Random bsod and random ie9 problems

#1
hi forum,
i have random bsod that just happen from time to time not doing the same thing on the pc they just happen my wife used photo shop for over 4 hours not a single problem but we left the pc on over night and we woke to a blue screen of death i need some help on this.
ie9 randomley tells us that it has encournted a problem a needs to close i dont know if this is related to the bsod or not please help me out. it feels like a ram problem being so random and all ill leave it to the expets oh also i installed rammon but when i try to launch it i get an error saying directIO.sys error
Thank You.
 


Attachments

Last edited:

Venom

New Member
#2
As far as the IE9 problem your probably using IE 32 bit in a 64 bit OS.
Delete the 32-bit and attach the 64-bit version of IE "Internext Explorer (64 bit)" [something like that] top the taskbar/desktop instead of the other(32bit/the one that doesn't say (64 bit)).

And the BSOD is from the memory, I have seen so many problems with memory that needs to be overclocked to work. and I have those same type of modules and haven't found a solution yet except that the P43 chipset doesn't like it.
 


Last edited:
#3
Hi just a quick updat i ran memtest and after doing its thing for 40min it comes back with a unexpected interrupt halting cpu0 does that mean the ram is bad? thanks for your help
 


#4
Re: Random bsod and random ie9 problems


1. command prompt -> chkdsk /f

2. Uninstall Avast

3. Install MSE



If the blue screens re-occur, run 10 passes of Memtest86+ - Advanced Memory Diagnostic Tool



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-30654-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
Debug session time: Tue Mar 29 06:01:38.479 2011 (UTC - 4:00)
System Uptime: 0 days 7:56:14.212
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {c08a5, 0, 0, 0}

Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000000c08a5
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x24

PROCESS_NAME:  AvastUI.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880099e5930 -- (.trap 0xfffff880099e5930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000003804000
rdx=0000000003801000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000317ebc2 rsp=fffff880099e5ac0 rbp=fffff880099e5ca0
 r8=fffffa8008745760  r9=0000000000013f0a r10=fffffa8006a0e7b0
r11=0000000000120089 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!NtReadFile+0x142:
fffff800`0317ebc2 0fb602          movzx   eax,byte ptr [rdx] ds:00000000`03801000=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8800120d1d5 to fffff80002e95640

STACK_TEXT:  
fffff880`099e53c8 fffff880`0120d1d5 : 00000000`00000024 00000000`000c08a5 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`099e53d0 fffff880`0120ce28 : 00000001`00000000 00000000`00000000 00000000`00000000 00000008`00000000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`099e54d0 fffff880`00e02bcf : fffffa80`0b748fb0 fffffa80`0b748c10 fffffa80`0ba56c30 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x8ba9
fffff880`099e5580 fffff880`00e016df : fffffa80`0799d8e0 fffffa80`06bba801 fffffa80`0799d800 fffffa80`0b748c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`099e5610 fffff800`02ebd635 : fffffa80`0b748c30 fffffa80`08760f20 fffffa80`06bdd890 fffff880`02f64180 : fltmgr!FltpDispatch+0xcf
fffff880`099e5670 fffff800`02ebd109 : 00000000`00000000 00000000`00000000 fffffa80`06bdd7d0 fffffa80`06bdd7d0 : nt!IoPageRead+0x255
fffff880`099e5700 fffff800`02ea3a8a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`0001c000 : nt!MiIssueHardFault+0x255
fffff880`099e57d0 fffff800`02e9376e : 00000000`00000000 00000000`03801000 fffffa80`06efbb00 fffffa80`0b71d380 : nt!MmAccessFault+0x146a
fffff880`099e5930 fffff800`0317ebc2 : fffffa80`0b71d300 fffffa80`00000001 fffffa80`06a0e7b0 00000000`00014001 : nt!KiPageFault+0x16e
fffff880`099e5ac0 fffff800`02e948d3 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x142
fffff880`099e5bb0 00000000`74892e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0238f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74892e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsPagingFileIo+155
fffff880`0120d1d5 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsPagingFileIo+155

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032611-29702-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c66000 PsLoadedModuleList = 0xfffff800`02ea3e50
Debug session time: Sat Mar 26 22:02:20.835 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:32.614
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {c08a2, 0, 0, 0}

Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000000c08a2
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x24

