fffff680`0033b828 00000000`05560001 : 0x80
    00000000`0012de60 00000000`0005b6b4 : 00000000`00000001 fffff680`0033b828 00000000`05560001 00000000`00000080 : 0x843ba
    00000000`0012de68 00000000`00000001 : fffff680`0033b828 00000000`05560001 00000000`00000080 00000000`00033b0a : 0x5b6b4
    00000000`0012de70 fffff680`0033b828 : 00000000`05560001 00000000`00000080 00000000`00033b0a 00000000`000863a3 : 0x1
    00000000`0012de78 00000000`05560001 : 00000000`00000080 00000000`00033b0a 00000000`000863a3 00000000`000749a3 : 0xfffff680`0033b828
    00000000`0012de80 00000000`00000080 : 00000000`00033b0a 00000000`000863a3 00000000`000749a3 fffff680`00349792 : 0x5560001
    00000000`0012de88 00000000`00033b0a : 00000000`000863a3 00000000`000749a3 fffff680`00349792 00000000`00400000 : 0x80
    00000000`0012de90 00000000`000863a3 : 00000000`000749a3 fffff680`00349792 00000000`00400000 00000000`00000080 : 0x33b0a
    00000000`0012de98 00000000`000749a3 : fffff680`00349792 00000000`00400000 00000000`00000080 00000000`00011a12 : 0x863a3
    00000000`0012dea0 fffff680`00349792 : 00000000`00400000 00000000`00000080 00000000`00011a12 00000000`000850a4 : 0x749a3
    00000000`0012dea8 00000000`00400000 : 00000000`00000080 00000000`00011a12 00000000`000850a4 00000000`00087da4 : 0xfffff680`00349792
    00000000`0012deb0 00000000`00000080 : 00000000`00011a12 00000000`000850a4 00000000`00087da4 fffff680`00349162 : 0x400000
    00000000`0012deb8 00000000`00011a12 : 00000000`000850a4 00000000`00087da4 fffff680`00349162 00000000`00400000 : 0x80
    00000000`0012dec0 00000000`000850a4 : 00000000`00087da4 fffff680`00349162 00000000`00400000 00000000`00000080 : 0x11a12
    00000000`0012dec8 00000000`00087da4 : fffff680`00349162 00000000`00400000 00000000`00000080 00000000`00011a12 : 0x850a4
    00000000`0012ded0 fffff680`00349162 : 00000000`00400000 00000000`00000080 00000000`00011a12 00000000`0005acbc : 0x87da4
    00000000`0012ded8 00000000`00400000 : 00000000`00000080 00000000`00011a12 00000000`0005acbc 00000000`00000001 : 0xfffff680`00349162
    00000000`0012dee0 00000000`00000080 : 00000000`00011a12 00000000`0005acbc 00000000`00000001 fffff680`0033abc0 : 0x400000
    00000000`0012dee8 00000000`00011a12 : 00000000`0005acbc 00000000`00000001 fffff680`0033abc0 00000000`05560001 : 0x80
    00000000`0012def0 00000000`0005acbc : 00000000`00000001 fffff680`0033abc0 00000000`05560001 00000000`00000080 : 0x11a12
    00000000`0012def8 00000000`00000001 : fffff680`0033abc0 00000000`05560001 00000000`00000080 00000000`000850e0 : 0x5acbc
    00000000`0012df00 fffff680`0033abc0 : 00000000`05560001 00000000`00000080 00000000`000850e0 00000000`00085fa6 : 0x1
    00000000`0012df08 00000000`05560001 : 00000000`00000080 00000000`000850e0 00000000`00085fa6 00000000`00086ea6 : 0xfffff680`0033abc0
    00000000`0012df10 00000000`00000080 : 00000000`000850e0 00000000`00085fa6 00000000`00086ea6 fffff680`0011ea82 : 0x5560001
    
