Windows 7 Random Bsods new computer

curiousqt

New Member
Hi, I have been experiencing random Bsods for a while now on my new Vaio laptop. It doesn't happen during anything specific it is just random. Could be browsing the net or even when the comp is sleep, at times I open it to read the Bsod. Any help would be much appreciated, Laptop is only 2 months old, no viruses or anything. Even did a full factory reinstall back to scratch. Lots of freezing, crashing. Screen randomly going black and Bsods.

Here are the files you requested. I would've had lots more but because of the reset many got deleted. Thank you for your help in advance

memory.pngspd2.pngspd1.png
 

Attachments

  • rammon.txt
    8.4 KB · Views: 317
  • New folder.zip
    65.9 KB · Views: 226
All 3 crash files are blaming AMD Sata driver :

BugCheck D1, {15d0, 9, 0, fffff88000dd166a}
CURRENT_IRQL: 9
Probably caused by : amd_sata.sys ( amd_sata+266a )
fffff880`00dd166a 488b81d0150000 mov rax,qword ptr [rcx+15D0h]
amd_sata.sys Fri May 14 18:03:51 2010



Your memory is currently set to 1066Mhz. Set it to its recommended rates: 1333Mhz 9-9-9-24 1.5V.


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-29125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e4a000 PsLoadedModuleList = 0xfffff800`03087e50
Debug session time: Sat Apr 23 03:19:00.115 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:26.988
Loading Kernel Symbols
...............................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F4, {3, fffffa80048a0b30, fffffa80048a0e10, fffff800031c32d0}

c0000005 Exception in ext.Analyze debugger extension.
      PC: 000007fe`ff9b17a6  VA: 00000000`00000001  R/W: 0  Parameter: 00000000`00000000
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa80048a0b30, Terminating object
Arg3: fffffa80048a0e10, Process image file name
Arg4: fffff800031c32d0, Explanatory message (ascii)

Debugging Details:
------------------

c0000005 Exception in ext.analyze debugger extension.
      PC: 000007fe`ff9b17a6  VA: 00000000`00000001  R/W: 0  Parameter: 00000000`00000000




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-33867-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`0303fe50
Debug session time: Sun Apr 24 08:08:30.017 2011 (UTC - 4:00)
System Uptime: 1 days 0:04:11.890
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {15d0, 9, 0, fffff88000dad66a}

Unable to load image \SystemRoot\system32\drivers\amd_sata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_sata.sys
*** ERROR: Module load completed but symbols could not be loaded for amd_sata.sys
Probably caused by : amd_sata.sys ( amd_sata+266a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000015d0, memory referenced
Arg2: 0000000000000009, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000dad66a, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030aa0e0
 00000000000015d0 

CURRENT_IRQL:  9

FAULTING_IP: 
amd_sata+266a
fffff880`00dad66a 488b81d0150000  mov     rax,qword ptr [rcx+15D0h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  plugin-contain

TRAP_FRAME:  fffff88007b279a0 -- (.trap 0xfffff88007b279a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dad66a rsp=fffff88007b27b30 rbp=fffff88007b27ca0
 r8=0000000000000029  r9=0000000000000000 r10=fffffa8004273008
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
amd_sata+0x266a:
fffff880`00dad66a 488b81d0150000  mov     rax,qword ptr [rcx+15D0h] ds:00000000`000015d0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e71ca9 to fffff80002e72740

STACK_TEXT:  
fffff880`07b27858 fffff800`02e71ca9 : 00000000`0000000a 00000000`000015d0 00000000`00000009 00000000`00000000 : nt!KeBugCheckEx
fffff880`07b27860 fffff800`02e70920 : 00000000`0054c18c fffffa80`0427ef70 fffff880`009e8180 fffff800`02e7f618 : nt!KiBugCheckDispatch+0x69
fffff880`07b279a0 fffff880`00dad66a : 00000000`00000000 fffffa80`04273008 fffffa80`04274b68 fffff880`00dae8a0 : nt!KiPageFault+0x260
fffff880`07b27b30 00000000`00000000 : fffffa80`04273008 fffffa80`04274b68 fffff880`00dae8a0 fffffa80`04274b28 : amd_sata+0x266a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
amd_sata+266a
fffff880`00dad66a 488b81d0150000  mov     rax,qword ptr [rcx+15D0h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  amd_sata+266a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amd_sata

IMAGE_NAME:  amd_sata.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4bedc8c7