PROCESS_NAME:  dllhost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff88001250e95 to fffff80002cd6740

STACK_TEXT:  
fffff880`093fc6b8 fffff880`01250e95 : 00000000`00000024 00000000`000c08a2 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`093fc6c0 fffff880`01250ae8 : 00000001`00000000 00000000`00000000 00000000`00000000 00000008`00000000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`093fc7c0 fffff880`0106323f : fffffa80`08a03830 fffffa80`08a03490 fffffa80`08801c30 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x9e89
fffff880`093fc870 fffff880`010616df : fffffa80`07911c50 fffffa80`08a03490 fffffa80`07911c00 fffffa80`08a03490 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`093fc900 fffff800`02cc81f2 : fffffa80`08a034b0 fffffa80`095be580 00000000`00000043 fffff680`00001f48 : fltmgr!FltpDispatch+0xcf
fffff880`093fc960 fffff800`02cc84f5 : 00000000`00000001 00000000`00000001 fffff880`093fca60 00000000`00000000 : nt!IoPageRead+0x252
fffff880`093fc9f0 fffff800`02cf18bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`00017e18 : nt!MiIssueHardFault+0x255
fffff880`093fcac0 fffff800`02cd482e : 00000000`00000001 00000000`025b7510 00000000`0225c101 00000000`00000001 : nt!MmAccessFault+0x14bb
fffff880`093fcc20 000007fe`f691e9d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0225c0e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f691e9d4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsPagingFileIo+155
fffff880`01250e95 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsPagingFileIo+155

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032611-38594-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
Debug session time: Sat Mar 26 22:43:32.566 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:43.345
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031bcd6a, fffff88006b4bf70, 0}

Probably caused by : ntkrnlmp.exe ( nt!FsRtlOplockIsFastIoPossible+a )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031bcd6a, Address of the instruction which caused the bugcheck
Arg3: fffff88006b4bf70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!FsRtlOplockIsFastIoPossible+a
fffff800`031bcd6a f6426840        test    byte ptr [rdx+68h],40h

CONTEXT:  fffff88006b4bf70 -- (.cxr 0xfffff88006b4bf70)
rax=fffffa8007de8b01 rbx=fffffa8007be5f00 rcx=fffff8a009f731c8
rdx=0080000000000000 rsi=fffff8a009f73010 rdi=fffff88006b4cb58
rip=fffff800031bcd6a rsp=fffff88006b4c948 rbp=fffff88006b4cb30
 r8=fffffa8009305c80  r9=fffffa8007e0cb30 r10=fffffa8009305b10
r11=fffff880068d7834 r12=fffffa8007be5f20 r13=fffffa8007e0cb30
r14=fffffa8007e0cb30 r15=fffff88006b4cb38
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!FsRtlOplockIsFastIoPossible+0xa:
fffff800`031bcd6a f6426840        test    byte ptr [rdx+68h],40h ds:002b:00800000`00000068=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Setup.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031bcd6a

STACK_TEXT:  
fffff880`06b4c948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlOplockIsFastIoPossible+0xa


FOLLOWUP_IP: 
nt!FsRtlOplockIsFastIoPossible+a
fffff800`031bcd6a f6426840        test    byte ptr [rdx+68h],40h

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!FsRtlOplockIsFastIoPossible+a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff88006b4bf70 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!FsRtlOplockIsFastIoPossible+a

BUCKET_ID:  X64_0x3B_nt!FsRtlOplockIsFastIoPossible+a

Followup: MachineOwner
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032911-21465-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1e000 PsLoadedModuleList = 0xfffff800`03063e90
Debug session time: Tue Mar 29 22:11:23.047 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:21.639
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5002, fffff70001080000, 11e8, 8011f5fffffffe}

Probably caused by : win32k.sys ( win32k!vAlphaPerPixelOnly+26 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000011e8
Arg4: 008011f5fffffffe

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5002

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  iexplore.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880089d68d0 -- (.trap 0xfffff880089d68d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffff900c20d19c0
rdx=00000000037bb788 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960000698f6 rsp=fffff880089d6a68 rbp=fffff880089d6c6c
 r8=00000000000000ac  r9=0000000001ff0000 r10=fffff900c20d19c0
r11=00000000000000ac r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
win32k!vAlphaPerPixelOnly+0x26:
fffff960`000698f6 8b03            mov     eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e31fe7 to fffff80002e9e640

