Windows 7 Random BSOD Win 7 64-bit

bullinc

New Member
Joined
May 3, 2011
Hi everyone!

Lately (2 month) I always having this BSOD, and al the time random.
Reinstalled windows 4 times, updated all drivers, updated BIOS, even cleaned dust inside......
But BSOD still here... still random... still blue ;(

I hope you can help me!

> Mainboard : Asus M4A785TD-V EVO
> Chipset : AMD 785G
> Processor : AMD Athlon II X4 620 @ 2600MHz
> Physical Memory : 12288 MB DDR3-SDRAM
> Video Card : NVIDIA GeForce GTX 460
> Hard Disk : Western Digital WD10EADS-00M2B0 ATA Device (1000GB)
> DVD-Rom Drive : HL-DT-ST DVD-RAM GSA-H50N
> DVD-Rom Drive : XIJWX ZKDABO96J
> Network Card : Realtek Semiconductor RTL8168/8111 PCIe Gigabit Ethernet Adapter
> Network Card : Atheros Communications AR5212 802.11a/b/g Wireless Network Adapter
> Operating System : Windows 7 Professional / Service Pack 1 (64-bit)
 

Attachments

  • Dump.zip
    145.8 KB · Views: 309
  • SPD.jpg
    SPD.jpg
    74.4 KB · Views: 1,333
  • MEM.jpg
    MEM.jpg
    61.1 KB · Views: 1,376
Your crashes are related to hardware, graphic_tdr 116 and memory menagement 1a, probably caused by overclocking:



041911-31090-01.dmp
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Unable to load image Unknown_Module_00000000`000000b0, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`000000b0
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`000000b0
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )


041911-24897-01.dmp
BugCheck 1E, {0, 0, 0, 0}
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
Exception Record Code: c0000005 (Access violation)
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )



050311-22963-01.dmp
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.
Unable to load image sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
CURRENT_IRQL: 2


050311-23665-01.dmp
BugCheck 1A, {403, fffff6800007a748, 85800002962ea867, fffff6800007ab00}
MEMORY_MANAGEMENT (1a)
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )





1. Attach CPUZ CPU tab snip
2. Attach RAMMon HTML report
3. Uninstall Daemon Tools (or perhaps Alcohol 120%)
DuplexSecure - FAQ

4. Update Atheros Extensible Wireless LAN device
athrx.sys Wed Jul 08 20:49:13 2009




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-31090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e59e50
Debug session time: Tue Apr 19 11:57:09.418 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:18.869
Loading Kernel Symbols
................................................
Loading User Symbols
Loading unloaded module list
.......Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
....Missing image name, possible paged-out or corrupt data.
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 116, {fffffa800a5ee4e0, fffff8800cdaff08, ffffffffc000009a, 4}

Unable to load image Unknown_Module_00000000`000000b0, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`000000b0
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`000000b0
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa800a5ee4e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8800cdaff08, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.

Debugging Details:
------------------

Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory

FAULTING_IP: 
+3537303537613334
fffff880`0cdaff08 4883ec28        sub     rsp,28h

DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_TDR_FAULT

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x116

PROCESS_NAME:  Ă“ystem

CURRENT_IRQL:  0

STACK_TEXT:  
fffff880`026ceb88 fffff880`04262000 : 00000000`00000116 fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a : nt!KeBugCheckEx
fffff880`026ceb90 00000000`00000116 : fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 : 0xfffff880`04262000
fffff880`026ceb98 fffffa80`0a5ee4e0 : fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 00000000`00000001 : Unknown_Module_00000000_000000b0+0x66
fffff880`026ceba0 fffff880`0cdaff08 : ffffffff`c000009a 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 : 0xfffffa80`0a5ee4e0
fffff880`026ceba8 ffffffff`c000009a : 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 : 0xfffff880`0cdaff08
fffff880`026cebb0 00000000`00000004 : 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 : 0xffffffff`c000009a
fffff880`026cebb8 00000000`00000001 : fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 : 0x4
fffff880`026cebc0 fffffa80`0a5ee4e0 : fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 : 0x1
fffff880`026cebc8 fffff880`04235867 : fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a : 0xfffffa80`0a5ee4e0
fffff880`026cebd0 fffff880`0cdaff08 : fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 : 0xfffff880`04235867
fffff880`026cebd8 fffffa80`0a61c000 : 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 : 0xfffff880`0cdaff08
fffff880`026cebe0 00000000`00000000 : ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 00000000`00000000 : 0xfffffa80`0a61c000


