Random Bsod every boot

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Bruno Pigino, Apr 30, 2011.

  1. Bruno Pigino

    Bruno Pigino New Member

    Joined:
    Apr 30, 2011
    Messages:
    4
    Likes Received:
    0
    hi to everyone. I have a problem, i cannot run win 7 professional edition 64 bits . everytyme i tried to boot win 7 a bsod appear. i tried to run win 7 dvd instalation, everytimes a bsod appears. now im in linux live cd. what can i do?

    My specs

    AMD Phemon II x6 1090t BE
    Motherboard Gigabyte GA-890FX-UD5
    WD caviar green 2TB Sata II
    2x3 OCZ Gold edition 1333 Mhz
    Cooler master 690 II Basic
    XFX Radeon HD 6870 1 gb gddr5
    Thermaltake 750 w Tr2 Rx
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Check if it's set right (as recommended by the manufacturer):

    - link to your ram sticks description page
    - Passmark RAMMon HTML.zip
    - CPUZ CPU and MEMORY tabs snips.


    Update NEC USB 3.0 Controller drivers.



    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042911-18688-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0220c000 PsLoadedModuleList = 0xfffff800`02449e50
    Debug session time: Fri Apr 29 19:11:58.102 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:34.602
    Loading Kernel Symbols
    ...............................................................
    .......................................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff8000228d4ec, fffff8800b834660, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff8000228d4ec, Address of the instruction which caused the bugcheck
    Arg3: fffff8800b834660, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IoGetRelatedDeviceObject+c
    fffff800`0228d4ec 488b4008        mov     rax,qword ptr [rax+8]
    
    CONTEXT:  fffff8800b834660 -- (.cxr 0xfffff8800b834660)
    rax=ffffffffffffffff rbx=0000000000000000 rcx=fffffa80063e0520
    rdx=fffffa80063e0520 rsi=fffffa8007463c01 rdi=0000000008000000
    rip=fffff8000228d4ec rsp=fffff8800b835048 rbp=fffff8800b835088
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000001
    r14=fffffa80063e0520 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    nt!IoGetRelatedDeviceObject+0xc:
    fffff800`0228d4ec 488b4008        mov     rax,qword ptr [rax+8] ds:002b:00000000`00000007=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  WerFault.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8000228d4ec
    
    STACK_TEXT:  
    fffff880`0b833d98 fffff800`0227d469 : 00000000`0000003b 00000000`c0000005 fffff800`0228d4ec fffff880`0b834660 : nt!KeBugCheckEx
    fffff880`0b833da0 fffff800`0227cdbc : fffff880`0b834e08 fffff880`0b834660 00000000`00000000 fffff800`022ac450 : nt!KiBugCheckDispatch+0x69
    fffff880`0b833ee0 fffff800`022a3bed : fffff800`0249ecb8 00000000`00000000 fffff800`0220c000 fffff880`0b834e08 : nt!KiSystemServiceHandler+0x7c
    fffff880`0b833f20 fffff800`022ab250 : fffff800`023cc1e8 fffff880`0b833f98 fffff880`0b834e08 fffff800`0220c000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`0b833f50 fffff800`022b81b5 : fffff880`0b834e08 fffff880`0b834660 fffff880`00000000 00000000`08000000 : nt!RtlDispatchException+0x410
    fffff880`0b834630 fffff800`0227d542 : fffff880`0b834e08 00000000`00000000 fffff880`0b834eb0 fffffa80`07463c01 : nt!KiDispatchException+0x135
    fffff880`0b834cd0 fffff800`0227c0ba : 00000000`00000000 00000000`00000000 fffffa80`0730b200 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`0b834eb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemServiceHandler+7c
    fffff800`0227cdbc b801000000      mov     eax,1
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiSystemServiceHandler+7c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c
    
    BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\043011-23228-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`03062000 PsLoadedModuleList = 0xfffff800`0329fe50
    Debug session time: Sat Apr 30 12:19:25.698 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:47.010
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {3, fffffa8007bed450, fffff8a007dc0c90, fffffa8007bed450}
    
    Probably caused by : Pool_Corruption ( nt!ExFreePool+780 )
    