STACK_TEXT:  
fffff880`089d6768 fffff800`02e31fe7 : 00000000`0000001a 00000000`00005002 fffff700`01080000 00000000`000011e8 : nt!KeBugCheckEx
fffff880`089d6770 fffff800`02e9c76e : 00000000`00000000 00000000`037bb788 fffff900`c204e800 00000000`037bb788 : nt! ?? ::FNODOBFM::`string'+0x46ff8
fffff880`089d68d0 fffff960`000698f6 : fffff960`00076387 00000000`00000000 fffff900`c20d19c0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`089d6a68 fffff960`00076387 : 00000000`00000000 fffff900`c20d19c0 00000000`00000000 00000000`00000000 : win32k!vAlphaPerPixelOnly+0x26
fffff880`089d6a70 fffff960`00075f74 : fffff900`c220f2b0 00000000`000000ac 00000000`00001e00 00000000`000000e2 : win32k!AlphaScanLineBlend+0x303
fffff880`089d6b30 fffff960`001ef757 : fffff900`000000e2 00000000`00000004 fffff900`00000000 fffff900`c0712ab0 : win32k!EngAlphaBlend+0x4dc
fffff880`089d6df0 fffff800`02e9d8d3 : ffffffff`da010af7 00000000`000000e2 00000000`00000004 fffff900`000000ac : win32k!NtGdiAlphaBlend+0x15ff
fffff880`089d71f0 00000000`74c3038a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000bb458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74c3038a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!vAlphaPerPixelOnly+26
fffff960`000698f6 8b03            mov     eax,dword ptr [rbx]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!vAlphaPerPixelOnly+26