FAILURE_BUCKET_ID:  X64_0xD1_amd_sata+266a

BUCKET_ID:  X64_0xD1_amd_sata+266a

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-22994-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e64000 PsLoadedModuleList = 0xfffff800`030a1e50
Debug session time: Sun Apr 24 12:09:53.308 2011 (UTC - 4:00)
System Uptime: 0 days 0:32:18.180
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {15d0, 9, 0, fffff88000dd166a}

Unable to load image \SystemRoot\system32\drivers\amd_sata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_sata.sys
*** ERROR: Module load completed but symbols could not be loaded for amd_sata.sys
Probably caused by : amd_sata.sys ( amd_sata+266a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000015d0, memory referenced
Arg2: 0000000000000009, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000dd166a, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310c0e0
 00000000000015d0 

CURRENT_IRQL:  9

FAULTING_IP: 
amd_sata+266a
fffff880`00dd166a 488b81d0150000  mov     rax,qword ptr [rcx+15D0h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c880 -- (.trap 0xfffff80000b9c880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dd166a rsp=fffff80000b9ca10 rbp=fffff80000b9cb80
 r8=0000000000000029  r9=0000000000000000 r10=fffffa8004255008
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
amd_sata+0x266a:
fffff880`00dd166a 488b81d0150000  mov     rax,qword ptr [rcx+15D0h] ds:00000000`000015d0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ed3ca9 to fffff80002ed4740

STACK_TEXT:  
fffff800`00b9c738 fffff800`02ed3ca9 : 00000000`0000000a 00000000`000015d0 00000000`00000009 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c740 fffff800`02ed2920 : 00000002`00000001 fffffa80`04260f70 00000000`00000010 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c880 fffff880`00dd166a : 00000000`ffffffff fffffa80`04255008 fffffa80`04256b68 fffff880`00dd28a0 : nt!KiPageFault+0x260
fffff800`00b9ca10 00000000`ffffffff : fffffa80`04255008 fffffa80`04256b68 fffff880`00dd28a0 fffffa80`04256b28 : amd_sata+0x266a
fffff800`00b9ca18 fffffa80`04255008 : fffffa80`04256b68 fffff880`00dd28a0 fffffa80`04256b28 fffff800`00b9ca60 : 0xffffffff
fffff800`00b9ca20 fffffa80`04256b68 : fffff880`00dd28a0 fffffa80`04256b28 fffff800`00b9ca60 00000000`ffffffff : 0xfffffa80`04255008
fffff800`00b9ca28 fffff880`00dd28a0 : fffffa80`04256b28 fffff800`00b9ca60 00000000`ffffffff fffff880`00dd1a62 : 0xfffffa80`04256b68
fffff800`00b9ca30 fffffa80`04256b28 : fffff800`00b9ca60 00000000`ffffffff fffff880`00dd1a62 fffffa80`04aa8030 : amd_sata+0x38a0
fffff800`00b9ca38 fffff800`00b9ca60 : 00000000`ffffffff fffff880`00dd1a62 fffffa80`04aa8030 fffff800`00b9ca98 : 0xfffffa80`04256b28
fffff800`00b9ca40 00000000`ffffffff : fffff880`00dd1a62 fffffa80`04aa8030 fffff800`00b9ca98 fffff800`00000001 : 0xfffff800`00b9ca60
fffff800`00b9ca48 fffff880`00dd1a62 : fffffa80`04aa8030 fffff800`00b9ca98 fffff800`00000001 fffffa80`04260f70 : 0xffffffff
fffff800`00b9ca50 fffffa80`04aa8030 : fffff800`00b9ca98 fffff800`00000001 fffffa80`04260f70 00000000`00000000 : amd_sata+0x2a62
fffff800`00b9ca58 fffff800`00b9ca98 : fffff800`00000001 fffffa80`04260f70 00000000`00000000 fffff880`010cc0a3 : 0xfffffa80`04aa8030
fffff800`00b9ca60 fffff800`00000001 : fffffa80`04260f70 00000000`00000000 fffff880`010cc0a3 fffff800`fffffff8 : 0xfffff800`00b9ca98
fffff800`00b9ca68 fffffa80`04260f70 : 00000000`00000000 fffff880`010cc0a3 fffff800`fffffff8 fffff800`02ed0347 : 0xfffff800`00000001
fffff800`00b9ca70 00000000`00000000 : fffff880`010cc0a3 fffff800`fffffff8 fffff800`02ed0347 fffffa80`00000000 : 0xfffffa80`04260f70