    Followup: Pool_corruption
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000003, the pool freelist is corrupt.
    Arg2: fffffa8007bed450, the pool entry being checked.
    Arg3: fffff8a007dc0c90, the read back flink freelist value (should be the same as 2).
    Arg4: fffffa8007bed450, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80003205130 to fffff800030d3f00
    
    STACK_TEXT:  
    fffff880`0314c938 fffff800`03205130 : 00000000`00000019 00000000`00000003 fffffa80`07bed450 fffff8a0`07dc0c90 : nt!KeBugCheckEx
    fffff880`0314c940 fffff800`032074c1 : fffffa80`05201600 fffffa80`07e78000 00000000`00000000 fffff800`033e74b7 : nt!ExFreePool+0x780
    fffff880`0314c9d0 fffff800`030d90bc : fffffa80`061359b0 00000000`00000000 fffffa80`656c6946 fffffa80`05201600 : nt!ExFreePoolWithTag+0x411
    fffff880`0314ca80 fffff800`030c3c91 : fffffa80`07e78070 00000000`00000002 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xdc
    fffff880`0314cae0 fffff800`030c755c : 00000000`00000000 00000000`00000000 fffffa80`07e781c0 fffff800`00000000 : nt!CcDeleteSharedCacheMap+0x2fd
    fffff880`0314cb50 fffff800`030c7d60 : fffff880`02f64700 fffff880`0314cc58 00000000`00000000 fffff800`00000000 : nt!CcWriteBehind+0x5bc
    fffff880`0314cc00 fffff800`030e1161 : fffffa80`0520a550 fffff800`030c7b98 fffff800`032d9140 00000000`00000002 : nt!CcWorkerThread+0x1c8
    fffff880`0314ccb0 fffff800`03377166 : 00000000`00000000 fffffa80`0521c680 00000000`00000080 fffffa80`051ee040 : nt!ExpWorkerThread+0x111
    fffff880`0314cd40 fffff800`030b2486 : fffff880`03088180 fffffa80`0521c680 fffff880`03093040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`0314cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePool+780
    fffff800`03205130 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!ExFreePool+780
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+780
    
    BUCKET_ID:  X64_0x19_3_nt!ExFreePool+780
    
    Followup: Pool_corruption
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042911-25006-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`03050000 PsLoadedModuleList = 0xfffff800`0328de50
    Debug session time: Fri Apr 29 19:10:28.466 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:22.762
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 1, fffff800031094a2}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeWaitForGate+de )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800031094a2, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f80e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeWaitForGate+de
    fffff800`031094a2 4c8928          mov     qword ptr [rax],r13
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff8800317d210 -- (.trap 0xfffff8800317d210)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8005a0bcb0
    rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800031094a2 rsp=fffff8800317d3a0 rbp=0000000000000000
     r8=0000000000000001  r9=0000000000000000 r10=fffffa8005e0bb80
    r11=00000000137a1deb r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeWaitForGate+0xde:
    fffff800`031094a2 4c8928          mov     qword ptr [rax],r13 ds:0002:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030c1469 to fffff800030c1f00
    