    
    STACK_COMMAND:  kb
    
    SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Unknown_Module
    
    IMAGE_NAME:  Unknown_Image
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    BUCKET_ID:  BAD_STACK
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042511-38234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
    Debug session time: Mon Apr 25 02:56:56.758 2011 (UTC - 4:00)
    System Uptime: 0 days 2:55:10.477
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {403, fffff68000051568, e9c000003dfe2867, ffdff68000051568}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+31ef2 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000403, The subtype of the bugcheck.
    Arg2: fffff68000051568
    Arg3: e9c000003dfe2867
    Arg4: ffdff68000051568
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_403
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  prime95.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002af46c8 to fffff80002a82740
    
    STACK_TEXT:  
    fffff880`09df77b8 fffff800`02af46c8 : 00000000`0000001a 00000000`00000403 fffff680`00051568 e9c00000`3dfe2867 : nt!KeBugCheckEx
    fffff880`09df77c0 fffff800`02ab3381 : 00000000`00000000 fffff680`00051ff8 fffffa80`082f3060 fffff800`02a871fa : nt! ?? ::FNODOBFM::`string'+0x31ef2
    fffff880`09df7970 fffff800`02ac40da : 00000000`00000000 00000000`14d20fff fffffa80`00000000 fffffa80`082f3060 : nt!MiDeleteVirtualAddresses+0x408
    fffff880`09df7b30 fffff800`02a81993 : ffffffff`ffffffff 00000000`03f1f800 00000000`03f1f7c8 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
    fffff880`09df7c20 00000000`76fcf89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`03f1f738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fcf89a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+31ef2
    fffff800`02af46c8 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+31ef2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2
    
    BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042311-34796-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
    Debug session time: Sat Apr 23 13:45:10.905 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:35.530
    Loading Kernel Symbols
    ...................................................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002a8c905, 0, ffffffffffffffff}
    
    Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002a8c905, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExpInterlockedPopEntrySListFault16+0
    fffff800`02a8c905 498b08          mov     rcx,qword ptr [r8]
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002a9724a to fffff880042297f2
    
    STACK_TEXT:  
    fffff800`0408fc98 fffff800`02a9724a : 00000000`00369e99 fffffa80`04660dd8 fffff800`02c11c40 00000000`00000002 : 0xfffff880`042297f2
    fffff800`0408fca0 fffff800`02a91ebc : fffff800`02c03e80 fffff800`00000000 00000000`00000000 fffff880`0442fdb0 : nt!PoIdle+0x53a
    fffff800`0408fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
    
    
    STACK_COMMAND:  .bugcheck ; kb
    
    FOLLOWUP_IP: 
    nt!ExpInterlockedPopEntrySListFault16+0
    fffff800`02a8c905 498b08          mov     rcx,qword ptr [r8]
    
    SYMBOL_NAME:  nt!ExpInterlockedPopEntrySListFault16+0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042311-38671-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
    Debug session time: Sat Apr 23 15:37:33.464 2011 (UTC - 4:00)
    System Uptime: 0 days 1:50:49.183
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff88005362cee, fffff880021356a8, fffff88002134f10}
    
    Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff88005362cee, The address that the exception occurred at
    Arg3: fffff880021356a8, Exception Record Address
    Arg4: fffff88002134f10, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
    fffff880`05362cee 488b18          mov     rbx,qword ptr [rax]
    
    EXCEPTION_RECORD:  fffff880021356a8 -- (.exr 0xfffff880021356a8)
    ExceptionAddress: fffff88005362cee (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x0000000000000022)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88002134f10 -- (.cxr 0xfffff88002134f10)
    rax=5958504b06090003 rbx=0000000000000000 rcx=fffffa80058cf000
    rdx=fffffa8005320f70 rsi=fffffa80043114a0 rdi=fffffa80058cf000
    rip=fffff88005362cee rsp=fffff880021358e0 rbp=fffffa80055ddde8
     r8=fffffa8004a48701  r9=0000000000000000 r10=0000000000000000
    r11=00000000000001ff r12=000000000000016b r13=0000000000000001
    r14=0000000000000000 r15=0000000000000001
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
    dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x22:
    fffff880`05362cee 488b18          mov     rbx,qword ptr [rax] ds:002b:5958504b`06090003=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
    fffff880`05362cee 488b18          mov     rbx,qword ptr [rax]
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from fffff8800535fed3 to fffff88005362cee
    
