Random bsod and random ie9 problems

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by roonidog, Mar 29, 2011.

  1. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    hi forum,
    i have random bsod that just happen from time to time not doing the same thing on the pc they just happen my wife used photo shop for over 4 hours not a single problem but we left the pc on over night and we woke to a blue screen of death i need some help on this.
    ie9 randomley tells us that it has encournted a problem a needs to close i dont know if this is related to the bsod or not please help me out. it feels like a ram problem being so random and all ill leave it to the expets oh also i installed rammon but when i try to launch it i get an error saying directIO.sys error
    Thank You.
     

    Attached Files:

    #1 roonidog, Mar 29, 2011
    Last edited: Mar 29, 2011
  2. Venom

    Venom New Member

    Joined:
    Mar 12, 2011
    Messages:
    14
    Likes Received:
    0
    As far as the IE9 problem your probably using IE 32 bit in a 64 bit OS.
    Delete the 32-bit and attach the 64-bit version of IE "Internext Explorer (64 bit)" [something like that] top the taskbar/desktop instead of the other(32bit/the one that doesn't say (64 bit)).

    And the BSOD is from the memory, I have seen so many problems with memory that needs to be overclocked to work. and I have those same type of modules and haven't found a solution yet except that the P43 chipset doesn't like it.
     
    #2 Venom, Mar 29, 2011
    Last edited: Mar 29, 2011
  3. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    Hi just a quick updat i ran memtest and after doing its thing for 40min it comes back with a unexpected interrupt halting cpu0 does that mean the ram is bad? thanks for your help
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Re: Random bsod and random ie9 problems


    1. command prompt -> chkdsk /f

    2. Uninstall Avast

    3. Install MSE



    If the blue screens re-occur, run 10 passes of Memtest86+ - Advanced Memory Diagnostic Tool



    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032911-30654-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
    Debug session time: Tue Mar 29 06:01:38.479 2011 (UTC - 4:00)
    System Uptime: 0 days 7:56:14.212
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {c08a5, 0, 0, 0}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000000c08a5
    Arg2: 0000000000000000
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x24
    
    PROCESS_NAME:  AvastUI.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880099e5930 -- (.trap 0xfffff880099e5930)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000003804000
    rdx=0000000003801000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000317ebc2 rsp=fffff880099e5ac0 rbp=fffff880099e5ca0
     r8=fffffa8008745760  r9=0000000000013f0a r10=fffffa8006a0e7b0
    r11=0000000000120089 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    nt!NtReadFile+0x142:
    fffff800`0317ebc2 0fb602          movzx   eax,byte ptr [rdx] ds:00000000`03801000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8800120d1d5 to fffff80002e95640
    
    STACK_TEXT:  
    fffff880`099e53c8 fffff880`0120d1d5 : 00000000`00000024 00000000`000c08a5 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    fffff880`099e53d0 fffff880`0120ce28 : 00000001`00000000 00000000`00000000 00000000`00000000 00000008`00000000 : Ntfs!NtfsPagingFileIo+0x155
    fffff880`099e54d0 fffff880`00e02bcf : fffffa80`0b748fb0 fffffa80`0b748c10 fffffa80`0ba56c30 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x8ba9
    fffff880`099e5580 fffff880`00e016df : fffffa80`0799d8e0 fffffa80`06bba801 fffffa80`0799d800 fffffa80`0b748c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`099e5610 fffff800`02ebd635 : fffffa80`0b748c30 fffffa80`08760f20 fffffa80`06bdd890 fffff880`02f64180 : fltmgr!FltpDispatch+0xcf
    fffff880`099e5670 fffff800`02ebd109 : 00000000`00000000 00000000`00000000 fffffa80`06bdd7d0 fffffa80`06bdd7d0 : nt!IoPageRead+0x255
    fffff880`099e5700 fffff800`02ea3a8a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`0001c000 : nt!MiIssueHardFault+0x255
    fffff880`099e57d0 fffff800`02e9376e : 00000000`00000000 00000000`03801000 fffffa80`06efbb00 fffffa80`0b71d380 : nt!MmAccessFault+0x146a
    fffff880`099e5930 fffff800`0317ebc2 : fffffa80`0b71d300 fffffa80`00000001 fffffa80`06a0e7b0 00000000`00014001 : nt!KiPageFault+0x16e
    fffff880`099e5ac0 fffff800`02e948d3 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x142
    fffff880`099e5bb0 00000000`74892e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0238f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74892e09
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Ntfs!NtfsPagingFileIo+155
    fffff880`0120d1d5 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  Ntfs!NtfsPagingFileIo+155
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032611-29702-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02c66000 PsLoadedModuleList = 0xfffff800`02ea3e50
    Debug session time: Sat Mar 26 22:02:20.835 2011 (UTC - 4:00)
    System Uptime: 0 days 0:04:32.614
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {c08a2, 0, 0, 0}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000000c08a2
    Arg2: 0000000000000000
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x24
    
