Windows 7 Unknown BSOD occuring when starting games

None of the drivers before 10.10 work, that is install and change the screen res to something other than 640x480
 
None of the drivers before 10.10 work ...

Look it's too bad to be true: they may have issues but they do work, as I'm an ATI user myself and have tried them all.

Beta and RC drivers are known to cause all kinds of BSOD's. I would at least uninstall the Catalyst.


Code:
[B]
IRQL_NOT_LESS_OR_EQUAL (a)
Probably caused by : memory_corruption



~~~~~~~~~~~~~

REGISTRY_ERROR (51)
Something has gone badly wrong with the registry

Pausible causes:

-- the registry encountered an I/O error while trying to read one of its files. This can be caused by hardware problems or file system corruption;

-- a failure in a refresh operation, which is used only in by the security system, and then only when resource limits are encountered;
[/B]


If sorting the drivers does not help then reformat and reinstall to test for bsod's. In this case do not install all drivers at once, first do without them at all for a couple of days. If it crashes without the drivers - this will be hardware fault. Then each day add them one by one to see which one initiates blue screens.
 
Ok it appears to be fixed. I disabled the AMD cards audio drivers and disabled C1E in the bios. Maybe conflicting audio drivers was the problem...
 
Ok it appears to be fixed. I disabled the AMD cards audio drivers and disabled C1E in the bios. Maybe conflicting audio drivers was the problem...


C1E controls your CPU clock, it is not a very good idea to disable it if the option is supported by the CPU.

As for disabling the onboard audio - not a good idea either. Updating them would be a better solution.
 
It's the audio that came with the graphics card that was disabled. The realtek drivers still remain. As for C1E, the people who sold me the computer said that it was a power saving option and that the computer should run just fine with it turned off. Thanks for your help.

EDIT: What I did was give it back to the shop that sold it to me and they fiddled around with settings and swapped parts etc. They told me what they did to it afterwards.
 
Ok it looks like they told me it was fixed when it wasn't. It's crashed 4-5 times while I've tried to write this message alone. Here are some dumps. I reinstalled my antivirus and anydvd as they were not causing it to crash. I was getting just as many BSODs with them uninstalled as I was without.
 

Attachments

  • 011811-25303-01.dmp
    280.3 KB · Views: 321
  • 011811-19890-01.dmp
    280.4 KB · Views: 314
Uninstall ATI Catalyst. If it still crashes, RAM is the problem.




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\10679d1295300579-unknown-bsod-occuring-when-starting-games-011811-19890-01-dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03613000 PsLoadedModuleList = 0xfffff800`03850e50
Debug session time: Mon Jan 17 16:30:47.297 2011 (UTC - 5:00)
System Uptime: 0 days 0:25:21.624
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffffa7cffffffe0, 2, 1, fffff800036a8f9e}

Probably caused by : memory_corruption ( nt!MiRemoveAnyPage+13e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa7cffffffe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800036a8f9e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800038bb0e0
 fffffa7cffffffe0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiRemoveAnyPage+13e
fffff800`036a8f9e f0410fba6c241000 lock bts dword ptr [r12+10h],0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  Steam.exe

TRAP_FRAME:  fffff880094ad220 -- (.trap 0xfffff880094ad220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007ffffff0000 rbx=0000000000000000 rcx=00000000000005c0
rdx=00000000000bf2c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036bdc60 rsp=fffff880094ad3b0 rbp=fffff880094ad8e0
 r8=00000000000bf1d0  r9=fffff880094ad3e0 r10=fffff880094ad340
r11=fffff880094ad3a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiDispatchException+0x3df:
fffff800`036bdc60 418a07          mov     al,byte ptr [r15] ds:d3e0:00000000`00000000=??
