New
#1
Can anyone help me?
I get random BSOD's aplenty! seems like a new one daily. I got plenty of dump files for ya if yer daring. Unfortunately I can't upload any of them because it's saying I don't have "ownership".
I get random BSOD's aplenty! seems like a new one daily. I got plenty of dump files for ya if yer daring. Unfortunately I can't upload any of them because it's saying I don't have "ownership".
You must follow these instructions
https://www.sevenforums.com/crashes-d...tructions.html
I get random BSOD's aplenty! seems like a new one daily. I got plenty of dump files for ya if yer daring. Any help is greatly appreciated, I'm at my wits end. Did a fresh install late dec early jan.
Update your creative sound card drivers, ha20x22k.sys seemed to be the cause
Thank you, so that was causing all those BSOD's?
Got another one less than 30 minutes after updating creative drivers.
Upload new data, we'll see if it matches the previous. Updating drivers to fix a problem only works if the developers of the driver fixed said problem between versions .
Okay re-zipped the .dmp files, I hope some new info can be found
I looked at your four most recent dumps. All indicate memory corruption.
Update this driver or upgrade your keyboard. If you have another keyboard you can try, you can uninstall this one see if it helps your system's stability.
If the above does not work, I suggest that you test your RAM with Memtest following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for an hour or so. Let it run for at least 7 passes. This will take 6-8 hours. Post back with your results.Lycosa.sys Fri Jan 18 03:51:42 2008 - Razer Tarantula Keyboard Driver. Razer Support.
Code:Windows 7 Kernel Version 7600 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50 Debug session time: Mon Jan 31 23:20:44.694 2011 (GMT-5) System Uptime: 0 days 6:58:38.342 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {918, 2, 0, fffff8800458ecee} Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for nvlddmkm.sys *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys Probably caused by : dxgmms1.sys ( dxgmms1!VidSchDdiNotifyDpcWorker+86 ) Followup: MachineOwner --------- 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000918, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8800458ecee, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf90e0 0000000000000918 CURRENT_IRQL: 2 FAULTING_IP: dxgmms1!VidSchDdiNotifyDpcWorker+86 fffff880`0458ecee 498b8cc638090000 mov rcx,qword ptr [r14+rax*8+938h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff880030af860 -- (.trap 0xfffff880030af860) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007732ad0 rdx=fffffa800774e9b0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8800458ecee rsp=fffff880030af9f0 rbp=0000000000000000 r8=0000000000000001 r9=0000000000000000 r10=fffff80002a51000 r11=fffff880030af860 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc dxgmms1!VidSchDdiNotifyDpcWorker+0x86: fffff880`0458ecee 498b8cc638090000 mov rcx,qword ptr [r14+rax*8+938h] ds:0057:00000000`00000938=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ac0ca9 to fffff80002ac1740 STACK_TEXT: fffff880`030af718 fffff800`02ac0ca9 : 00000000`0000000a 00000000`00000918 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`030af720 fffff800`02abf920 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`030af860 fffff880`0458ecee : 00000000`00000000 fffffa80`00000030 fffffa80`00000001 0005afaf`0005afae : nt!KiPageFault+0x260 fffff880`030af9f0 fffff880`0458ec4c : 00000000`00000001 fffffa80`07732340 00000000`00000000 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpcWorker+0x86 fffff880`030afa40 fffff880`044951cf : fffffa80`05243480 00000000`00000022 00000000`00000000 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpc+0x94 fffff880`030afa90 fffff880`048b5429 : fffffa80`05300000 fffffa80`05300000 00000000`00000000 00000000`00000002 : dxgkrnl!DxgNotifyDpcCB+0x77 fffff880`030afac0 fffffa80`05300000 : fffffa80`05300000 00000000`00000000 00000000`00000002 fffffa80`05300000 : nvlddmkm+0xb3429 fffff880`030afac8 fffffa80`05300000 : 00000000`00000000 00000000`00000002 fffffa80`05300000 00000000`00000000 : 0xfffffa80`05300000 fffff880`030afad0 00000000`00000000 : 00000000`00000002 fffffa80`05300000 00000000`00000000 00000000`00000000 : 0xfffffa80`05300000 STACK_COMMAND: kb FOLLOWUP_IP: dxgmms1!VidSchDdiNotifyDpcWorker+86 fffff880`0458ecee 498b8cc638090000 mov rcx,qword ptr [r14+rax*8+938h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: dxgmms1!VidSchDdiNotifyDpcWorker+86 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ccf7c90 FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchDdiNotifyDpcWorker+86 BUCKET_ID: X64_0xD1_dxgmms1!VidSchDdiNotifyDpcWorker+86 Followup: MachineOwner --------- Debug session time: Tue Feb 1 03:15:19.880 2011 (GMT-5) System Uptime: 0 days 3:26:57.224 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C4, {91, 