    STACK_TEXT:  
    fffff880`021358e0 fffff880`0535fed3 : 00000000`00000000 fffffa80`043114a0 00000000`0000016b 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x22
    fffff880`02135910 fffff880`0537a65d : 00000000`00000000 fffff8a0`095a6b40 fffffa80`00000000 fffffa80`04a48750 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
    fffff880`02135ae0 fffff880`0537a398 : fffff880`009ecfc0 fffff880`05379d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
    fffff880`02135cd0 fffff880`05379e96 : 00000000`00000000 fffffa80`03699bd0 00000000`00000080 fffffa80`0375d410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
    fffff880`02135d00 fffff800`02d2c7c6 : 00000000`06c2dc48 fffffa80`056d6b60 fffffa80`0370a380 fffffa80`056d6b60 : dxgmms1!VidSchiWorkerThread+0xd6
    fffff880`02135d40 fffff800`02a67c26 : fffff880`009e8180 fffffa80`056d6b60 fffff880`009f3040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`02135d80 00000000`00000000 : fffff880`02136000 fffff880`02130000 fffff880`02135690 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa174
    
    STACK_COMMAND:  .cxr 0xfffff88002134f10 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
    
    BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042411-34125-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
    Debug session time: Sat Apr 23 23:30:00.788 2011 (UTC - 4:00)
    System Uptime: 0 days 2:26:56.523
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff8800435b23b, fffff880094e48f0, 0}
    
    Probably caused by : atikmpag.sys ( atikmpag+a23b )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff8800435b23b, Address of the instruction which caused the bugcheck
    Arg3: fffff880094e48f0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    atikmpag+a23b
    fffff880`0435b23b 488b4008        mov     rax,qword ptr [rax+8]
    
    CONTEXT:  fffff880094e48f0 -- (.cxr 0xfffff880094e48f0)
    rax=0000000000000001 rbx=fffff880094e5380 rcx=fffffa80068f9040
    rdx=ffffffffffb70fc0 rsi=fffff880094e5430 rdi=fffffa80068f9438
    rip=fffff8800435b23b rsp=fffff880094e52c0 rbp=fffffa80068f9040
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=fffffa80068f9040 r12=fffffa8004b99700 r13=000000000000002a
    r14=fffff880094e5388 r15=fffffa800593f000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    atikmpag+0xa23b:
    fffff880`0435b23b 488b4008        mov     rax,qword ptr [rax+8] ds:002b:00000000`00000009=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  godfather2.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8800435b23b
    
    STACK_TEXT:  
    fffff880`094e52c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0xa23b
    
    
    FOLLOWUP_IP: 
    atikmpag+a23b
    fffff880`0435b23b 488b4008        mov     rax,qword ptr [rax+8]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  atikmpag+a23b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: atikmpag
    
    IMAGE_NAME:  atikmpag.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d409c8d
    
    STACK_COMMAND:  .cxr 0xfffff880094e48f0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_atikmpag+a23b
    