Resetting default scope

EXCEPTION_RECORD:  fffff880094adb78 -- (.exr 0xfffff880094adb78)
ExceptionAddress: 00000000776a89d4
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000000006efde028
Attempt to read from address 000000006efde028

LAST_CONTROL_TRANSFER:  from fffff80003682ca9 to fffff80003683740

STACK_TEXT:  
fffff880`094acbd8 fffff800`03682ca9 : 00000000`0000000a fffffa7c`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`094acbe0 fffff800`03681920 : 00000000`000bdfff 00000000`000000e8 00000000`00000000 00000000`000bd000 : nt!KiBugCheckDispatch+0x69
fffff880`094acd20 fffff800`036a8f9e : 00000246`002b002b 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
fffff880`094aceb0 fffff800`036a12c7 : 00000000`00000002 fffff880`00000002 fffffa80`07858ec8 00000000`00000002 : nt!MiRemoveAnyPage+0x13e
fffff880`094acfd0 fffff800`0369d9c6 : 00000000`00000000 00000000`000bed00 fffff880`094ad220 fffff680`000005f0 : nt!MiResolveDemandZeroFault+0x577
fffff880`094ad0c0 fffff800`0368182e : 00000000`00000000 fffff880`094adb78 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5c6
fffff880`094ad220 fffff800`036bdc60 : fffff880`094adb78 fffff880`094ad8e0 fffff880`094adc20 00000000`0018dd24 : nt!KiPageFault+0x16e
fffff880`094ad3b0 fffff800`03682d82 : fffff880`094adb78 00000000`77754728 fffff880`094adc20 00000000`77754724 : nt!KiDispatchException+0x3df
fffff880`094ada40 fffff800`036818fa : 00000000`00000000 00000000`77754728 00000000`00000001 fffffa80`079c24d0 : nt!KiExceptionDispatch+0xc2
fffff880`094adc20 00000000`776a89d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
00000000`000bf2c4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776a89d4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiRemoveAnyPage+13e
fffff800`036a8f9e f0410fba6c241000 lock bts dword ptr [r12+10h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiRemoveAnyPage+13e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MiRemoveAnyPage+13e

BUCKET_ID:  X64_0xA_nt!MiRemoveAnyPage+13e

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\10678d1295300576-unknown-bsod-occuring-when-starting-games-011811-25303-01-dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03603000 PsLoadedModuleList = 0xfffff800`03840e50
Debug session time: Mon Jan 17 16:33:51.657 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:30.359
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 60040, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000060040
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  DWWIN.EXE

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880086a06c0 -- (.trap 0xfffff880086a06c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0008000a02280008 rbx=0000000000000000 rcx=0000000000060040
rdx=0008000a02280007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000367e960 rsp=fffff880086a0850 rbp=0000000000000000
 r8=0008000a02280008  r9=0000000000000000 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ObFastReferenceObject+0x20:
fffff800`0367e960 f0480fb111      lock cmpxchg qword ptr [rcx],rdx ds:0488:00000000`00060040=0008000a02280008
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000361fb7a to fffff80003673740

STACK_TEXT:  
fffff880`086a0558 fffff800`0361fb7a : 00000000`0000001a 00000000`00041287 00000000`00060040 00000000`00000000 : nt!KeBugCheckEx
fffff880`086a0560 fffff800`0367182e : 00000000`00000001 00000000`000004b4 fffff800`03802800 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`086a06c0 fffff800`0367e960 : fffff700`01080000 fffffa80`03504060 fffff680`003b6f30 fffffa80`03b533f8 : nt!KiPageFault+0x16e
fffff880`086a0850 fffff800`036e27d0 : 00000000`00000993 00000000`000004b4 00000000`00000000 fffffa80`053a8748 : nt!ObFastReferenceObject+0x20
fffff880`086a0880 fffff800`03699b83 : 99300001`1ac02025 80000001`1ac02121 fffff880`086a09f8 fffffa80`00000000 : nt! ?? ::FNODOBFM::`string'+0x29873
fffff880`086a0910 fffff800`0368f5be : 00000000`00000000 00000000`76de6110 fffff680`003b6f30 fffffa80`03b533f8 : nt!MiResolveProtoPteFault+0x1d3
fffff880`086a09b0 fffff800`0368d743 : 00000000`00000000 00000000`76de6110 00000000`00000000 fffff800`00000000 : nt!MiDispatchFault+0x1de
fffff880`086a0ac0 fffff800`0367182e : 00000000`00000000 00000000`00000000 00000000`0422f101 fffffa80`c0000034 : nt!MmAccessFault+0x343
fffff880`086a0c20 00000000`76d2cc66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0422f070 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d2cc66


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`0361fb7a cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`03fb6000 fffff880`03ff4000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00efe000 fffff880`00f55000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02ce6000 fffff880`02d70000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0431b000 fffff880`04331000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04254000 fffff880`04268000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03f98000 fffff880`03fad000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e2e000 fffff880`00e42000   amdsata  amdsata.sys  Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`01073000 fffff880`0107e000   amdxata  amdxata.sys  Wed Oct 07 16:13:10 2009 (4ACCF656)
fffff880`04800000 fffff880`04823000   AnyDVD   AnyDVD.sys   Wed Dec 01 14:06:20 2010 (4CF69CAC)
fffff880`07c96000 fffff880`07ca1000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc4000 fffff880`00dee000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0484f000 fffff880`05060000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`03e00000 fffff880`03e4c000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`019d4000 fffff880`019dc000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff960`00840000 fffff960`008a1000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
fffff880`01846000 fffff880`0184d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f61000 fffff880`03f72000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04766000 fffff880`04784000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Tue Nov 02 00:59:22 2010 (4CCF9AAA)