0, fffffa8007764210, 0} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4904 ) Followup: MachineOwner --------- 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_DETECTED_VIOLATION (c4) A device driver attempting to corrupt the system has been caught. This is because the driver was specified in the registry as being suspect (by the administrator) and the kernel has enabled substantial checking of this driver. If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will be among the most commonly seen crashes. Arguments: Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by the operating system. The only supported way to extend a kernel mode stack is by using KeExpandKernelStackAndCallout. Arg2: 0000000000000000 Arg3: fffffa8007764210 Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0xc4_91 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 EXCEPTION_RECORD: fffff88002ef8c88 -- (.exr 0xfffff88002ef8c88) ExceptionAddress: fffff80002a71653 (nt!memmove+0x0000000000000223) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000000 Attempt to read from address 0000000000000000 TRAP_FRAME: fffff88002ef8d30 -- (.trap 0xfffff88002ef8d30) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff88002ef8f60 rbx=0000000000000000 rcx=fffff88002ef8f60 rdx=0000077ffd1070a0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002a71653 rsp=fffff88002ef8ec8 rbp=fffff88002ef9510 r8=0000000000000001 r9=0000000000000000 r10=fffff88002ef9010 r11=fffff88002ef8f60 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!memmove+0x223: fffff800`02a71653 8a040a mov al,byte ptr [rdx+rcx] ds:00000000`00000000=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002acf24a to fffff80002a7a740 STACK_TEXT: fffff880`02ef7d98 fffff800`02acf24a : 00000000`000000c4 00000000`00000091 00000000`00000000 fffffa80`07764210 : nt!KeBugCheckEx fffff880`02ef7da0 fffff800`02aa76b3 : fffffa80`07306840 fffff880`064a6eec 00000000`00000003 fffffa80`07765010 : nt! ?? ::FNODOBFM::`string'+0x4904 fffff880`02ef7de0 fffff800`02ab49ef : fffff880`02ef8c88 fffff880`02ef89f0 fffff880`02ef8d30 fffff880`02ef8f70 : nt!RtlDispatchException+0x33 fffff880`02ef84c0 fffff800`02a79d82 : fffff880`02ef8c88 00000000`00000000 fffff880`02ef8d30 00000000`00000001 : nt!KiDispatchException+0x16f fffff880`02ef8b50 fffff800`02a788fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`02ef8d30 fffff800`02a71653 : fffff800`02a4f9a0 00000000`00000000 00000000`00000001 00000000`00000001 : nt!KiPageFault+0x23a fffff880`02ef8ec8 fffff800`02a4f9a0 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000001 : nt!memmove+0x223 fffff880`02ef8ed0 fffff800`02a4f720 : fffff880`02ef8f70 fffffa80`00000001 fffff880`02ef8f70 fffff880`02ef9800 : nt!KiOpFetchBytes+0x30 fffff880`02ef8f00 fffff800`02ab4e7f : fffff880`02ef97a8 fffffa80`00000000 00000000`ceda7000 00000000`00000000 : nt!KiOpDecode+0x68 fffff880`02ef8f50 fffff800`02ab49a6 : fffff880`02ef97a8 fffff880`02ef9850 fffff880`02ef9850 00000000`00000000 : nt!KiPreprocessFault+0x53 fffff880`02ef8fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x126 STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4904 fffff800`02acf24a cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4904 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904 BUCKET_ID: X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904 Followup: MachineOwner --------- Debug session time: Tue Feb 1 16:31:08.510 2011 (GMT-5) System Uptime: 0 days 0:38:29.760 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {403, fffff6800002bb10, e9700000727d386f, fffff68e0002bb10} Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 ) Followup: MachineOwner --------- 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000403, The subtype of the bugcheck. Arg2: fffff6800002bb10 Arg3: e9700000727d386f Arg4: fffff68e0002bb10 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_403 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002b436c8 to fffff80002ad1740 STACK_TEXT: fffff880`08b5bc38 fffff800`02b436c8 : 00000000`0000001a 00000000`00000403 fffff680`0002bb10 e9700000`727d386f : nt!KeBugCheckEx fffff880`08b5bc40 fffff800`02b02381 : 00000000`00000000 fffff680`0002bff8 fffffa80`05ed8060 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x31ef2 fffff880`08b5bdf0 fffff800`02b130da : 00000000`00000000 00000000`0582ffff fffffa80`00000000 fffffa80`05ed8060 : nt!MiDeleteVirtualAddresses+0x408 fffff880`08b5bfb0 fffff800`02ad0993 : ffffffff`ffffffff fffff8a0`0249ce58 fffff8a0`0249ce80 fffff880`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`08b5c0a0 fffff800`02accf30 : fffff880`045c54b2 fffff8a0`098f36f0 fffffa80`05ed8060 fffffa80`05d073b0 : nt!KiSystemServiceCopyEnd+0x13 fffff880`08b5c238 fffff880`045c54b2 : fffff8a0`098f36f0 fffffa80`05ed8060 fffffa80`05d073b0 fffff8a0`0249ce50 : nt!KiServiceLinkage fffff880`08b5c240 fffff880`045b0b5a : 00000000`00000000 fffff8a0`0132b790 