Frequent BSOD


  1. Posts : 2
    Windows 7 Home Premium 64bit
       #1

    Frequent BSOD


    I've had constant blue screens for a year after installing a new graphics card, a Radeon 4550, and power supply(can't remember brand, I know it's rated for 450W though). The problem is becoming much too frequent and frustrating to ignore any more. I get it on startup, browsing the internet, playing games, and very, very often when watching streaming videos.

    - x86 (32-bit) or x64 ? x64
    - the original installed OS on the system? Windows XP Media Centre
    - an OEM or full retail version? full retail

    - What is the age of system? 5 years old
    - What is the age of OS installation? reinstalled one week ago with RAID1(mirror)

    The most common error is irql not less or equal.
    Thanks in advance for the help.
      My Computer


  2. Posts : 2,566
    Win 7 Pro x64 SP1 OS X Snow Leopard 10.6.7
       #2

    Hello,

    Your dumps were way back before Christmas (21/12/10) and blames on hardware.

    1. Old Drivers
    Update drivers or uninstall software associated with driver. Old drivers can cause BSOD.

    agrsm64.sys Tue Nov 11 04:01:35 2008
    Agere Modem - Unable to find updates for this on Agere Website - you may need to upgrade your modem card.

    2. Find faulty hardware
    Dump blames faulty hardware, you will need to find which hardware is causing BSOD.

    RAM: RAM - Test with Memtest86+
    RAM 2: Memory Diagnostics Tool
    CPU: https://www.sevenforums.com/tutorials...t-prime95.html
    GPU: Video Card - Stress Test with Furmark

    Once you finish a test, post a screenshot and post back some results. I will grab a hardware guru when you finish a test.
    Use CoreTemp for CPU Monitoring. (Core Temp)
      My Computer


  3. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #3

    I looked at your four most recent dumps. Each has a different bugcheck code and all four indicated memory corruption. Two directly blame memory corruption. Memory corruption can be caused by several different things. You will have to troubleshoot.

    As Dean said, you have some outdated drivers. Some of your drivers are quite obsolete. Out of date drivers can cause memory corruption and BSOD's. Update these drivers or upgrade the software/hardware they are associated with.
    agrsm64.sys Mon Nov 10 10:01:35 2008 - Agere Systems Soft Modem, part of LSI Logic - Support and Downloads. Update this driver or upgrade your modem. If you do not use a modem, you can rename this driver. See note below.

    athrx.sys Tue Jun 09 14:06:49 2009 - Atheros network adapter driver. Atheros Communications. Update this driver.

    cxfalcon_IBV64.sys Mon May 11 04:18:10 2009 - Conexant Falcon Driver. Conexant: Support. Update this driver.

    efe5b32e.sys Fri Nov 16 13:59:04 2007 - Intel(R) PRO/100 Adapter NDIS 5.1 driver. Intel® Product Support this driver or upgrade your network adapter.
       Note
    Renaming drivers: create a restore point, using Windows Explorer, navigate to C:\Windows\System32\Drivers, locate the driver files, and rename them from .sys to .old. Reboot and the drivers will not load. This will break whatever software or hardware these drivers are associated with.

    Take care of these drivers. Reboot and see how your system runs. Post back and let us know. If you get another BSOD, upload it and we will start testing hardware.
    Code:
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0285e000 PsLoadedModuleList = 0xfffff800`02a9be50
    Debug session time: Thu Jan 21 12:13:18.605 2010 (GMT-5)
    System Uptime: 0 days 0:01:14.511
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8801981e5b8, 0, fffff8800160727b, 2}
    
    
    Could not read faulting driver name
    Probably caused by : rdyboost.sys ( rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8801981e5b8, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff8800160727b, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b060e0
     fffff8801981e5b8 
    
    FAULTING_IP: 
    rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3
    fffff880`0160727b 488b4cc308      mov     rcx,qword ptr [rbx+rax*8+8]
    
    MM_INTERNAL_CODE:  2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880037ac930 -- (.trap 0xfffff880037ac930)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000002c0e35a rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800160727b rsp=fffff880037acac0 rbp=fffff880037acb10
     r8=fffffa8003648000  r9=fffffa8003648010 r10=0000000000000001
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po nc
    rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+0xb3:
    fffff880`0160727b 488b4cc308      mov     rcx,qword ptr [rbx+rax*8+8] ds:cb00:00000000`16071ad8=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000294dbc2 to fffff800028cff00
    