fffff880`01813000 fffff880`0183d000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`019a4000 fffff880`019d4000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d0a000 fffff880`00d68000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0113c000 fffff880`011af000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0430b000 fffff880`0431b000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04671000 fffff880`0467a000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`06a6e000 fffff880`06a7c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ec0000 fffff880`03f43000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f43000 fffff880`03f61000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02ccf000 fffff880`02cde000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0198e000 fffff880`019a4000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0537d000 fffff880`0539f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06a88000 fffff880`06a91000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06a7c000 fffff880`06a88000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06a91000 fffff880`06aa4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06aa4000 fffff880`06ab0000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`05060000 fffff880`05154000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 22:51:31 2010 (4CCF7CB3)
fffff880`05154000 fffff880`0519a000   dxgmms1  dxgmms1.sys  Mon Nov 01 22:50:56 2010 (4CCF7C90)
fffff880`06ae8000 fffff880`06bc0000   eamonm   eamonm.sys   Fri Aug 13 08:38:55 2010 (4C653CDF)
fffff880`0184d000 fffff880`01872000   ehdrv    ehdrv.sys    Wed Jul 14 04:14:21 2010 (4C3D71DD)
fffff880`02cc3000 fffff880`02ccf000   ElbyCDIO ElbyCDIO.sys Thu Dec 16 17:58:13 2010 (4D0A9985)
fffff880`0467a000 fffff880`0469b000   epfwwfpr epfwwfpr.sys Wed Jul 14 04:10:34 2010 (4C3D70FA)
fffff880`010ca000 fffff880`010de000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0107e000 fffff880`010ca000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01954000 fffff880`0198e000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`011af000 fffff880`011f9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`03bdf000 fffff800`03c28000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0519a000 fffff880`051be000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`052e4000 fffff880`05340000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`02754000 fffff880`0276d000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0276d000 fffff880`02775080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`02746000 fffff880`02754000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0469e000 fffff880`04766000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0194b000 fffff880`01954000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`043f1000 fffff880`04400000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02793000 fffff880`027a1000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bab000 fffff800`00bb5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04211000 fffff880`04254000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d2000 fffff880`013ec000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0158f000 fffff880`015ba000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0539f000 fffff880`053a4200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02600000 fffff880`02615000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`027af000 fffff880`027d2000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce9000 fffff880`00cf6000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`027a1000 fffff880`027af000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04200000 fffff880`0420f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02776000 fffff880`02783000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04784000 fffff880`0479c000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0479c000 fffff880`047c9000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`04600000 fffff880`0464e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0464e000 fffff880`04671000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`00e23000 fffff880`00e2e000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`015f5000 fffff880`01600000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f5e000 fffff880`00f68000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010de000 fffff880`0113c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02cb8000 fffff880`02cc3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01939000 fffff880`0194b000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0143d000 fffff880`0152f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04355000 fffff880`04361000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06bc0000 fffff880`06bd3000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04361000 fffff880`04390000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`052cf000 fffff880`052e4000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c00000 fffff880`02c0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d70000 fffff880`02db5000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0152f000 fffff880`0158f000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02620000 fffff880`02739000   netr28ux netr28ux.sys Mon Apr 19 08:25:12 2010 (4BCC4BA8)
fffff880`01400000 fffff880`01411000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02cac000 fffff880`02cb8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03603000 fffff800`03bdf000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122f000 fffff880`013d2000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0183d000 fffff880`01846000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03ea2000 fffff880`03eba000   nusb3hub nusb3hub.sys Mon Jul 26 20:45:44 2010 (4C4E2C38)
fffff880`051be000 fffff880`051ee000   nusb3xhc nusb3xhc.sys Mon Jul 26 20:45:44 2010 (4C4E2C38)