    BUCKET_ID:  X64_0x3B_atikmpag+a23b
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00efe000 fffff880`00f55000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cd3000 fffff880`02d5d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0538c000 fffff880`053a2000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`051c9000 fffff880`051dd000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
    fffff880`041b5000 fffff880`041ca000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`011b2000 fffff880`011bd000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00db5000 fffff880`00ddf000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`04412000 fffff880`0456a000   athrx    athrx.sys    Tue Jun 09 14:06:49 2009 (4A2EA4B9)
    fffff880`04840000 fffff880`0513c000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`04351000 fffff880`0439f000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff880`00fe9000 fffff880`00ffa000   avgfwd6a avgfwd6a.sys Sun Jul 11 21:38:24 2010 (4C3A7210)
    fffff880`03845000 fffff880`03870000   AVGIDSDriver AVGIDSDriver.Sys Wed Mar 30 10:57:08 2011 (4D9344C4)
    fffff880`0188c000 fffff880`01896000   AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
    fffff880`05e74000 fffff880`05e7f000   AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
    fffff880`04140000 fffff880`0418f000   avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
    fffff880`019ea000 fffff880`019f9000   avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
    fffff880`01880000 fffff880`0188c000   avgrkx64 avgrkx64.sys Tue Jan 18 21:31:31 2011 (4D364D03)
    fffff880`02c2f000 fffff880`02c8e000   avgtdia  avgtdia.sys  Thu Feb 10 00:50:32 2011 (4D537CA8)
    fffff880`018c2000 fffff880`018c9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0412f000 fffff880`04140000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`039d3000 fffff880`039f1000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
    fffff960`00640000 fffff960`00667000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
    fffff880`04292000 fffff880`042af000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`011bd000 fffff880`011e7000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cf5000 fffff880`00db5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c97000 fffff880`00cf5000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0147d000 fffff880`014f0000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`0537c000 fffff880`0538c000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04400000 fffff880`0440e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0408e000 fffff880`04111000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`04111000 fffff880`0412f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0407f000 fffff880`0408e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0183a000 fffff880`01850000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04815000 fffff880`04837000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`042bb000 fffff880`042c4000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`042af000 fffff880`042bb000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`042c4000 fffff880`042d7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`042d7000 fffff880`042e3000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`05242000 fffff880`05336000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`05336000 fffff880`0537c000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01501000 fffff880`0150b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`018ca000 fffff880`01914000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02a0c000 fffff800`02a55000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04577000 fffff880`0459b000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04200000 fffff880`0425c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`04279000 fffff880`04292000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`04837000 fffff880`0483f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05a45000 fffff880`05a53000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0390b000 fffff880`039d3000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`019ce000 fffff880`019d7000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0522f000 fffff880`0523e000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`045ed000 fffff880`045fb000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00ba0000 fffff800`00baa000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
    fffff880`05186000 fffff880`051c9000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013b9000 fffff880`013d3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`013d3000 fffff880`013fe000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05a3d000 fffff880`05a42200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`03878000 fffff880`0388d000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02c00000 fffff880`02c23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c76000 fffff880`00c83000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`04000000 fffff880`0400e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`05177000 fffff880`05186000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`051ef000 fffff880`051fc000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03800000 fffff880`03818000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03818000 fffff880`03845000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
    fffff880`05e03000 fffff880`05e51000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
    fffff880`05e51000 fffff880`05e74000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
    fffff880`00e23000 fffff880`00e2e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f5e000 fffff880`00f68000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01060000 fffff880`010be000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`04074000 fffff880`0407f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`019bc000 fffff880`019ce000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0150b000 fffff880`015fd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`053c6000 fffff880`053d2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`038e0000 fffff880`038f3000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`05200000 fffff880`0522f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04800000 fffff880`04815000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02da2000 fffff880`02db1000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02c8e000 fffff880`02cd3000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`00e2e000 fffff880`00e3f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04068000 fffff880`04074000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a55000 fffff800`03032000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01216000 fffff880`013b9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`018b9000 fffff880`018c2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0459b000 fffff880`045ec380   nvmf6264 nvmf6264.sys Thu Apr 30 15:45:59 2009 (49F9FFF7)