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d2415ea

FAILURE_BUCKET_ID:  X64_0x1a_5002_win32k!vAlphaPerPixelOnly+26

BUCKET_ID:  X64_0x1a_5002_win32k!vAlphaPerPixelOnly+26

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00f4f000 fffff880`00fa6000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`040e3000 fffff880`0416c000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`051e8000 fffff880`051fe000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0760c000 fffff880`07721000   am10w7   am10w7.sys   Fri Jan 15 03:15:48 2010 (4B502434)
fffff880`0428d000 fffff880`042a1000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`0431f000 fffff880`04334000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00dbf000 fffff880`00dca000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`06886000 fffff880`0688f000   aswFsBlk aswFsBlk.SYS Wed Feb 23 09:54:56 2011 (4D651FC0)
fffff880`0684c000 fffff880`06886000   aswMonFlt aswMonFlt.sys Wed Feb 23 09:55:04 2011 (4D651FC8)
fffff880`0416c000 fffff880`04176000   aswRdr   aswRdr.SYS   Wed Feb 23 09:55:11 2011 (4D651FCF)
fffff880`01147000 fffff880`011c7000   aswSnx   aswSnx.SYS   Wed Feb 23 09:56:59 2011 (4D65203B)
fffff880`042ae000 fffff880`042f9000   aswSP    aswSP.SYS    Wed Feb 23 09:57:02 2011 (4D65203E)
fffff880`0121b000 fffff880`0122b000   aswTdi   aswTdi.SYS   Wed Feb 23 09:55:51 2011 (4D651FF7)
fffff880`077a9000 fffff880`077b4000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d95000 fffff880`00dbf000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`04887000 fffff880`05183000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`04334000 fffff880`04382000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`01669000 fffff880`01670000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`040d2000 fffff880`040e3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`055ba000 fffff880`055d8000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`01636000 fffff880`01660000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cab000 fffff880`00d6b000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`019d0000 fffff880`01a00000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c4d000 fffff880`00cab000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010d5000 fffff880`01147000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`0486a000 fffff880`0487a000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`06b5a000 fffff880`06b68000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`00dca000 fffff880`00de8000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`040c3000 fffff880`040d2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019ba000 fffff880`019d0000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03f6b000 fffff880`03f8d000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06b74000 fffff880`06b7d000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06b68000 fffff880`06b74000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06b7d000 fffff880`06b90000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06b90000 fffff880`06b9c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0442c000 fffff880`04520000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04520000 fffff880`04566000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`03e18000 fffff880`03e4e000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01056000 fffff880`0106a000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0100a000 fffff880`01056000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01980000 fffff880`019ba000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`0188d000 fffff880`018d7000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`045bd000 fffff880`045ca000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03408000 fffff800`03451000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04566000 fffff880`0458a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`06bc7000 fffff880`06be0000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06be0000 fffff880`06be8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06bb9000 fffff880`06bc7000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`054f1000 fffff880`055ba000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01977000 fffff880`01980000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04400000 fffff880`0441e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`051d9000 fffff880`051e8000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0424a000 fffff880`0428d000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013d9000 fffff880`013f4000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`015bf000 fffff880`015ea000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`03f8d000 fffff880`03f92200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`068b0000 fffff880`068c5000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06829000 fffff880`0684c000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c2c000 fffff880`00c39000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`0681b000 fffff880`06829000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0423b000 fffff880`0424a000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06be9000 fffff880`06bf6000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d7b000 fffff880`00d95000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`055d8000 fffff880`055f0000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05400000 fffff880`0542d000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`0542d000 fffff880`0547a000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`0547a000 fffff880`0549e000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`01447000 fffff880`01452000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00faf000 fffff880`00fb9000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01077000 fffff880`010d5000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`040b8000 fffff880`040c3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01965000 fffff880`01977000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0146c000 fffff880`0155f000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`0441e000 fffff880`0442a000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03fe6000 fffff880`03ff9000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`043a6000 fffff880`043d5000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`03ed1000 fffff880`03ee6000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`04000000 fffff880`0400f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04176000 fffff880`041bb000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`0155f000 fffff880`015bf000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`01452000 fffff880`01463000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`040ac000 fffff880`040b8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e1e000 fffff800`03408000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01236000 fffff880`013d9000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01660000 fffff880`01669000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`00c00000 fffff880`00c19000   nusb3hub nusb3hub.sys Thu Dec 09 23:50:35 2010 (4D01B19B)
fffff880`0458a000 fffff880`045bb000   nusb3xhc nusb3xhc.sys Thu Dec 09 23:50:35 2010 (4D01B19B)
fffff880`03f93000 fffff880`03fe6000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`041c4000 fffff880`041ea000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00fb9000 fffff880`00fec000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00e86000 fffff880`00e8d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d6b000 fffff880`00d7b000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06ea7000 fffff880`06f4d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`03f2e000 fffff880`03f6b000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c39000 fffff880`00c4d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0106a000 fffff880`01076040   PxHlpa64 PxHlpa64.sys Tue Oct 20 14:08:42 2009 (4ADDFCAA)
fffff880`04382000 fffff880`043a6000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`043d5000 fffff880`043f0000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04200000 fffff880`04221000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04221000 fffff880`0423b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0405b000 fffff880`040ac000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`0167e000 fffff880`01687000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01435000 fffff880`0143e000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0143e000 fffff880`01447000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0192b000 fffff880`01965000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`03e00000 fffff880`03e18000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`0486a000   Rt64win7 Rt64win7.sys Wed Feb 16 04:03:57 2011 (4D5B92FD)
fffff880`03ee6000 fffff880`03f2dc00   RtHDMIVX RtHDMIVX.sys Tue Nov 23 05:27:12 2010 (4CEB9700)
fffff880`068ca000 fffff880`06b59280   RTKVHD64 RTKVHD64.sys Wed Dec 29 22:52:42 2010 (4D1C020A)
fffff880`06f4d000 fffff880`06f58000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`045e6000 fffff880`045f2000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0400f000 fffff880`0402c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01923000 fffff880`0192b000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07237000 fffff880`072d0000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`06e00000 fffff880`06e6b000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`06f58000 fffff880`06f89000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`0442a000 fffff880`0442b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01689000 fffff880`0188d000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`06f89000 fffff880`06f9b000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`015ea000 fffff880`015f7000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`011c7000 fffff880`011e9000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`04047000 fffff880`0405b000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00540000 fffff960`0054a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`042f9000 fffff880`0431f000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`011e9000 fffff880`011fb000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0772e000 fffff880`07738000   umpass   umpass.sys   Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff880`06b9c000 fffff880`06bb9000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`045bb000 fffff880`045bcf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`045d5000 fffff880`045e6000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e77000 fffff880`03ed1000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`045ca000 fffff880`045d5000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05183000 fffff880`051d9000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06800000 fffff880`0681b000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
fffff880`00fec000 fffff880`00ff9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01670000 fffff880`0167e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01400000 fffff880`01425000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018d7000 fffff880`01923000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`07721000 fffff880`0772e000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`041ea000 fffff880`04200000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0402c000 fffff880`04047000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01425000 fffff880`01435000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e9c000 fffff880`00f40000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f40000 fffff880`00f4f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`041bb000 fffff880`041c4000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00371000   win32k   win32k.sys   Wed Jan 05 01:55:38 2011 (4D2415EA)
fffff880`00fa6000 fffff880`00faf000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0688f000 fffff880`068b0000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`072d0000 fffff880`07301000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)