    PROCESS_NAME:  dllhost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff88001250e95 to fffff80002cd6740
    
    STACK_TEXT:  
    fffff880`093fc6b8 fffff880`01250e95 : 00000000`00000024 00000000`000c08a2 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    fffff880`093fc6c0 fffff880`01250ae8 : 00000001`00000000 00000000`00000000 00000000`00000000 00000008`00000000 : Ntfs!NtfsPagingFileIo+0x155
    fffff880`093fc7c0 fffff880`0106323f : fffffa80`08a03830 fffffa80`08a03490 fffffa80`08801c30 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x9e89
    fffff880`093fc870 fffff880`010616df : fffffa80`07911c50 fffffa80`08a03490 fffffa80`07911c00 fffffa80`08a03490 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`093fc900 fffff800`02cc81f2 : fffffa80`08a034b0 fffffa80`095be580 00000000`00000043 fffff680`00001f48 : fltmgr!FltpDispatch+0xcf
    fffff880`093fc960 fffff800`02cc84f5 : 00000000`00000001 00000000`00000001 fffff880`093fca60 00000000`00000000 : nt!IoPageRead+0x252
    fffff880`093fc9f0 fffff800`02cf18bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`00017e18 : nt!MiIssueHardFault+0x255
    fffff880`093fcac0 fffff800`02cd482e : 00000000`00000001 00000000`025b7510 00000000`0225c101 00000000`00000001 : nt!MmAccessFault+0x14bb
    fffff880`093fcc20 000007fe`f691e9d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`0225c0e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f691e9d4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Ntfs!NtfsPagingFileIo+155
    fffff880`01250e95 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  Ntfs!NtfsPagingFileIo+155
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsPagingFileIo+155
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032611-38594-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
    Debug session time: Sat Mar 26 22:43:32.566 2011 (UTC - 4:00)
    System Uptime: 0 days 0:07:43.345
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff800031bcd6a, fffff88006b4bf70, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!FsRtlOplockIsFastIoPossible+a )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800031bcd6a, Address of the instruction which caused the bugcheck
    Arg3: fffff88006b4bf70, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!FsRtlOplockIsFastIoPossible+a
    fffff800`031bcd6a f6426840        test    byte ptr [rdx+68h],40h
    
    CONTEXT:  fffff88006b4bf70 -- (.cxr 0xfffff88006b4bf70)
    rax=fffffa8007de8b01 rbx=fffffa8007be5f00 rcx=fffff8a009f731c8
    rdx=0080000000000000 rsi=fffff8a009f73010 rdi=fffff88006b4cb58
    rip=fffff800031bcd6a rsp=fffff88006b4c948 rbp=fffff88006b4cb30
     r8=fffffa8009305c80  r9=fffffa8007e0cb30 r10=fffffa8009305b10
    r11=fffff880068d7834 r12=fffffa8007be5f20 r13=fffffa8007e0cb30
    r14=fffffa8007e0cb30 r15=fffff88006b4cb38
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    nt!FsRtlOplockIsFastIoPossible+0xa:
    fffff800`031bcd6a f6426840        test    byte ptr [rdx+68h],40h ds:002b:00800000`00000068=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  Setup.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031bcd6a
    
    STACK_TEXT:  
    fffff880`06b4c948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlOplockIsFastIoPossible+0xa
    
    
    FOLLOWUP_IP: 
    nt!FsRtlOplockIsFastIoPossible+a
    fffff800`031bcd6a f6426840        test    byte ptr [rdx+68h],40h
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!FsRtlOplockIsFastIoPossible+a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    STACK_COMMAND:  .cxr 0xfffff88006b4bf70 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!FsRtlOplockIsFastIoPossible+a
    
    BUCKET_ID:  X64_0x3B_nt!FsRtlOplockIsFastIoPossible+a
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032911-21465-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e1e000 PsLoadedModuleList = 0xfffff800`03063e90
    Debug session time: Tue Mar 29 22:11:23.047 2011 (UTC - 4:00)
    System Uptime: 0 days 0:42:21.639
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {5002, fffff70001080000, 11e8, 8011f5fffffffe}
    