    fffff880`010e6000 fffff880`01111000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
    fffff880`01173000 fffff880`011b2000   nvstor64 nvstor64.sys Tue Jun 30 20:21:51 2009 (4A4AAC1F)
    fffff880`0388d000 fffff880`038e0000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02d66000 fffff880`02d8c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`041ca000 fffff880`041e7000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00fa8000 fffff880`00fbd000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f68000 fffff880`00f9b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fd2000 fffff880`00fd9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fd9000 fffff880`00fe9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`014f0000 fffff880`01501000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05e7f000 fffff880`05f25000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05a00000 fffff880`05a3d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c83000 fffff880`00c97000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`053a2000 fffff880`053c6000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`053d2000 fffff880`053ed000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0513c000 fffff880`0515d000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0515d000 fffff880`05177000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04017000 fffff880`04068000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`053ed000 fffff880`053f8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`0146e000 fffff880`01477000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`08796000 fffff880`087c4000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
    fffff880`011e7000 fffff880`011f0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`011f0000 fffff880`011f9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`08600000 fffff880`08638000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
    fffff880`01982000 fffff880`019bc000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`038f3000 fffff880`0390b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`08790000 fffff880`08796000   RTCore64 RTCore64.sys Wed May 25 02:39:12 2005 (42941D90)
    fffff880`05f25000 fffff880`05f30000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`041e7000 fffff880`041f3000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02db1000 fffff880`02dce000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01978000 fffff880`01982000   speedfan speedfan.sys Sat Dec 18 06:03:51 2010 (4D0C9517)
    fffff880`01970000 fffff880`01978000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05f6f000 fffff880`05fe0000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`086fb000 fffff880`08790000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
    fffff880`08694000 fffff880`086fb000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
    fffff880`05f30000 fffff880`05f5d000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
    fffff880`01111000 fffff880`01173000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`0523e000 fffff880`0523f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`05f5d000 fffff880`05f6f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`00c5c000 fffff880`00c69000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`087c4000 fffff880`087cf000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
    fffff880`00ddf000 fffff880`00dfd000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02de9000 fffff880`02dfd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`087cf000 fffff880`087de000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
    fffff880`0418f000 fffff880`041b5000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`051dd000 fffff880`051ef000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0425c000 fffff880`04279000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05a43000 fffff880`05a44f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04340000 fffff880`04351000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`0439f000 fffff880`043f9000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`041f3000 fffff880`041fe000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`042ea000 fffff880`04340000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00f9b000 fffff880`00fa8000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01460000 fffff880`0146e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`05a54000 fffff880`05bfe000   viahduaa viahduaa.sys Wed Nov 25 08:06:00 2009 (4B0D2BB8)
    fffff880`010be000 fffff880`010e3000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01914000 fffff880`01924000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fbd000 fffff880`00fd2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01924000 fffff880`01970000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0456a000 fffff880`04577000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02d8c000 fffff880`02da2000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02dce000 fffff880`02de9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01200000 fffff880`01210000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e4b000 fffff880`00eef000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eef000 fffff880`00efe000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d5d000 fffff880`02d66000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
    fffff880`00f55000 fffff880`00f5e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01896000 fffff880`018b7000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`08638000 fffff880`0864a100   xusb21   xusb21.sys   Thu Aug 13 18:10:17 2009 (4A848F49)
    