    STACK_TEXT:  
    fffff880`0317d0c8 fffff800`030c1469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`0317d0d0 fffff800`030c00e0 : fffff8a0`0108b590 fffffa80`05227040 fffff8a0`0108b590 fffffa80`07bc9b10 : nt!KiBugCheckDispatch+0x69
    fffff880`0317d210 fffff800`031094a2 : 00000000`00000001 fffff880`0317d408 00000000`0317d400 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`0317d3a0 fffff800`030972dd : fffffa80`05a0bc90 fffff880`00000023 fffff800`032655a0 00000000`0305a401 : nt!KeWaitForGate+0xde
    fffff880`0317d3f0 fffff800`030d75c0 : fffff800`0324f880 fffff800`031f46eb fffff880`0317d750 fffff880`01237a27 : nt!KiAcquireGuardedMutex+0x45
    fffff880`0317d420 fffff800`030b6dbb : fffffa80`05e0bdc0 fffff800`032655a0 fffff800`00001000 00000000`00000000 : nt!CcUnpinFileDataEx+0x520
    fffff880`0317d4a0 fffff880`012c500e : fffff8a0`00220a20 fffff880`012379a4 fffff880`0317dab0 fffff880`0317d658 : nt!CcGetDirtyPages+0x337
    fffff880`0317d590 fffff880`012c76fb : fffff880`0317dab0 fffffa80`06001180 fffff880`0317da00 fffff880`01249100 : Ntfs!NtfsCheckpointVolume+0x35e
    fffff880`0317d990 fffff880`012c78c7 : fffff880`0317dab0 fffffa80`06001180 fffffa80`06001188 fffff880`01239c42 : Ntfs!NtfsCheckpointAllVolumesWorker+0x4b
    fffff880`0317d9e0 fffff880`012c6948 : fffff880`0317dab0 00000000`00000000 fffff880`012c76b0 fffff880`0317dcb8 : Ntfs!NtfsForEachVcb+0x167
    fffff880`0317da80 fffff800`030cf161 : fffff800`0337c300 fffff800`0337c300 fffffa80`05227040 fffff800`00000005 : Ntfs!NtfsCheckpointAllVolumes+0xb8
    fffff880`0317dcb0 fffff800`03365166 : 00000000`00000000 fffffa80`05227040 00000000`00000080 fffffa80`05211040 : nt!ExpWorkerThread+0x111
    fffff880`0317dd40 fffff800`030a0486 : fffff880`030a4180 fffffa80`05227040 fffff880`030af040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`0317dd80 00000000`00000000 : fffff880`0317e000 fffff880`03178000 fffff880`0317d9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeWaitForGate+de
    fffff800`031094a2 4c8928          mov     qword ptr [rax],r13
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeWaitForGate+de
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeWaitForGate+de
    
    BUCKET_ID:  X64_0xA_nt!KeWaitForGate+de
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042911-27034-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0301a000 PsLoadedModuleList = 0xfffff800`03257e50
    Debug session time: Fri Apr 29 19:16:43.571 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:15.882
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {cd5c4, 2, 0, fffff800032cd6f5}
    
    Probably caused by : cng.sys ( cng!HashFirstUserModeCallerBlobs+a5 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000cd5c4, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800032cd6f5, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c20e0
     00000000000cd5c4 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!ExQuerySystemLockInformation+175
    fffff800`032cd6f5 488b80b8030000  mov     rax,qword ptr [rax+3B8h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    TRAP_FRAME:  fffff8800a263ae0 -- (.trap 0xfffff8800a263ae0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000000000cd20c rbx=0000000000000000 rcx=fffffa8007060c00
    rdx=fffff8800c440000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032cd6f5 rsp=fffff8800a263c70 rbp=0000000000000000
     r8=0000000000020000  r9=fffff8000322f770 r10=0000000000000002
    r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!ExQuerySystemLockInformation+0x175:
    fffff800`032cd6f5 488b80b8030000  mov     rax,qword ptr [rax+3B8h] ds:0be0:00000000`000cd5c4=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000308b469 to fffff8000308bf00
    