    Probably caused by : win32k.sys ( win32k!vAlphaPerPixelOnly+26 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000005002, The subtype of the bugcheck.
    Arg2: fffff70001080000
    Arg3: 00000000000011e8
    Arg4: 008011f5fffffffe
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_5002
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  iexplore.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880089d68d0 -- (.trap 0xfffff880089d68d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000000f rbx=0000000000000000 rcx=fffff900c20d19c0
    rdx=00000000037bb788 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff960000698f6 rsp=fffff880089d6a68 rbp=fffff880089d6c6c
     r8=00000000000000ac  r9=0000000001ff0000 r10=fffff900c20d19c0
    r11=00000000000000ac r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    win32k!vAlphaPerPixelOnly+0x26:
    fffff960`000698f6 8b03            mov     eax,dword ptr [rbx] ds:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e31fe7 to fffff80002e9e640
    
    STACK_TEXT:  
    fffff880`089d6768 fffff800`02e31fe7 : 00000000`0000001a 00000000`00005002 fffff700`01080000 00000000`000011e8 : nt!KeBugCheckEx
    fffff880`089d6770 fffff800`02e9c76e : 00000000`00000000 00000000`037bb788 fffff900`c204e800 00000000`037bb788 : nt! ?? ::FNODOBFM::`string'+0x46ff8
    fffff880`089d68d0 fffff960`000698f6 : fffff960`00076387 00000000`00000000 fffff900`c20d19c0 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`089d6a68 fffff960`00076387 : 00000000`00000000 fffff900`c20d19c0 00000000`00000000 00000000`00000000 : win32k!vAlphaPerPixelOnly+0x26
    fffff880`089d6a70 fffff960`00075f74 : fffff900`c220f2b0 00000000`000000ac 00000000`00001e00 00000000`000000e2 : win32k!AlphaScanLineBlend+0x303
    fffff880`089d6b30 fffff960`001ef757 : fffff900`000000e2 00000000`00000004 fffff900`00000000 fffff900`c0712ab0 : win32k!EngAlphaBlend+0x4dc
    fffff880`089d6df0 fffff800`02e9d8d3 : ffffffff`da010af7 00000000`000000e2 00000000`00000004 fffff900`000000ac : win32k!NtGdiAlphaBlend+0x15ff
    fffff880`089d71f0 00000000`74c3038a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`000bb458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74c3038a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!vAlphaPerPixelOnly+26
    fffff960`000698f6 8b03            mov     eax,dword ptr [rbx]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  win32k!vAlphaPerPixelOnly+26
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d2415ea
    