fffff880`053a5000 fffff880`053f8000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02dbe000 fffff880`02de4000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`042ee000 fffff880`0430b000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fa8000 fffff880`00fbd000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f75000 fffff880`00fa8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fd2000 fffff880`00fd9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fd9000 fffff880`00fe9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ec000 fffff880`013fd000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`07ca4000 fffff880`07d4a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`02783000 fffff880`02793000   point64  point64.sys  Tue Jun 29 04:54:31 2010 (4C29B4C7)
fffff880`05340000 fffff880`0537d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf6000 fffff880`00d0a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04331000 fffff880`04355000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04390000 fffff880`043ab000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`043ab000 fffff880`043cc000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`043cc000 fffff880`043e6000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c5b000 fffff880`02cac000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`043e6000 fffff880`043f1000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`015da000 fffff880`015e3000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015e3000 fffff880`015ec000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015ec000 fffff880`015f5000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018ff000 fffff880`01939000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`06bd3000 fffff880`06beb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0427c000 fffff880`042e2000   Rt64win7 Rt64win7.sys Tue Nov 30 01:01:28 2010 (4CF49338)
fffff880`06812000 fffff880`06a6dd80   RTKVHD64 RTKVHD64.sys Fri Sep 03 04:02:27 2010 (4C80AB93)
fffff880`07d4a000 fffff880`07d55000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`042e2000 fffff880`042ee000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02c0f000 fffff880`02c2c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018f7000 fffff880`018ff000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07c00000 fffff880`07c96000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`07d94000 fffff880`07dfb000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`07d55000 fffff880`07d82000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`01011000 fffff880`01073000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`0420f000 fffff880`04210480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`07d82000 fffff880`07d94000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0142f000 fffff880`0143c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01411000 fffff880`0142f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c47000 fffff880`02c5b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03f72000 fffff880`03f98000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04268000 fffff880`0427a000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06acd000 fffff880`06ae7c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06ab0000 fffff880`06acd000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`051ee000 fffff880`051eff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0482e000 fffff880`0483f000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05275000 fffff880`052cf000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04823000 fffff880`0482e000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e4c000 fffff880`03ea2000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f68000 fffff880`00f75000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01872000 fffff880`01880000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01880000 fffff880`018a5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015ba000 fffff880`015ca000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fbd000 fffff880`00fd2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d68000 fffff880`00dc4000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`018ab000 fffff880`018f7000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02739000 fffff880`02746000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02de4000 fffff880`02dfa000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02c2c000 fffff880`02c47000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015ca000 fffff880`015da000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e4b000 fffff880`00eef000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eef000 fffff880`00efe000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02db5000 fffff880`02dbe000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00030000 fffff960`00340000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`03fad000 fffff880`03fb6000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f55000 fffff880`00f5e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`027d2000 fffff880`027f3000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`019dc000 fffff880`019ea000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019ea000 fffff880`019f6000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019f6000 fffff880`019ff000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01800000 fffff880`01813000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
I removed catylyst, swapped gpus and replaced the ram and still BSODed. I then replaced the motherboard, and put back the old ram and old gpu. It's been running fine now for about a week. Thanks for your help, turns out it was the motherboard all along :redface:
 
I then replaced the motherboard, and put back the old ram and old gpu. It's been running fine now for about a week. Thanks for your help, turns out it was the motherboard all along

Thanks for updating. Whenever a thread gets 2 pages or more - it's either RAM or motherboard for sure. :)
 
Oh no. I BSODed twice today. SYSTEM_SERVICE_EXCEPTION. I don't get it, I have a new motherboard in and it hasn't BSODed for over 2 weeks... Please help.