STACK_COMMAND:  kb

FOLLOWUP_IP: 
amd_sata+266a
fffff880`00dd166a 488b81d0150000  mov     rax,qword ptr [rcx+15D0h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  amd_sata+266a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amd_sata

IMAGE_NAME:  amd_sata.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4bedc8c7

FAILURE_BUCKET_ID:  X64_0xD1_amd_sata+266a

BUCKET_ID:  X64_0xD1_amd_sata+266a

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f33000 fffff880`00f8a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c9b000 fffff880`02d25000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03b97000 fffff880`03bad000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dcf000 fffff880`00de5000   amd_sata amd_sata.sys Fri May 14 18:03:51 2010 (4BEDC8C7)
fffff880`01120000 fffff880`0112b000   amd_xata amd_xata.sys Fri May 14 18:03:52 2010 (4BEDC8C8)
fffff880`011eb000 fffff880`01200000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0112b000 fffff880`01149000   amdsata  amdsata.sys  Tue May 19 13:53:21 2009 (4A12F211)
fffff880`01149000 fffff880`01154000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03c95000 fffff880`03ce4000   Apfiltr  Apfiltr.sys  Fri Apr 09 04:01:50 2010 (4BBEDEEE)
fffff880`00d9c000 fffff880`00da5000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da5000 fffff880`00dcf000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04467000 fffff880`045e6000   athrx    athrx.sys    Fri Nov 06 15:56:02 2009 (4AF48D62)
fffff880`03a6f000 fffff880`03aa3000   atikmpag atikmpag.sys Tue Jul 13 05:51:00 2010 (4C3C3704)
fffff880`0163a000 fffff880`01642000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`03cef000 fffff880`0435e000   atipmdag atipmdag.sys Tue Jul 13 06:32:12 2010 (4C3C40AC)
fffff880`00e00000 fffff880`00e0c000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`0147a000 fffff880`01481000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ded000 fffff880`02dfe000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03987000 fffff880`039a5000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00600000 fffff960`00627000   cdd      cdd.dll      unavailable (00000000)
fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cab000 fffff880`00d6b000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01400000 fffff880`01430000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c4d000 fffff880`00cab000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043d7000 fffff880`043db500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01481000 fffff880`014f4000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00ff2000 fffff880`00ffb000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`043dc000 fffff880`043ec000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05f36000 fffff880`05f44000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c77000 fffff880`02c95000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`017e6000 fffff880`017fc000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04950000 fffff880`04972000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05f4e000 fffff880`05f64000   dump_amd_sata dump_amd_sata.sys Fri May 14 18:03:51 2010 (4BEDC8C7)
fffff880`05f44000 fffff880`05f4e000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05f64000 fffff880`05f77000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05f2a000 fffff880`05f36000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03aa3000 fffff880`03b97000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0435e000 fffff880`043a4000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`011a0000 fffff880`011b4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01154000 fffff880`011a0000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01505000 fffff880`0150f000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015a5000 fffff880`015df000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0150f000 fffff880`01559000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e1b000 fffff800`02e64000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`043a4000 fffff880`043c8000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`038b5000 fffff880`0397d000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017dd000 fffff880`017e6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03c68000 fffff880`03c86000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03c86000 fffff880`03c95000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bc9000 fffff800`00bd3000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04818000 fffff880`0485b000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013e5000 fffff880`013ff000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01798000 fffff880`017c3000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04972000 fffff880`04977200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05c82000 fffff880`05c97000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c3e000 fffff880`05c61000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c2c000 fffff880`00c39000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05fc4000 fffff880`05fd2000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`043c8000 fffff880`043d7000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00d82000 fffff880`00d9c000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`039a5000 fffff880`039bd000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`039bd000 fffff880`039ea000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`03800000 fffff880`0384e000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`0384e000 fffff880`03871000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0108c000 fffff880`01097000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f93000 fffff880`00f9d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017cb000 fffff880`017dd000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01646000 fffff880`01738000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043ec000 fffff880`043f8000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05fd2000 fffff880`05fe5000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03bd1000 fffff880`03c00000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`048c7000 fffff880`048dc000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02daf000 fffff880`02dbe000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d25000 fffff880`02d6a000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01738000 fffff880`01798000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01097000 fffff880`010a8000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e64000 fffff800`03441000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01242000 fffff880`013e5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01471000 fffff880`0147a000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05c97000 