Unloaded modules:
fffff880`077b4000 fffff880`077bd000   cpuz135_x64.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`07738000 fffff880`077a9000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`0549e000 fffff880`054a7000   cpuz135_x64.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01600000 fffff880`0160e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0160e000 fffff880`0161a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0161a000 fffff880`01623000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01623000 fffff880`01636000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


Last edited:
#5
Hi I done as you suggested and I got another blue screen I ran memtest and got an error that said unexpected interrupt halting cpu0 what does than mean thanks for your help.
 


#6
That could mean wrong hardware settings or faulty hardware. Attach the following info:

1. Screenshot of CPU-Z MEMORY tab

2. Screenshot of CPU-Z CPU tab

3. RAMMon HTML report (zip it so you can attach)
 


#7
Ok I'll do that when I get home from work as for rammon I downloaded that last night and when I try to run it I got a directIO.sys error as for the memory tab that will be in my first post
 


#8
Attach the new memory and CPU tab snapshots as you have them now.
 


#9
ok I'll do that as soon as I get home from work I only just built this system never had a problem like this before.
 


#10
Humor me while I'm working just say it is faulty hardware how hard will it be to pin point the culprit thinking of going home to sort this out lol.
 


#11
I got another blue screen I ran memtest and got an error that said unexpected interrupt halting cpu0 what does than mean
"Faulty" does not automatically mean "old".
 


Venom

New Member
#13
I'm assuming your IE9 problem is fixed then?
 


#15
The problem is that roonidog's blue screens occur not only at the time of running IE:

Code:
BugCheck 24, {c08a5, 0, 0, 0}
PROCESS_NAME:  AvastUI.exe
Stack:
nt!NtReadFile
nt!KiPageFault
nt!MmAccessFault
nt!MiIssueHardFault
nt!IoPageRead
Ntfs!NtfsPagingFileIo
Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )


Re: Random bsod and random ie9 problems


1. command prompt -> chkdsk /f

2. Uninstall Avast

3. Install MSE



If the blue screens re-occur, run 10 passes of Memtest86+ - Advanced Memory Diagnostic Tool

Hi I done as you suggested and I got another blue screen I ran memtest and got an error that said unexpected interrupt halting cpu0 what does than mean thanks for your help.

In this case, attach the most recent crash dumps from C:\Windows\Minidump.


~~~~~~~

From what I see in your screenshots, you have 2 matching CMX8GX3M2A1333C9 sticks that are set right 1333Mhz 9 9 9 24.
Your CPU frequency is 3200, should be 800Mhz at idle, perhaps this is where your blue screens come from ?

Hi I done as you suggested and I got another blue screen I ran memtest and got an error that said unexpected interrupt halting cpu0 what does than mean thanks for your help.
 


#16
That's because I turned off and cool and quiet so it won't drop the CPU to 800mhz I'll attach the latest dumpfile later today what could be causing these issues.
And when I try to run memtest it throws the same error as the one I posted earlier could it be a motherboard fault.
 


Last edited:
#17
Hi I done as you suggested and I got another blue screen I ran memtest and got an error that said unexpected interrupt halting cpu0 what does than mean thanks for your help.
And when I try to run memtest it throws the same error as the one I posted earlier could it be a motherboard fault.
The error can pop up due to faulty ram, motherboard slot, or CPU.
You may want to test sticks one by one and in different slots.



That's because I turned off and cool and quiet
Turn it on for now.
 


#18
Ok I'll test each stick in different slots after I finish work if I get the same error memtest has been giving me when I try to test both sticks together what does that suggest.
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.