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  X64_0x116_ANALYSIS_INCONCLUSIVE

BUCKET_ID:  X64_0x116_ANALYSIS_INCONCLUSIVE

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-24897-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
Debug session time: Tue Apr 19 11:51:14.015 2011 (UTC - 4:00)
System Uptime: 0 days 0:44:29.856
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3164366330623263
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f1b9f8 -- (.exr 0xfffff88002f1b9f8)
ExceptionAddress: fffff80002ce43f2 (nt!KiTimerExpiration+0x00000000000000f2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f1baa0 -- (.trap 0xfffff88002f1baa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e56d695402170000 rbx=0000000000000000 rcx=fffffa800c28a060
rdx=0000000000000087 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ce43f2 rsp=fffff88002f1bc30 rbp=0000000000029c87
 r8=fffffa800c402fe0  r9=00000000000000c0 r10=0000000000000087
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiTimerExpiration+0xf2:
fffff800`02ce43f2 48894808        mov     qword ptr [rax+8],rcx ds:e56d6954`02170008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cd046e to fffff80002cd8710

STACK_TEXT:  
fffff880`02f1aae8 fffff800`02cd046e : fffffa80`0a6aad30 fffffa80`00000001 fffff880`02f1b260 fffff800`02d05668 : nt!KeBugCheck
fffff880`02f1aaf0 fffff800`02cfe40d : fffff800`02ee6b7c fffff800`02e20ea4 fffff800`02c68000 fffff880`02f1b9f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1ab20 fffff800`02d05a90 : fffff800`02e27b34 fffff880`02f1ab98 fffff880`02f1b9f8 fffff800`02c68000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1ab50 fffff800`02d129ef : fffff880`02f1b9f8 fffff880`02f1b260 fffff880`00000000 fffff880`009ea180 : nt!RtlDispatchException+0x410
fffff880`02f1b230 fffff800`02cd7d82 : fffff880`02f1b9f8 00000006`375bd239 fffff880`02f1baa0 fffff880`009ed668 : nt!KiDispatchException+0x16f
fffff880`02f1b8c0 fffff800`02cd668a : fffffa80`0b2d8000 fffff880`02f1bb00 00000000`00029c87 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f1baa0 fffff800`02ce43f2 : 00000006`375b0ee6 fffff880`02f1bc58 00000000`00029c87 fffff880`009ed668 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f1bc30 fffff800`02ce3cb7 : 00000001`9607b7c0 00000001`00029c87 00000001`9607b7da 00000000`00000087 : nt!KiTimerExpiration+0xf2
fffff880`02f1bcd0 fffff800`02ce0eea : fffff880`009ea180 fffff880`009f4fc0 00000000`00000000 fffffa80`0b085210 : nt!KiRetireDpcList+0x277
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cd046e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050311-22963-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e5de90
Debug session time: Tue May  3 22:10:13.948 2011 (UTC - 4:00)
System Uptime: 0 days 0:56:45.259
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C5, {60000, 2, 0, fffff80002dc26fb}

Unable to load image sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+ca7 )

Followup: Pool_corruption
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is
caused by drivers that have corrupted the system pool.  Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000060000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002dc26fb, address which referenced memory

Debugging Details:
------------------


BUGCHECK_STR:  0xC5_2

CURRENT_IRQL:  2

FAULTING_IP: 
nt!ExDeferredFreePool+ca7
fffff800`02dc26fb 488b00          mov     rax,qword ptr [rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  shift2u.exe