fffff880`05cea000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d73000 fffff880`02d99000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fdd000 fffff880`00ff2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f9d000 fffff880`00fd0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00d6b000 fffff880`00d72000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d72000 fffff880`00d82000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014f4000 fffff880`01505000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06613000 fffff880`066b9000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04913000 fffff880`04950000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c39000 fffff880`00c4d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`011b4000 fffff880`011bfe00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`03bad000 fffff880`03bd1000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03a00000 fffff880`03a1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03a1b000 fffff880`03a3c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03a3c000 fffff880`03a56000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0122a000 fffff880`01233000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01233000 fffff880`0123c000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01083000 fffff880`0108c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01600000 fffff880`0163a000   rdyboost rdyboost.sys Sat Jun 19 00:25:06 2010 (4C1C46A2)
fffff880`05fe5000 fffff880`05ffd000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03c00000 fffff880`03c57000   Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
fffff880`048dc000 fffff880`04912d80   RtHDMIVX RtHDMIVX.sys Tue Jan 26 22:04:58 2010 (4B5FAD5A)
fffff880`05cfa000 fffff880`05f29800   RTKVHD64 RTKVHD64.sys Wed Mar 17 04:49:15 2010 (4BA0978B)
fffff880`05c00000 fffff880`05c3e000   RtsUStor RtsUStor.sys Thu Mar 11 22:23:06 2010 (4B99B39A)
fffff880`066b9000 fffff880`066c4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04463000 fffff880`04465f00   SFEP     SFEP.sys     Fri Nov 27 00:39:13 2009 (4B0F6601)
fffff880`017c3000 fffff880`017cb000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0676a000 fffff880`067ff000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06703000 fffff880`0676a000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`066c4000 fffff880`066f1000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`010be000 fffff880`01120000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`045fe000 fffff880`045ff480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`066f1000 fffff880`06703000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011de000 fffff880`011eb000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011c0000 fffff880`011de000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dd9000 fffff880`02ded000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`00c00000 fffff880`00c26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0485b000 fffff880`0486d000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05f77000 fffff880`05f94000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05f94000 fffff880`05f95f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03c57000 fffff880`03c68000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04456000 fffff880`04463000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`0486d000 fffff880`048c7000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`045f3000 fffff880`045fe000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04400000 fffff880`04456000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05f96000 fffff880`05fc3200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00fd0000 fffff880`00fdd000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`015df000 fffff880`015ed000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0105e000 fffff880`01083000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e0c000 fffff880`00e21000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e21000 fffff880`00e7d000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01559000 fffff880`015a5000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`045e6000 fffff880`045f3000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d99000 fffff880`02daf000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0397d000 fffff880`03987000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`02dbe000 fffff880`02dd9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015ed000 fffff880`015fd000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e80000 fffff880`00f24000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f24000 fffff880`00f33000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d6a000 fffff880`02d73000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`00312000   win32k   win32k.sys   unavailable (00000000)
fffff880`00f8a000 fffff880`00f93000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05c61000 fffff880`05c82000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`04978000 fffff880`049e9000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01430000 fffff880`0143e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0143e000 fffff880`01448000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`01448000 fffff880`0145e000   dump_amd_sat
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00016000
fffff880`0145e000 fffff880`01471000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
How do I change the memory setting?

It's not the same for all bioses, often under Advanced DRAM Configuration.

Another option is to reset the entire bios by loading setup/fail-safe/optimized defaults.
 
Hi, the BIOS is all locked up, the only changeable settings are time and date, computer password, amd virtualization and that is it. Any other options or ideas into fixing this?
 
No, the only way is to enter bios setup and make the necessary adjustments.

(how to reset bios password - Google Search)

~~~~~~~

Sometimes OC-ing tools like Turbo Boost can affect clocks, but I don't see any such things in your crash dumps. Test the hard drive since the crash records all point to AMD AHCI (SATA) Controller - see if the hdd SMART tests come up clean. If no errors but still crashing, you need to set the memory right for sure.
 
Thanks for all the help, you can close this thread. It got to the point where the comp wouldn't even make it completing a boot up and Since it was new I just got warranty techs to come and fix it. New hard drive same problem so now I'm getting a new Mobo tomorrow to see if that was the problem. Even the techs are scratching their heads at it. Again thanks.
 
It could have been bad motherboard, namely bad SATA controller - since all of your crashes were caused by it. No wonder.
 
Back
Top