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0xa2 fffff880`08b5c270 fffff880`045ab523 : fffffa80`048bb9c0 00000000`00000001 fffff8a0`098f36f0 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x112 fffff880`08b5c320 fffff880`04591ecc : 00000000`00000000 fffff8a0`00000000 fffffa80`0774c000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b fffff880`08b5c3f0 fffff880`044d3ccc : 00000000`00000000 fffff8a0`01739000 fffff8a0`01739000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44 fffff880`08b5c420 fffff880`044d365f : fffff8a0`01739000 fffff8a0`0173a300 fffff8a0`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248 fffff880`08b5c510 fffff880`0450174f : fffff8a0`0160f9c0 fffff8a0`013a97e0 fffff8a0`0160f9c0 fffff880`08b5c930 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0xa3 fffff880`08b5c560 fffff880`04500e7b : fffff8a0`00000799 fffff8a0`0160f9c0 fffff880`08b5c8c0 fffff880`08b5c8f0 : dxgkrnl!DXGCONTEXT::Present+0x2cb fffff880`08b5c880 fffff960`0027bbfc : fffffa80`07b3e060 00000000`00000000 fffff8a0`02609690 fffff8a0`00000010 : dxgkrnl!DxgkPresent+0x543 fffff880`08b5cbf0 fffff800`02ad0993 : fffffa80`07b3e060 00000000`03c8cea0 00000000`00369e99 00000000`00000000 : win32k!NtGdiDdDDIPresent+0x18 fffff880`08b5cc20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 STACK_COMMAND: kb FOLLOWUP_IP: dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 fffff880`045c54b2 488b0e mov rcx,qword ptr [rsi] SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ccf7c90 FAILURE_BUCKET_ID: X64_0x1a_403_dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 BUCKET_ID: X64_0x1a_403_dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 Followup: MachineOwner --------- 5: kd> lmtsmn start end module name fffff880`04164000 fffff880`041a2000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00ed2000 fffff880`00f29000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`01967000 fffff880`019f1000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`05660000 fffff880`05676000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`040a9000 fffff880`040be000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`00ec0000 fffff880`00ecb000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`06595000 fffff880`0659e000 aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D) fffff880`0655b000 fffff880`06595000 aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084) fffff880`019f1000 fffff880`019fb000 aswRdr aswRdr.SYS Tue Sep 07 10:47:47 2010 (4C865093) fffff880`04060000 fffff880`04083000 aswSP aswSP.SYS Tue Sep 07 10:52:07 2010 (4C865197) fffff880`01957000 fffff880`01967000 aswTdi aswTdi.SYS Tue Sep 07 10:52:27 2010 (4C8651AB) fffff880`00e8d000 fffff880`00e96000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00e96000 fffff880`00ec0000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`018ab000 fffff880`018b2000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`02c83000 fffff880`02c94000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`0c9a1000 fffff880`0c9bf000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00780000 fffff960`007a7000 cdd cdd.dll Tue Nov 02 00:59:22 2010 (4CCF9AAA) fffff880`01878000 fffff880`018a2000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00c88000 fffff880`00d48000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`01812000 fffff880`01842000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c2a000 fffff880`00c88000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`0113c000 fffff880`011af000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`05648000 fffff880`05658000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`0697e000 fffff880`0698c000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`02c00000 fffff880`02c83000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`064d0000 fffff880`0650d000 CT20XUT CT20XUT.SYS Wed Jul 07 09:44:15 2010 (4C3484AF) fffff880`0569c000 fffff880`05744b80 ctaud2k ctaud2k.sys Wed Jul 07 09:42:14 2010 (4C348436) fffff880`0681a000 fffff880`0697e000 CTEXFIFX CTEXFIFX.SYS Wed Jul 07 09:44:03 2010 (4C3484A3) fffff880`064b4000 fffff880`064d0000 CTHWIUT CTHWIUT.SYS Wed Jul 07 09:44:19 2010 (4C3484B3) fffff880`05600000 fffff880`05631000 ctoss2k ctoss2k.sys Wed Jul 07 09:38:24 2010 (4C348350) fffff880`05631000 fffff880`05639000 ctprxy2k ctprxy2k.sys Wed Jul 07 09:42:17 2010 (4C348439) fffff880`0647c000 fffff880`064b4000 ctsfm2k ctsfm2k.sys Wed Jul 07 09:38:10 2010 (4C348342) fffff880`02ddc000 fffff880`02dfa000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`02dcd000 fffff880`02ddc000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`01235000 fffff880`0124b000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`05782000 fffff880`057a4000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`06998000 fffff880`069a1000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`0698c000 fffff880`06998000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`069a1000 