 

Attachments

  • 013111-26379-01.dmp
    280.6 KB · Views: 328
  • 013111-22994-01.dmp
    280.9 KB · Views: 305
Caused by Catalyst 10.12 - uninstall it with the use of the driver sweeper and install Catalyst 11.1.



Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\013111-26379-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`03805000 PsLoadedModuleList = 0xfffff800`03a42e50
Debug session time: Sun Jan 30 17:25:17.753 2011 (UTC - 5:00)
System Uptime: 0 days 1:18:09.080
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88004944817, fffff88008a5f8f0, 0}

Unable to load image atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : atikmdag.sys ( atikmdag+90817 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88004944817, Address of the instruction which caused the bugcheck
Arg3: fffff88008a5f8f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
atikmdag+90817
fffff880`04944817 8b4820          mov     ecx,dword ptr [rax+20h]

CONTEXT:  fffff88008a5f8f0 -- (.cxr 0xfffff88008a5f8f0)
rax=0000000000000000 rbx=fffffa8005458a10 rcx=fffffa80039df1f0
rdx=0000000000000000 rsi=0000000000000015 rdi=fffffa80069fe010
rip=fffff88004944817 rsp=fffff88008a602d0 rbp=fffffa80039df1f0
 r8=0000000000000015  r9=fffff88004d06970 r10=0000000000000000
r11=fffff88008a60420 r12=0000000000000000 r13=fffffa8007a3cd00
r14=0000000000000001 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
atikmdag+0x90817:
fffff880`04944817 8b4820          mov     ecx,dword ptr [rax+20h] ds:002b:00000000`00000020=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff88008a60001 to fffff88004944817

STACK_TEXT:  
fffff880`08a602d0 fffff880`08a60001 : 00000000`00000001 00000000`00000000 fffffa80`069f6ac8 fffff880`04d029f0 : atikmdag+0x90817
fffff880`08a602d8 00000000`00000001 : 00000000`00000000 fffffa80`069f6ac8 fffff880`04d029f0 fffff880`04c3d21f : 0xfffff880`08a60001
fffff880`08a602e0 00000000`00000000 : fffffa80`069f6ac8 fffff880`04d029f0 fffff880`04c3d21f fffffa80`05458a10 : 0x1


FOLLOWUP_IP: 
atikmdag+90817
fffff880`04944817 8b4820          mov     ecx,dword ptr [rax+20h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  atikmdag+90817

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cef1f94

STACK_COMMAND:  .cxr 0xfffff88008a5f8f0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_atikmdag+90817

BUCKET_ID:  X64_0x3B_atikmdag+90817

Followup: MachineOwner
---------





start             end                 module name
fffff880`048b4000 fffff880`050c5000   atikmdag T (no symbols)           
    Loaded symbol image file: atikmdag.sys
    Image path: atikmdag.sys
    Image name: atikmdag.sys
    Timestamp:        Thu Nov 25 21:46:44 2010 (4CEF1F94)
    CheckSum:         007CA105
    ImageSize:        00811000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
 
Yes that fixed it. It also might have been overheating as the ventilation around the tower wasn't very good.
Thankyou very much :D
 
Last edited:
Back
Top Bottom