    STACK_TEXT:  
    fffff880`037ac7c8 fffff800`0294dbc2 : 00000000`00000050 fffff880`1981e5b8 00000000`00000000 fffff880`037ac930 : nt!KeBugCheckEx
    fffff880`037ac7d0 fffff800`028cdfee : 00000000`00000000 fffff880`037acae0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40f90
    fffff880`037ac930 fffff880`0160727b : fffff880`037acae0 00000000`047177a6 fffff880`037acb10 fffff880`016071af : nt!KiPageFault+0x16e
    fffff880`037acac0 fffff880`01606858 : fffffa80`03362bd0 fffffa80`0578fff3 fffffa80`03310118 fffffa80`03648000 : rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+0xb3
    fffff880`037acb50 fffff880`0160f607 : 00000000`0000000a 00000000`00000001 fffffa80`0518db10 fffffa80`033100b0 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageRemove+0x2d0
    fffff880`037acc80 fffff880`0160e3fe : fffffa80`0518db10 00000000`00000080 00000000`00000080 fffffa80`03310f88 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x22f
    fffff880`037acce0 fffff800`02b73166 : 00000000`00000000 fffff880`00000000 fffffa80`0330ab60 fffffa80`018439e0 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152
    fffff880`037acd40 fffff800`028ae486 : fffff880`009ee180 fffffa80`0330ab60 fffff880`009f8f40 fffff8a0`001fbd98 : nt!PspSystemThreadStartup+0x5a
    fffff880`037acd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3
    fffff880`0160727b 488b4cc308      mov     rcx,qword ptr [rbx+rax*8+8]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: rdyboost
    
    IMAGE_NAME:  rdyboost.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc48a
    
    FAILURE_BUCKET_ID:  X64_0x50_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeIteratorCleanup+b3
    
    BUCKET_ID:  X64_0x50_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeIteratorCleanup+b3
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Thu Jan 21 12:19:26.156 2010 (GMT-5)
    System Uptime: 0 days 0:05:24.062
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3D, {fffff80000b9bf60, 0, 0, fffff800028d0e10}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
    Arguments:
    Arg1: fffff80000b9bf60
    Arg2: 0000000000000000
    Arg3: 0000000000000000
    Arg4: fffff800028d0e10
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    BUGCHECK_STR:  0x3D
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  d
    
    EXCEPTION_RECORD:  fffff80000b9c708 -- (.exr 0xfffff80000b9c708)
    Cannot read Exception record @ fffff80000b9c708
    
    TRAP_FRAME:  fffff80000b9c7b0 -- (.trap 0xfffff80000b9c7b0)
    Unable to read trap frame at fffff800`00b9c7b0
    
    LAST_CONTROL_TRANSFER:  from fffff800028c9469 to fffff800028c9f00
    
    STACK_TEXT:  
    fffff800`00b9b6a8 fffff800`028c9469 : 00000000`0000003d fffff800`00b9bf60 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
    fffff800`00b9b6b0 fffff800`028c57a9 : 00000000`0000efc0 fffff880`040af253 fffff800`00b9bf60 fffff800`028f6e28 : nt!KiBugCheckDispatch+0x69
    fffff800`00b9b7f0 fffff800`028efbed : fffff800`0283c2fc fffff800`02831580 fffff800`0280f000 fffff800`00b9c708 : nt!KiInterruptHandler+0x29
    fffff800`00b9b820 fffff800`028f7250 : fffff800`02a1799c fffff800`00b9b898 fffff800`00b9c708 fffff800`02858000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`00b9b850 fffff800`029041b5 : fffff800`00b9c708 fffff800`00b9bf60 fffff800`00000000 00000000`00000001 : nt!RtlDispatchException+0x410
    fffff800`00b9bf30 fffff800`028c9542 : fffff800`00b9c708 fffff800`02a42e80 fffff800`00b9c7b0 fffff800`02a50c40 : nt!KiDispatchException+0x135
    fffff800`00b9c5d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff800028d0e11 - nt!KeAccumulateTicks+3b1
        [ 8b:cb ]
    1 error : !nt (fffff800028d0e11)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BIT
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    Followup: memory_corruption
    ---------
    
    Debug session time: Thu Jan 21 03:06:24.825 2010 (GMT-5)
    System Uptime: 0 days 1:13:28.731
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa810384e010, 5, 1, fffff80002892a13}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeAcquireSpinLockAtDpcLevel+43 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa810384e010, memory referenced
    Arg2: 0000000000000005, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002892a13, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac20e0
     fffffa810384e010 
    
    CURRENT_IRQL:  5
    
    FAULTING_IP: 
    nt!KeAcquireSpinLockAtDpcLevel+43
    fffff800`02892a13 f0480fba2900    lock bts qword ptr [rcx],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff80003cf38d0 -- (.trap 0xfffff80003cf38d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000db00 rbx=0000000000000000 rcx=fffffa810384e010
    rdx=00000cc700000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002892a13 rsp=fffff80003cf3a60 rbp=fffffa80039ed380
     r8=fffff80002a12c40  r9=0000000000000000 r10=0000000000012040
    r11=00000000001f0000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!KeAcquireSpinLockAtDpcLevel+0x43:
    fffff800`02892a13 f0480fba2900    lock bts qword ptr [rcx],0 ds:5e00:fffffa81`0384e010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000288b469 to fffff8000288bf00
    