    FAILURE_BUCKET_ID:  X64_0x1a_5002_win32k!vAlphaPerPixelOnly+26
    
    BUCKET_ID:  X64_0x1a_5002_win32k!vAlphaPerPixelOnly+26
    
    Followup: MachineOwner
    ---------
    
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00f4f000 fffff880`00fa6000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`040e3000 fffff880`0416c000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`051e8000 fffff880`051fe000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0760c000 fffff880`07721000   am10w7   am10w7.sys   Fri Jan 15 03:15:48 2010 (4B502434)
    fffff880`0428d000 fffff880`042a1000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
    fffff880`0431f000 fffff880`04334000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00dbf000 fffff880`00dca000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`06886000 fffff880`0688f000   aswFsBlk aswFsBlk.SYS Wed Feb 23 09:54:56 2011 (4D651FC0)
    fffff880`0684c000 fffff880`06886000   aswMonFlt aswMonFlt.sys Wed Feb 23 09:55:04 2011 (4D651FC8)
    fffff880`0416c000 fffff880`04176000   aswRdr   aswRdr.SYS   Wed Feb 23 09:55:11 2011 (4D651FCF)
    fffff880`01147000 fffff880`011c7000   aswSnx   aswSnx.SYS   Wed Feb 23 09:56:59 2011 (4D65203B)
    fffff880`042ae000 fffff880`042f9000   aswSP    aswSP.SYS    Wed Feb 23 09:57:02 2011 (4D65203E)
    fffff880`0121b000 fffff880`0122b000   aswTdi   aswTdi.SYS   Wed Feb 23 09:55:51 2011 (4D651FF7)
    fffff880`077a9000 fffff880`077b4000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d95000 fffff880`00dbf000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`04887000 fffff880`05183000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`04334000 fffff880`04382000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff880`01669000 fffff880`01670000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`040d2000 fffff880`040e3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`055ba000 fffff880`055d8000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`01636000 fffff880`01660000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cab000 fffff880`00d6b000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`019d0000 fffff880`01a00000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c4d000 fffff880`00cab000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010d5000 fffff880`01147000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`0486a000 fffff880`0487a000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`06b5a000 fffff880`06b68000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`00dca000 fffff880`00de8000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`040c3000 fffff880`040d2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`019ba000 fffff880`019d0000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03f6b000 fffff880`03f8d000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06b74000 fffff880`06b7d000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06b68000 fffff880`06b74000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`06b7d000 fffff880`06b90000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06b90000 fffff880`06b9c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0442c000 fffff880`04520000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`04520000 fffff880`04566000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`03e18000 fffff880`03e4e000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`01056000 fffff880`0106a000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0100a000 fffff880`01056000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01980000 fffff880`019ba000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`0188d000 fffff880`018d7000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`045bd000 fffff880`045ca000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`03408000 fffff800`03451000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`04566000 fffff880`0458a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`06bc7000 fffff880`06be0000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`06be0000 fffff880`06be8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`06bb9000 fffff880`06bc7000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`054f1000 fffff880`055ba000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`01977000 fffff880`01980000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`04400000 fffff880`0441e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`051d9000 fffff880`051e8000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`0424a000 fffff880`0428d000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`013d9000 fffff880`013f4000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`015bf000 fffff880`015ea000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`03f8d000 fffff880`03f92200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`068b0000 fffff880`068c5000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06829000 fffff880`0684c000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c2c000 fffff880`00c39000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`0681b000 fffff880`06829000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0423b000 fffff880`0424a000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06be9000 fffff880`06bf6000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d7b000 fffff880`00d95000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`055d8000 fffff880`055f0000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`05400000 fffff880`0542d000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
    fffff880`0542d000 fffff880`0547a000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
    fffff880`0547a000 fffff880`0549e000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
    fffff880`01447000 fffff880`01452000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00faf000 fffff880`00fb9000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01077000 fffff880`010d5000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`040b8000 fffff880`040c3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01965000 fffff880`01977000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0146c000 fffff880`0155f000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`0441e000 fffff880`0442a000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03fe6000 fffff880`03ff9000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`043a6000 fffff880`043d5000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`03ed1000 fffff880`03ee6000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`04000000 fffff880`0400f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04176000 fffff880`041bb000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`0155f000 fffff880`015bf000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`01452000 fffff880`01463000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`040ac000 fffff880`040b8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e1e000 fffff800`03408000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01236000 fffff880`013d9000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`01660000 fffff880`01669000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`00c00000 fffff880`00c19000   nusb3hub nusb3hub.sys Thu Dec 09 23:50:35 2010 (4D01B19B)
    fffff880`0458a000 fffff880`045bb000   nusb3xhc nusb3xhc.sys Thu Dec 09 23:50:35 2010 (4D01B19B)
    fffff880`03f93000 fffff880`03fe6000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`041c4000 fffff880`041ea000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00fb9000 fffff880`00fec000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00e86000 fffff880`00e8d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d6b000 fffff880`00d7b000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06ea7000 fffff880`06f4d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`03f2e000 fffff880`03f6b000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c39000 fffff880`00c4d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0106a000 fffff880`01076040   PxHlpa64 PxHlpa64.sys Tue Oct 20 14:08:42 2009 (4ADDFCAA)
    fffff880`04382000 fffff880`043a6000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`043d5000 fffff880`043f0000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04200000 fffff880`04221000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`04221000 fffff880`0423b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0405b000 fffff880`040ac000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`0167e000 fffff880`01687000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01435000 fffff880`0143e000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0143e000 fffff880`01447000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0192b000 fffff880`01965000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`03e00000 fffff880`03e18000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04800000 fffff880`0486a000   Rt64win7 Rt64win7.sys Wed Feb 16 04:03:57 2011 (4D5B92FD)
    fffff880`03ee6000 fffff880`03f2dc00   RtHDMIVX RtHDMIVX.sys Tue Nov 23 05:27:12 2010 (4CEB9700)
    fffff880`068ca000 fffff880`06b59280   RTKVHD64 RTKVHD64.sys Wed Dec 29 22:52:42 2010 (4D1C020A)
    fffff880`06f4d000 fffff880`06f58000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`045e6000 fffff880`045f2000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0400f000 fffff880`0402c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01923000 fffff880`0192b000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`07237000 fffff880`072d0000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
    fffff880`06e00000 fffff880`06e6b000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
    fffff880`06f58000 fffff880`06f89000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
    fffff880`0442a000 fffff880`0442b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01689000 fffff880`0188d000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`06f89000 fffff880`06f9b000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`015ea000 fffff880`015f7000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`011c7000 fffff880`011e9000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`04047000 fffff880`0405b000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00540000 fffff960`0054a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`042f9000 fffff880`0431f000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`011e9000 fffff880`011fb000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`0772e000 fffff880`07738000   umpass   umpass.sys   Mon Jul 13 20:06:52 2009 (4A5BCC1C)
    fffff880`06b9c000 fffff880`06bb9000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`045bb000 fffff880`045bcf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`045d5000 fffff880`045e6000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e77000 fffff880`03ed1000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`045ca000 fffff880`045d5000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`05183000 fffff880`051d9000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`06800000 fffff880`0681b000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
    fffff880`00fec000 fffff880`00ff9000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01670000 fffff880`0167e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01400000 fffff880`01425000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`018d7000 fffff880`01923000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`07721000 fffff880`0772e000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`041ea000 fffff880`04200000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`0402c000 fffff880`04047000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`01425000 fffff880`01435000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e9c000 fffff880`00f40000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f40000 fffff880`00f4f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`041bb000 fffff880`041c4000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00060000 fffff960`00371000   win32k   win32k.sys   Wed Jan 05 01:55:38 2011 (4D2415EA)
    fffff880`00fa6000 fffff880`00faf000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0688f000 fffff880`068b0000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    fffff880`072d0000 fffff880`07301000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)
    