    Unloaded modules:
    fffff880`01896000 fffff880`018a4000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018a4000 fffff880`018b0000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018b0000 fffff880`018b9000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`019d7000 fffff880`019ea000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    Ok cpuz images attached along with rammon txt file

    msi afterburner uninstalled ( although i use for the graphics card temp monitor in game)

    Avg uninstalled (now im not protected )

    Just updated all my drivers ( the ones that was out of date) except i couldnt find a driver for the via hd audio driver ( i dont actually know what that driver as i dont have anything from Via)


    View attachment RAMMon - SPD Info.txt
    Untitled2.
    Untitled.

    thanks for reply.

    Adam.
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Yes, wrong clocks indeed:

    1) Memory, currently running at 1066Mhz, rated 1333 Mhz 9-9-9-24 1.5V - set it this way.

    2) CPU, enable AMD Cool and Quiet.

    ~~~~~~~~~~~~~

    Good. No overclocking for now.





    I gave you the link to MSE, right?






    ----> C:\Windows\system32\drivers\viahduaa.sys Wed Nov 25 08:06:00 2009

    Then what is this driver doing in your system?

    VIA Drivers Download - VIA Technologies, Inc.
     
  5. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    Not sure what the via hd driver is doing there o0 and wow didnt know my ram timers was off sorry to sound like this but i have no clue how to change the timers can you point me in the right direction to set it right.

    Thanks for reply.

    Will download mse now

    Do i really need cool n quiet my cpu only hits 42 c max load and its quiet enough.

    Thanks.

    Adam.
     
  6. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. Set the memory to its rates. How? In the bios, usually ADVANCED DRAM CONFIGURATION in the bios setup program.
    Setup defaults can do this job for you.


    2. Cool and Quiet is recommended ESPECIALLY if you're sufferring from BSOD's.
     
  7. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0

    ok umm i went to bios saw under memory that everything was set to auto so i didnt change anything but i pressed f9 to load defualt bios settings didnt see anything change though. i also enabled the cool n quiet


    Thanks


    Adam.

    what should i do from here.
     
  8. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    Re-attach CPU-Z MEMORY & CPU snips.
     
  9. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    o sorry double post
     
    #9 adam380, Apr 25, 2011
    Last edited: Apr 25, 2011
  10. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
  11. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    I didn't ask for Rammon.
    CPU is Ok now.
    Attach CPU-Z
    M E M O R Y tab.
     
  12. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    Untitled.

    there both on that pic look in pain and on the desktop 1 is cpu 1 is memory

    Edit sorry didnt notice paint was blank -_-


    thanks.



    Adam.
     
    #12 adam380, Apr 25, 2011
    Last edited: Apr 25, 2011
  13. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    [​IMG]




















    Where's the MEMORY tab, huh ?
     
  14. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    [​IMG]

    there both on that pic look in pain and on the desktop 1 is cpu 1 is memory

    Edit sorry didnt notice paint was blank -_-


    thanks.
     
  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Spot on, that's what I meant. : )


    Your system will crash again because RAM is wrong again - 1333 9-12-12-30.
    Set it to 1333 9-9-9-24.
     
  16. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0





    Hi sorry for slow reply i set the timers to 9 9 9 24 manually How ever after doing so i got 2 blue screens pretty much 2 mins after i get to desktop

    View attachment 042511-44265-01.rar
    theres the new bsods 1 was memory management 1 didnt show the error

    hope they help

    ( i set the timers back to auto for now so i wouldnt bsod)


    Thanks


    Adam
     
  17. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    MEMORY_MANAGEMENT (1a)
    BugCheck 1000007E, {ffffffffc0000005,


    Ok, Adam, leave it on Auto then. Thanks for updating.
     
  18. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    Hi i changed it from 9-12-12-30 to 9-12 12 24 duno if it will make a difference but do you think my ram could be corrupt should i buy different ram ?

    thanks for help.


    Adam.
     
  19. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    First of all it needs to be set right as recommended by the manufacturer. RAMMon identifies it as 1333 9 9 9 24, but it's a good idea to verify these rates at the maker's official web page.

    You can run 10 passes of Memtest86+ - Advanced Memory Diagnostic Tool.
     
  20. adam380

    adam380 New Member

    Joined:
    Apr 25, 2011
    Messages:
    24
    Likes Received:
    0
    Alright ill do a memtest over night and will update thread tommorow ill try setting the timers to 9-9-9-24 again hopefully it will sort its self out if it doesnt i think ill buy new ram.

    Thanks


    Adam.
     

Share This Page

Loading...