fffff880`069b4000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`069b4000 fffff880`069c0000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`0449c000 fffff880`04590000 dxgkrnl dxgkrnl.sys Mon Nov 01 22:51:31 2010 (4CCF7CB3) fffff880`04590000 fffff880`045d6000 dxgmms1 dxgmms1.sys Mon Nov 01 22:50:56 2010 (4CCF7C90) fffff880`06000000 fffff880`0604a000 emupia2k emupia2k.sys Wed Jul 07 09:38:03 2010 (4C34833B) fffff880`010ca000 fffff880`010de000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`00fa6000 fffff880`00ff2000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01080000 fffff880`010ba000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0159c000 fffff880`015e6000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff880`06063000 fffff880`061f0000 ha20x22k ha20x22k.sys Wed Jul 07 09:41:25 2010 (4C348405) fffff800`02a18000 fffff800`02a61000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`069ce000 fffff880`069e7000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`069e7000 fffff880`069ef080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`069c0000 fffff880`069ce000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`0c8d9000 fffff880`0c9a1000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`01412000 fffff880`0141b000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`04485000 fffff880`04494000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`06805000 fffff880`06813000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bcc000 fffff800`00bd6000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`057a4000 fffff880`057e7000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01571000 fffff880`0159c000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`05639000 fffff880`0563e200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`0659e000 fffff880`065b3000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`06538000 fffff880`0655b000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`06800000 fffff880`06804980 Lycosa Lycosa.sys Fri Jan 18 03:51:42 2008 (4790689E) fffff880`00c09000 fffff880`00c16000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65) fffff880`0652a000 fffff880`06538000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`045d6000 fffff880`045e5000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`069f2000 fffff880`069ff000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00e73000 fffff880`00e8d000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`0c9bf000 fffff880`0c9d7000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`0c800000 fffff880`0c82d000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`0c82d000 fffff880`0c87b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`0c87b000 fffff880`0c89e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`01910000 fffff880`0191b000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f32000 fffff880`00f3c000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`010de000 fffff880`0113c000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`02dc2000 fffff880`02dcd000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`01400000 fffff880`01412000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`0141f000 fffff880`01511000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`057e7000 fffff880`057f3000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`04400000 fffff880`0442f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04800000 fffff880`04815000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02d0a000 fffff880`02d19000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02c96000 fffff880`02cdb000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01511000 fffff880`01571000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`0191b000 fffff880`0192c000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`02db6000 fffff880`02dc2000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02a61000 fffff800`0303d000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`01252000 fffff880`013f5000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`018a2000 fffff880`018ab000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`053fe000 fffff880`053ff180 nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88) fffff880`04824000 fffff880`053fda80 nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E) fffff880`041a2000 fffff880`041f6080 nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE) fffff880`040e7000 fffff880`040f2000 nvsmu nvsmu.sys Mon Jun 29 03:36:37 2009 (4A486F05) fffff880`02ce4000 fffff880`02d0a000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`040ca000 fffff880`040e7000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8) fffff880`00f7c000 fffff880`00f91000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f3c000 fffff880`00f6f000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00e5c000 fffff880`00e63000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00e63000 