    Unloaded modules:
    fffff880`077b4000 fffff880`077bd000   cpuz135_x64.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`07738000 fffff880`077a9000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0549e000 fffff880`054a7000   cpuz135_x64.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01600000 fffff880`0160e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0160e000 fffff880`0161a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0161a000 fffff880`01623000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01623000 fffff880`01636000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
     
    #4 cybercore, Mar 30, 2011
    Last edited: Mar 30, 2011
  5. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    Hi I done as you suggested and I got another blue screen I ran memtest and got an error that said unexpected interrupt halting cpu0 what does than mean thanks for your help.
     
  6. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    That could mean wrong hardware settings or faulty hardware. Attach the following info:

    1. Screenshot of CPU-Z MEMORY tab

    2. Screenshot of CPU-Z CPU tab

    3. RAMMon HTML report (zip it so you can attach)
     
  7. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    Ok I'll do that when I get home from work as for rammon I downloaded that last night and when I try to run it I got a directIO.sys error as for the memory tab that will be in my first post
     
  8. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Attach the new memory and CPU tab snapshots as you have them now.
     
  9. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    ok I'll do that as soon as I get home from work I only just built this system never had a problem like this before.
     
  10. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    Humor me while I'm working just say it is faulty hardware how hard will it be to pin point the culprit thinking of going home to sort this out lol.
     
  11. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    "Faulty" does not automatically mean "old".
     
  12. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    heres the screen captures you asked for thanks for your help
    and the rammon file
     

    Attached Files:

    #12 roonidog, Mar 30, 2011
    Last edited: Mar 30, 2011
  13. Venom

    Venom New Member

    Joined:
    Mar 12, 2011
    Messages:
    14
    Likes Received:
    0
    I'm assuming your IE9 problem is fixed then?
     
  14. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    no im still having the same problem even when using ie64
     
  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    The problem is that roonidog's blue screens occur not only at the time of running IE:

    Code:
    BugCheck 24, {c08a5, 0, 0, 0}
    PROCESS_NAME:  AvastUI.exe
    Stack:
    nt!NtReadFile
    nt!KiPageFault
    nt!MmAccessFault
    nt!MiIssueHardFault
    nt!IoPageRead
    Ntfs!NtfsPagingFileIo
    Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )
    




    In this case, attach the most recent crash dumps from C:\Windows\Minidump.


    ~~~~~~~

    From what I see in your screenshots, you have 2 matching CMX8GX3M2A1333C9 sticks that are set right 1333Mhz 9 9 9 24.
    Your CPU frequency is 3200, should be 800Mhz at idle, perhaps this is where your blue screens come from ?

     
  16. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    That's because I turned off and cool and quiet so it won't drop the CPU to 800mhz I'll attach the latest dumpfile later today what could be causing these issues.
    And when I try to run memtest it throws the same error as the one I posted earlier could it be a motherboard fault.
     
    #16 roonidog, Mar 31, 2011
    Last edited: Mar 31, 2011
  17. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    The error can pop up due to faulty ram, motherboard slot, or CPU.
    You may want to test sticks one by one and in different slots.



    Turn it on for now.
     
  18. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    Ok I'll test each stick in different slots after I finish work if I get the same error memtest has been giving me when I try to test both sticks together what does that suggest.
     
  19. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    ...............

     
  20. roonidog

    roonidog New Member

    Joined:
    Mar 29, 2011
    Messages:
    22
    Likes Received:
    0
    the latest minidump file
    thanks for your help
     

    Attached Files:

Share This Page

Loading...