    STACK_TEXT:  
    fffff880`0a263998 fffff800`0308b469 : 00000000`0000000a 00000000`000cd5c4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0a2639a0 fffff800`0308a0e0 : 00000000`00007658 00000000`00009728 fffff880`0c447628 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0a263ae0 fffff800`032cd6f5 : 00000000`00000008 fffff880`0a264180 00000000`00000000 fffff800`032fe4c9 : nt!KiPageFault+0x260
    fffff880`0a263c70 fffff800`034eb445 : fffff880`0c440000 fffff800`00020000 00000000`00000000 fffff880`0a263d60 : nt!ExQuerySystemLockInformation+0x175
    fffff880`0a263ce0 fffff800`033ee58f : 00000000`00000000 00000000`00000000 fffff880`0c440000 fffffa80`075b3d90 : nt!ExpGetLockInformation+0x55
    fffff880`0a263d20 fffff800`03387e49 : fffff8a0`00f4e000 fffffa80`6365734b fffff880`011bf2a8 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x5821f
    fffff880`0a2640c0 fffff800`0308b153 : 00000000`00013268 fffff880`02fe2000 00000000`00000001 00000000`00000000 : nt!NtQuerySystemInformation+0x4d
    fffff880`0a264100 fffff800`030876f0 : fffff880`011b3525 00000000`00000000 00000000`00000000 00000000`00020000 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`0a264298 fffff880`011b3525 : 00000000`00000000 00000000`00000000 00000000`00020000 00000000`00000001 : nt!KiServiceLinkage
    fffff880`0a2642a0 fffff880`011b23cb : fffff8a0`00f2e048 00000000`00000001 fffff880`0a2643e0 fffff880`00000001 : cng!HashFirstUserModeCallerBlobs+0xa5
    fffff880`0a264360 fffff880`01190d59 : fffff880`0a264a18 fffff800`0338bed0 00000000`00000000 fffffa80`061f1a50 : cng!dblint_sqrt+0x1eb
    fffff880`0a264720 fffff880`0117cde0 : fffff880`0a264a18 00000000`00000400 fffff800`03218a80 00000000`00000000 : cng!UninitializeLoader+0xa9
    fffff880`0a2647b0 fffff880`0116fe45 : 00000000`00000040 fffff880`0a264a18 00000000`00000000 fffff800`03381469 : cng! ?? ::FNODOBFM::`string'+0x20d9
    fffff880`0a264880 fffff880`013d030b : 00000000`20206f49 fffff880`0a264a18 fffff880`0a264ca0 00000000`00000000 : cng!CngDeviceControl+0x65
    fffff880`0a264980 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ksecdd!KsecDeviceControl+0x5b
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    cng!HashFirstUserModeCallerBlobs+a5
    fffff880`011b3525 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  9
    
    SYMBOL_NAME:  cng!HashFirstUserModeCallerBlobs+a5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: cng
    