fffff880`00e73000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`0ca6c000 fffff880`0cb12000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`05745000 fffff880`05782000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c16000 fffff880`00c2a000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`05676000 fffff880`0569a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0442f000 fffff880`0444a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`0444a000 fffff880`0446b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`0446b000 fffff880`04485000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02d65000 fffff880`02db6000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`057f3000 fffff880`057fe000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`018f5000 fffff880`018fe000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`018fe000 fffff880`01907000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`01907000 fffff880`01910000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01046000 fffff880`01080000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`065b3000 fffff880`065cb000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`0cb12000 fffff880`0cb1d000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`040be000 fffff880`040ca000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`02d19000 fffff880`02d36000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8) fffff880`05658000 fffff880`05660000 serscan serscan.sys Mon Jul 13 20:35:32 2009 (4A5BD2D4) fffff880`01000000 fffff880`01046000 snapman snapman.sys Sat Apr 10 05:16:30 2010 (4BC041EE) fffff880`015f6000 fffff880`015fe000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0ce2a000 fffff880`0cec0000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`0cb5c000 fffff880`0cbc3000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`0cb1d000 fffff880`0cb4a000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`057fe000 fffff880`057ff480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`0cb4a000 fffff880`0cb5c000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`0194a000 fffff880`01957000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`0192c000 fffff880`0194a000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02d51000 fffff880`02d65000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`005a0000 fffff960`005aa000 TSDDD TSDDD.dll unavailable (00000000) fffff880`04083000 fffff880`040a9000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`045e5000 fffff880`045f7000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`0650d000 fffff880`0652a000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`069f0000 fffff880`069f1f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`04153000 fffff880`04164000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235) fffff880`04000000 fffff880`0405a000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268) fffff880`040f2000 fffff880`040fd000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`040fd000 fffff880`04153000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00f6f000 fffff880`00f7c000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`018b2000 fffff880`018c0000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`018c0000 fffff880`018e5000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`015e6000 fffff880`015f6000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00f91000 fffff880`00fa6000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`011af000 fffff880`011fb000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`02d36000 fffff880`02d51000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`018e5000 fffff880`018f5000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00d48000 fffff880`00dec000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00dec000 fffff880`00dfb000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02cdb000 fffff880`02ce4000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`000f0000 fffff960`00400000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E) fffff880`0563f000 fffff880`05648000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f29000 fffff880`00f32000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) Unloaded modules: fffff880`0cec0000 fffff880`0cf31000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01842000 fffff880`01850000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01850000 fffff880`0185c000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`0185c000 fffff880`01865000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01865000 fffff880`01878000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
Ok, updated the Lycosa drivers, hopefully that solves something seeing as how I've had about four bsods today all with different codes. The memory seems fine though as i had done a test just last week and it had reported no errors. The bsods go back to the beginning of January and every memtest86 I've done comes back fine.