TRAP_FRAME:  fffff880009b0a00 -- (.trap 0xfffff880009b0a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060000 rbx=0000000000000000 rcx=fffff80002e1fe10
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dc26fb rsp=fffff880009b0b90 rbp=0000000000000000
 r8=fffffa800ae37100  r9=fffffa800ae370f8 r10=0000000000000001
r11=fffffa800ae37100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!ExDeferredFreePool+0xca7:
fffff800`02dc26fb 488b00          mov     rax,qword ptr [rax] ds:9550:00000000`00060000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c97be9 to fffff80002c98640

STACK_TEXT:  
fffff880`009b08b8 fffff800`02c97be9 : 00000000`0000000a 00000000`00060000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009b08c0 fffff800`02c96860 : fffffa80`0bcba220 fffffa80`0bcbaa90 fffffa80`0bd04020 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009b0a00 fffff800`02dc26fb : fffffa80`0bd21260 00000000`00000000 fffffa80`0af29530 fffff800`02c84e89 : nt!KiPageFault+0x260
fffff880`009b0b90 fffff800`02dc41a1 : 00000000`00000000 fffffa80`0d0719e0 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0xca7
fffff880`009b0c20 fffff880`0457d6f3 : fffffa80`0b823a90 fffffa80`0b7ce260 fffffa80`70627375 00000000`000003ed : nt!ExFreePoolWithTag+0x411
fffff880`009b0cd0 fffff880`0457dab7 : fffffa80`0d071902 fffffa80`0bd21260 00000000`ffffffff fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xb2f
fffff880`009b0db0 fffff880`0457b64f : fffffa80`0aed4ea8 fffffa80`0aed41a0 fffffa80`0aed5040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`009b0e10 fffff880`0456cf89 : fffffa80`0aed4050 00000000`00000000 fffffa80`0aed4e02 fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`009b0e50 fffff880`010e2ae8 : fffffa80`0af32000 fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`009b0e80 fffffa80`0af32000 : fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 : sptd+0x46ae8
fffff880`009b0e88 fffffa80`0aed4ec0 : fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 00000000`00000000 : 0xfffffa80`0af32000
fffff880`009b0e90 fffffa80`0aed4e00 : fffff880`009b0ef8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`0aed4ec0
fffff880`009b0e98 fffff880`009b0ef8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`75302450 : 0xfffffa80`0aed4e00
fffff880`009b0ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`75302450 00000000`00000000 : 0xfffff880`009b0ef8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+ca7
fffff800`02dc26fb 488b00          mov     rax,qword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ExDeferredFreePool+ca7

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xC5_2_nt!ExDeferredFreePool+ca7

BUCKET_ID:  X64_0xC5_2_nt!ExDeferredFreePool+ca7

Followup: Pool_corruption
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050311-23665-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c1b000 PsLoadedModuleList = 0xfffff800`02e60e90
Debug session time: Tue May  3 22:11:45.928 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:26.613
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {403, fffff6800007a748, 85800002962ea867, fffff6800007ab00}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800007a748
Arg3: 85800002962ea867
Arg4: fffff6800007ab00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_403

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002c42ca6 to fffff80002c9b640

STACK_TEXT:  
fffff880`068937a8 fffff800`02c42ca6 : 00000000`0000001a 00000000`00000403 fffff680`0007a748 85800002`962ea867 : nt!KeBugCheckEx
fffff880`068937b0 fffff800`02ccd627 : 00000000`00000000 fffff680`0007aff8 fffffa80`0c681b30 fffff880`06893a00 : nt! ?? ::FNODOBFM::`string'+0x330bc
fffff880`06893960 fffff800`02c88aef : fffffa80`00000000 00000000`112f8fff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x41f
fffff880`06893b20 fffff800`02c9a8d3 : ffffffff`ffffffff 00000000`0095e5b0 00000000`0095e578 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`06893c20 00000000`771a14fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0095e4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771a14fa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+330bc
fffff800`02c42ca6 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+330bc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc

BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`047ad000 fffff880`047eb000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`0613e000 fffff880`06199000   a2djavs  a2djavs.sys  Wed Oct 20 06:51:47 2010 (4CBEC9C3)
fffff880`06123000 fffff880`0613e000   a2djusb  a2djusb.sys  Wed Oct 20 06:51:48 2010 (4CBEC9C4)
fffff880`0124b000 fffff880`0128f000   a4s27gsh a4s27gsh.SYS Sat Jul 17 06:58:04 2010 (4C418CBC)
fffff880`00f58000 fffff880`00faf000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`042c4000 fffff880`0434d000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`04610000 fffff880`04626000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04152000 fffff880`04167000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e8a000 fffff880`00e95000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`1124d000 fffff880`11255000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`04126000 fffff880`0412c000   AsIO     AsIO.sys     Mon Apr 06 03:21:08 2009 (49D9AD64)
fffff880`04120000 fffff880`04126000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`011f3000 fffff880`011fc000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc2000 fffff880`00dec000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`04631000 fffff880`047a0000   athrx    athrx.sys    Wed Jul 08 20:49:13 2009 (4A553E89)
fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Sat Feb 19 04:00:32 2011 (4D5F86B0)
fffff880`018bf000 fffff880`018c6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0410f000 fffff880`04120000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`017d4000 fffff880`017fe000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cc6000 fffff880`00d86000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c68000 fffff880`00cc6000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0138b000 fffff880`013fd000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`04600000 fffff880`04610000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`060ed000 fffff880`060fb000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0406e000 fffff880`040f1000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`040f1000 fffff880`0410f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`042b4000 fffff880`042c3000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183a000 fffff880`01850000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04c60000 fffff880`04c82000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06107000 fffff880`06110000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`060fb000 fffff880`06107000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06110000 fffff880`06123000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0606b000 fffff880`06077000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`11eb4000 fffff880`11fa8000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`11fa8000 fffff880`11fee000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`01319000 fffff880`0132d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`012cd000 fffff880`01319000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01411000 fffff880`0141b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01acf000 fffff880`01b19000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`11240000 fffff880`1124d000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03205000 fffff800`0324e000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`11200000 fffff880`11224000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`0600f000 fffff880`0606b000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`061a7000 fffff880`061c0000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`061c0000 fffff880`061c8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06199000 fffff880`061a7000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`01bd3000 fffff880`01bdc000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04d0c000 fffff880`04d1b000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061d6000 fffff880`061e4000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bca000 fffff800`00bd4000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`04d2c000 fffff880`04d6f000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`015e3000 fffff880`015fe000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`017a9000 fffff880`017d4000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04c82000 fffff880`04c87200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`061e4000 fffff880`061f9000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04c88000 fffff880`04cab000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c47000 fffff880`00c54000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06077000 fffff880`06085000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04d1b000 fffff880`04d2a000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061c9000 fffff880`061d6000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e5c000 fffff880`00e76000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`01600000 fffff880`01631000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`01200000 fffff880`0120b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011c7000 fffff880`011d1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0132d000 fffff880`0138b000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`042a9000 fffff880`042b4000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01bc1000 fffff880`01bd3000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01656000 fffff880`01749000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`047f4000 fffff880`04800000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06d34000 fffff880`06d47000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`00c00000 fffff880`00c2f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`04ddb000 fffff880`04df0000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`043d7000 fffff880`043e6000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0434d000 fffff880`04392000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01749000 fffff880`017a9000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0120b000 fffff880`0121c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0429d000 fffff880`042a9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c1b000 fffff800`03205000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01440000 fffff880`015e3000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