    IMAGE_NAME:  cng.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc814
    
    FAILURE_BUCKET_ID:  X64_0xA_cng!HashFirstUserModeCallerBlobs+a5
    
    BUCKET_ID:  X64_0xA_cng!HashFirstUserModeCallerBlobs+a5
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`06c00000 fffff880`06c3e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00eb8000 fffff880`00f0f000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c35000 fffff880`02cbf000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`07bc0000 fffff880`07bd6000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`07c46000 fffff880`07c5a000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
    fffff880`04187000 fffff880`0419c000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e9d000 fffff880`00ea8000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`04159000 fffff880`04161000   AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
    fffff880`00e6a000 fffff880`00e73000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e73000 fffff880`00e9d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0728a000 fffff880`07bc0000   atikmdag atikmdag.sys Tue Apr 05 21:50:36 2011 (4D9BC6EC)
    fffff880`041a5000 fffff880`041f4000   atikmpag atikmpag.sys Tue Apr 05 21:21:43 2011 (4D9BC027)
    fffff880`04137000 fffff880`04159000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
    fffff880`01978000 fffff880`0197f000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`04126000 fffff880`04137000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`01945000 fffff880`0196f000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d2e000 fffff880`00dee000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018df000 fffff880`0190f000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cd0000 fffff880`00d2e000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01168000 fffff880`011db000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`07274000 fffff880`07284000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`09f1b000 fffff880`09f29000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04085000 fffff880`04108000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`04108000 fffff880`04126000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02de8000 fffff880`02df7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018c9000 fffff880`018df000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`07d6c000 fffff880`07d8e000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`02d5f000 fffff880`02da2000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
    fffff880`09f35000 fffff880`09f3e000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`09f29000 fffff880`09f35000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`09f3e000 fffff880`09f51000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`09f9a000 fffff880`09fa6000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`06c3f000 fffff880`06d33000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
    fffff880`06d33000 fffff880`06d79000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`010f6000 fffff880`0110a000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010aa000 fffff880`010f6000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013ea000 fffff880`013f4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0188f000 fffff880`018c9000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`035f7000 fffff800`03640000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`06d79000 fffff880`06d9d000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`09f6b000 fffff880`09f84000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`09f84000 fffff880`09f8c080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`09f5d000 fffff880`09f6b000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`015f2000 fffff880`015fb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`00e00000 fffff880`00e21000   jraid    jraid.sys    Mon Sep 06 22:37:00 2010 (4C85A54C)
    fffff880`0187c000 fffff880`0188b000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`09fc3000 fffff880`09fd1000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`07c03000 fffff880`07c46000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`013bf000 fffff880`013d9000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`07d8e000 fffff880`07d93200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`00caf000 fffff880`00cbc000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`09fd1000 fffff880`09fdf000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`011db000 fffff880`011ea000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`09f8d000 fffff880`09f9a000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e50000 fffff880`00e6a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`019dd000 fffff880`019e8000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f18000 fffff880`00f22000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0110a000 fffff880`01168000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02ddd000 fffff880`02de8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015e0000 fffff880`015f2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01486000 fffff880`01578000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04056000 fffff880`04062000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02c00000 fffff880`02c2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`07cdd000 fffff880`07cf2000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d33000 fffff880`02d42000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02cbf000 fffff880`02d04000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01578000 fffff880`015d8000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`019e8000 fffff880`019f9000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02dd1000 fffff880`02ddd000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0301a000 fffff800`035f7000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`0121c000 fffff880`013bf000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0196f000 fffff880`01978000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`07c6c000 fffff880`07c83000   nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
    fffff880`06d9d000 fffff880`06dcd000   nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
    fffff880`02d0d000 fffff880`02d33000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`07257000 fffff880`07274000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f62000 fffff880`00f77000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f22000 fffff880`00f55000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fe8000 fffff880`00fef000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fef000 fffff880`00fff000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013d9000 fffff880`013ea000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`07d2f000 fffff880`07d6c000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cbc000 fffff880`00cd0000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`07bd6000 fffff880`07bfa000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04062000 fffff880`0407d000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`01086000 fffff880`010a7000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`01200000 fffff880`0121a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0182b000 fffff880`0187c000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`041f4000 fffff880`041ff000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019c2000 fffff880`019cb000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019cb000 fffff880`019d4000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019d4000 fffff880`019dd000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`07200000 fffff880`07257000   Rt64win7 Rt64win7.sys Fri Sep 03 01:58:32 2010 (4C808E88)
    fffff880`07cf2000 fffff880`07d2e500   RtHDMIVX RtHDMIVX.sys Mon May 24 08:07:55 2010 (4BFA6C1B)
    fffff880`09cb7000 fffff880`09f1a800   RTKVHD64 RTKVHD64.sys Tue Oct 05 05:58:40 2010 (4CAAF6D0)
    fffff880`00e21000 fffff880`00e50000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`06deb000 fffff880`06df7000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d42000 fffff880`02d5f000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`015d8000 fffff880`015e0000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`069f7000 fffff880`069f9000   swenum   swenum.sys   unavailable (00000000)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`0181e000 fffff880`0182b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01800000 fffff880`0181e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02dbd000 fffff880`02dd1000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00430000 fffff960`0043a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04161000 fffff880`04187000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`07c5a000 fffff880`07c6c000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`09fa6000 fffff880`09fc3000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`06dcd000 fffff880`06dcef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`06dda000 fffff880`06deb000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`07c83000 fffff880`07cdd000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`06dcf000 fffff880`06dda000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`09f51000 fffff880`09f5d000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
    fffff880`00f55000 fffff880`00f62000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0197f000 fffff880`0198d000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0198d000 fffff880`019b2000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f77000 fffff880`00f8c000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f8c000 fffff880`00fe8000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02da2000 fffff880`02dbd000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019b2000 fffff880`019c2000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00dee000 fffff880`00dfd000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d04000 fffff880`02d0d000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000c0000 fffff960`003cf000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff880`0419c000 fffff880`041a5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f0f000 fffff880`00f18000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    
    Unloaded modules:
    fffff880`0190f000 fffff880`0191d000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0191d000 fffff880`01929000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01929000 fffff880`01932000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01932000 fffff880`01945000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. Bruno Pigino

    Bruno Pigino New Member

    Joined:
    Apr 30, 2011
    Messages:
    4
    Likes Received:
    0
    Thanks for the reply, i formatted windows, how do i set on:
    i installed windows ultimate 64 bits.

    in the attachments is rammon zip and pics of cpuz...
     

    Attached Files:

  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

Share This Page

Loading...