    STACK_TEXT:  
    fffff800`03cf3788 fffff800`0288b469 : 00000000`0000000a fffffa81`0384e010 00000000`00000005 00000000`00000001 : nt!KeBugCheckEx
    fffff800`03cf3790 fffff800`0288a0e0 : fffffa80`023c6c68 fffff800`02a04e80 fffff800`03cf3960 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`03cf38d0 fffff800`02892a13 : 00000000`00000000 00000000`00000000 fffffa80`02994da8 fffff880`010e006b : nt!KiPageFault+0x260
    fffff800`03cf3a60 fffff800`02887aec : fffffa80`01895b48 fffffa80`039ed380 fffffa80`01895b40 fffff800`02e0b090 : nt!KeAcquireSpinLockAtDpcLevel+0x43
    fffff800`03cf3ab0 fffff800`028878d8 : 00000000`00000000 fffff800`02e263c0 fffffa80`04202000 00000000`00000000 : nt!KiScanInterruptObjectList+0x5c
    fffff800`03cf3b00 fffff880`014109c2 : fffff800`02899a3a 00000000`002fb2a7 fffffa80`03a01a78 fffffa80`026a67e8 : nt!KiChainedDispatch+0x128
    fffff800`03cf3c98 fffff800`02899a3a : 00000000`002fb2a7 fffffa80`03a01a78 fffffa80`026a67e8 00000000`00000001 : intelppm!C1Halt+0x2
    fffff800`03cf3ca0 fffff800`028946cc : fffff800`02a04e80 fffff800`00000000 00000000`00000000 fffff880`0112c908 : nt!PoIdle+0x53a
    fffff800`03cf3d80 00000000`00000000 : fffff800`03cf4000 fffff800`03cee000 fffff800`03cf3d40 00000000`00000000 : nt!KiIdleLoop+0x2c
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeAcquireSpinLockAtDpcLevel+43
    fffff800`02892a13 f0480fba2900    lock bts qword ptr [rcx],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeAcquireSpinLockAtDpcLevel+43
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeAcquireSpinLockAtDpcLevel+43
    
    BUCKET_ID:  X64_0xA_nt!KeAcquireSpinLockAtDpcLevel+43
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Thu Jan 21 03:10:14.062 2010 (GMT-5)
    System Uptime: 0 days 0:03:24.968
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff800028efbe5}
    
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff800028efbe5
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff800028d5469 to fffff800028d5f00
    
    STACK_TEXT:  
    fffff880`009f4c68 fffff800`028d5469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`009f4c70 fffff800`028d3932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009f4db0 fffff800`028efbe5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff800028efbf9 - nt!MmAccessFault+19
        [ ac:bd ]
    1 error : !nt (fffff800028efbf9)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BYTE
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BYTE
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BYTE
    