fffff880`018b6000 fffff880`018bf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`11eb2000 fffff880`11eb3180   nvBridge nvBridge.kmd Wed Feb 23 02:34:23 2011 (4D64B87F)
fffff880`04c00000 fffff880`04c23000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D)
fffff880`11256000 fffff880`11eb1180   nvlddmkm nvlddmkm.sys Wed Feb 23 02:46:52 2011 (4D64BB6C)
fffff880`06ce1000 fffff880`06d34000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`0439b000 fffff880`043c1000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`041d7000 fffff880`041f4000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`011de000 fffff880`011f3000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00faf000 fffff880`00fe2000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`01015000 fffff880`0101c000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`0101c000 fffff880`0102c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01400000 fffff880`01411000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04c23000 fffff880`04c60000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c54000 fffff880`00c68000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0128f000 fffff880`012b3000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`00fe2000 fffff880`00ffd000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04cc6000 fffff880`04ce7000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04ce7000 fffff880`04d01000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0424c000 fffff880`0429d000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`04d01000 fffff880`04d0c000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0141b000 fffff880`01424000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01424000 fffff880`0142d000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0142d000 fffff880`01436000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01b87000 fffff880`01bc1000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`06d47000 fffff880`06d5f000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04167000 fffff880`041d7000   Rt64win7 Rt64win7.sys Mon Mar 21 09:20:32 2011 (4D8750A0)
fffff880`01198000 fffff880`011c7000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`11fee000 fffff880`11ffa000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04200000 fffff880`0421d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01b7d000 fffff880`01b87000   speedfan speedfan.sys Sat Dec 18 06:03:51 2010 (4D0C9517)
fffff880`01b75000 fffff880`01b7d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01032000 fffff880`0118f000   sptd     sptd.sys     Tue Aug 24 02:13:12 2010 (4C7362F8)
fffff880`04d2a000 fffff880`04d2b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`018cb000 fffff880`01acf000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`0123e000 fffff880`0124b000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0121c000 fffff880`0123e000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`04238000 fffff880`0424c000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0412c000 fffff880`04152000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04d6f000 fffff880`04d81000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`060d2000 fffff880`060ecc80   usbaudio usbaudio.sys Sat Nov 20 05:43:52 2010 (4CE7A668)
fffff880`06085000 fffff880`060a2000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`060a2000 fffff880`060a3f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`1122f000 fffff880`11240000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04d81000 fffff880`04ddb000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`11224000 fffff880`1122f000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`060a4000 fffff880`060d1280   usbvideo usbvideo.sys Sat Nov 20 05:44:34 2010 (4CE7A692)
fffff880`011d1000 fffff880`011de000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01bdc000 fffff880`01bea000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01631000 fffff880`01656000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00d86000 fffff880`00dc2000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01b19000 fffff880`01b29000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`01000000 fffff880`01015000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01b29000 fffff880`01b75000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`047a0000 fffff880`047ad000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`043c1000 fffff880`043d7000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0421d000 fffff880`04238000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01bea000 fffff880`01bfa000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea5000 fffff880`00f49000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f49000 fffff880`00f58000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04392000 fffff880`0439b000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`003a2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00e76000 fffff880`00e8a000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`047eb000 fffff880`047f4000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`0118f000 fffff880`01198000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01880000 fffff880`018a1000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`01880000 fffff880`0188e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0188e000 fffff880`0189a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0189a000 fffff880`018a3000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018a3000 fffff880`018b6000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
- Uninstall Daemon Tools (or perhaps Alcohol 120%) - DONE
- Atheros Extensible Wireless LAN device driver (D-Link AirPlus DWL-G520 Wireless PCI Adapter) - can't find. It's looks like 2009 was latest update!
 

Attachments

  • CPU.jpg
    CPU.jpg
    81 KB · Views: 1,073
  • RAMMon - SPD Info.rar
    2.5 KB · Views: 307
Yes, hardware it is, the sticks are mismatching:


Active/Auto-Refresh Command Period, tRFC (ns) 160.000 110.000 160.000 110.000


Auto-self Refresh Supported Yes No Yes No


Partial Array Self Refresh Supported No Yes No Yes




1. Enable AMD Cool and Quiet for the CPU. You can try bios defaults.
2. Make sure memory is set correctly to its rates 1333Mhz 9-9-9-24 1.5V (that's why I ask to attach cpuz memory snip)
3. If crashes persist and they will, remove either pair of sticks, 9905403-011.A03LF OR 9905471-009.A00LF.


Regards.
 
Back
Top Bottom