    Followup: memory_corruption
    ---------
    
    1: kd> lmtsmn
    start             end                 module name
    fffff880`051be000 fffff880`051fc000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f87000 fffff880`00fde000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03c5b000 fffff880`03ce5000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`045cd000 fffff880`045e3000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`04411000 fffff880`04533000   agrsm64  agrsm64.sys  Mon Nov 10 10:01:35 2008 (49184CCF)
    fffff880`01033000 fffff880`0103e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`059b4000 fffff880`059bf000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`01000000 fffff880`01009000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01009000 fffff880`01033000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0427e000 fffff880`043d6000   athrx    athrx.sys    Tue Jun 09 14:06:49 2009 (4A2EA4B9)
    fffff880`03e6f000 fffff880`03e8f000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`048b9000 fffff880`050ca000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
    fffff880`03eb4000 fffff880`03f00000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
    fffff880`02df2000 fffff880`02df9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03c44000 fffff880`03c55000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03991000 fffff880`039af000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00610000 fffff960`00637000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
    fffff880`02d8e000 fffff880`02db8000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d25000 fffff880`00de5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`013a9000 fffff880`013d9000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cc7000 fffff880`00d25000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`014db000 fffff880`0154e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`045bd000 fffff880`045cd000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0568a000 fffff880`05698000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04200000 fffff880`0421e800   cxfalcon_IBV64 cxfalcon_IBV64.sys Mon May 11 04:18:10 2009 (4A07DF42)
    fffff880`03c26000 fffff880`03c44000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03c17000 fffff880`03c26000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03e8f000 fffff880`03eb1000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`057b6000 fffff880`057c9000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05698000 fffff880`057b6000   dump_iaStorV dump_iaStorV.sys Wed Apr 08 12:57:17 2009 (49DCD76D)
    fffff880`0567e000 fffff880`0568a000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`050ca000 fffff880`051be000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
    fffff880`04800000 fffff880`04846000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`04544000 fffff880`04572f00   efe5b32e efe5b32e.sys Fri Nov 16 13:59:04 2007 (473DE878)
    fffff880`0108a000 fffff880`0109e000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0103e000 fffff880`0108a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0155f000 fffff880`01569000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`0281b000 fffff800`02864000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04846000 fffff880`0486a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05622000 fffff880`0567e000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`057d7000 fffff880`057f0000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`057f0000 fffff880`057f8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`057c9000 fffff880`057d7000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`038c9000 fffff880`03991000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`017ec000 fffff880`017f5000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04590000 fffff880`045ae000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010dc000 fffff880`011fa000   iaStorV  iaStorV.sys  Wed Apr 08 12:57:17 2009 (49DCD76D)
    fffff880`00ec6000 fffff880`00ece000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`00c1a000 fffff880`00c30000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`045ae000 fffff880`045bd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`0421f000 fffff880`04262000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`014c1000 fffff880`014db000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`017af000 fffff880`017da000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`04262000 fffff880`04267200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02cb4000 fffff880`02cc9000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02c70000 fffff880`02c93000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c6f000 fffff880`00cb3000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`04535000 fffff880`04544000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
    fffff880`0560d000 fffff880`0561b000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`045ef000 fffff880`045fe000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05600000 fffff880`0560d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02db8000 fffff880`02de9000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`0591e000 fffff880`0592e000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`039af000 fffff880`039c7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`039c7000 fffff880`039f3000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
    fffff880`03800000 fffff880`0384d000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
    fffff880`0384d000 fffff880`03870000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
    fffff880`01652000 fffff880`0165d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fe7000 fffff880`00ff1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01463000 fffff880`014c1000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03c0c000 fffff880`03c17000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`017da000 fffff880`017ec000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0165d000 fffff880`0174f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`045e3000 fffff880`045ef000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02d1c000 fffff880`02d2f000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`03f56000 fffff880`03f85000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03e5a000 fffff880`03e6f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03d6f000 fffff880`03d7e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03ce5000 fffff880`03d2a000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0174f000 fffff880`017af000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`0592e000 fffff880`05943000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`015ef000 fffff880`01600000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03c00000 fffff880`03c0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02864000 fffff800`02e41000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`01206000 fffff880`013a9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`02de9000 fffff880`02df2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02cc9000 fffff880`02d1c000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`03d33000 fffff880`03d59000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`04573000 fffff880`04590000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00de5000 fffff880`00df5000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0154e000 fffff880`0155f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05467000 fffff880`0550d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`03fc0000 fffff880`03ffd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cb3000 fffff880`00cc7000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04888000 fffff880`048ac000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`043e3000 fffff880`043fe000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03f85000 fffff880`03fa6000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03fa6000 fffff880`03fc0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03dad000 fffff880`03dfe000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02c43000 fffff880`02c4c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02c4c000 fffff880`02c55000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`017f5000 fffff880`017fe000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015b5000 fffff880`015ef000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02d2f000 fffff880`02d47000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0550d000 fffff880`05518000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0164a000 fffff880`01652000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05943000 fffff880`059b4000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`05855000 fffff880`058ed000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
    fffff880`05557000 fffff880`055c0000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`05518000 fffff880`05545000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
    fffff880`045fe000 fffff880`045ff480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Thu Apr 08 22:45:54 2010 (4BBE94E2)
    fffff880`05545000 fffff880`05557000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0109e000 fffff880`010ab000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`013d9000 fffff880`013f7000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03d99000 fffff880`03dad000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`010ab000 fffff880`010d1000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04268000 fffff880`0427a000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`04533000 fffff880`04534f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04877000 fffff880`04888000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e00000 fffff880`03e5a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03f00000 fffff880`03f56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`02c55000 fffff880`02c70000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`0486a000 fffff880`04877000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`02c00000 fffff880`02c0e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`02c0e000 fffff880`02c33000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01569000 fffff880`015b5000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`043d6000 fffff880`043e3000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`03d59000 fffff880`03d6f000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03d7e000 fffff880`03d99000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`02c33000 fffff880`02c43000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ed4000 fffff880`00f78000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f78000 fffff880`00f87000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03d2a000 fffff880`03d33000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff880`00fde000 fffff880`00fe7000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02c93000 fffff880`02cb4000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`058ed000 fffff880`0591e000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`01450000 fffff880`0145e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`02c5d000 fffff880`02d7b000   dump_iaStorV
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`02d7b000 fffff880`02d8e000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  4. Posts : 2
    Windows 7 Home Premium 64bit
    Thread Starter
       #4

    Thank you both very much for the quick replies,
    I'll post back tomorrow when I have some spare time to fix 'er up.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 15:22.
Find Us