BSOD with Aion, please help !


  1. Posts : 4
    Windows 7 Home Premium 64bit
       #1

    BSOD with Aion, please help !


    Windows 7 64bit OEM
    Laptop 2 months old
    No OS reinstallation done

    Hi all,
    Currently I'm having BSOD problem when exiting Aion. If I play for more than 1 hour then quit the game, it will BSOD. The last time I had BSOD, when the machine restarted, there was even artifact on screen. I'm really worried whether it may cause hardware damage cause my laptop is very new and I need it for work too.
    Please help. Thank you very much !
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Hi AwoNone; welcome to the forum. Sorry you are having problems.

    The dumps do not point to a direct cause; so we are going to have to troubleshoot. To begin troubleshooting, I recommend that you uninstall AVG. AVG is known to cause BSOD's on some Win 7 systems. Use this removal tool: Tool (64 bit). If you have Personal Identity protection installed, remove it with this tool: Tool. Download and install Microsoft Security Essentials in its place.

    Code:
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a4b000 PsLoadedModuleList = 0xfffff800`02c88e50
    Debug session time: Thu Nov  4 05:38:19.244 2010 (GMT-5)
    System Uptime: 0 days 0:44:35.618
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff88001706391}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyMdlToMdlIndirect+81 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001706391, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'avgrkx64' and 'spsys.sys' overlap
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf30e0
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyMdlToMdlIndirect+81
    fffff880`01706391 448b6928        mov     r13d,dword ptr [rcx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff8800934bc60 -- (.trap 0xfffff8800934bc60)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000070 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffff8800934bfc8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001706391 rsp=fffff8800934bdf0 rbp=fffff8800934bf80
     r8=fffff8800934bfe8  r9=fffff8800934bfb0 r10=fffff8800199e3c0
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyMdlToMdlIndirect+0x81:
    fffff880`01706391 448b6928        mov     r13d,dword ptr [rcx+28h] ds:cd28:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002abaca9 to fffff80002abb740
    
    STACK_TEXT:  
    fffff880`0934bb18 fffff800`02abaca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0934bb20 fffff800`02ab9920 : 00000000`00000002 fffff880`0934bfb0 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0934bc60 fffff880`01706391 : 00000000`00000024 fffffa80`0a97e29c fffffa80`062b0898 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`0934bdf0 fffff880`01846bb4 : fffff880`0934bff8 fffff880`0934bfc8 fffff880`0934bfe8 fffff880`0934bfb0 : NETIO!RtlCopyMdlToMdlIndirect+0x81
    fffff880`0934be90 fffff880`0187df86 : fffff880`0934c370 fffffa80`0a93ccf0 00000000`9f7fc835 fffffa80`0a974ab0 : tcpip!TcpSatisfyReceiveRequests+0x1f4
    fffff880`0934c170 fffff880`0187ea99 : fffffa80`0a9749bc 00000000`00000000 fffffa80`09c69480 fffffa80`09c65080 : tcpip!TcpDeliverDataToClient+0x106
    fffff880`0934c2f0 fffff880`01878298 : 00000000`00000510 fffff880`0186c3ba 00000000`56466b11 fffff880`01870dca : tcpip!TcpDeliverReceive+0xa9
    fffff880`0934c3f0 fffff880`01878e95 : 00000000`00000014 fffffa80`00000000 fffffa80`063d8000 fffffa80`05da1010 : tcpip!TcpTcbFastDatagram+0x208
    fffff880`0934c5b0 fffff880`0187d86a : fffffa80`063ebf00 fffffa80`063cb000 fffffa80`06271cb8 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
    fffff880`0934c760 fffff880`0187d3b7 : fffffa80`08f3990c fffffa80`063d8000 00000000`00000000 fffff880`01860700 : tcpip!TcpMatchReceive+0x1fa
    fffff880`0934c8b0 fffff880`0185f6c7 : fffffa80`063d5000 fffffa80`063c97c2 fffffa80`063e5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
    fffff880`0934c960 fffff880`0185f799 : fffff880`0934cae0 fffff880`0196d9a0 fffff880`0934caf0 ffffffff`fffffdd0 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`0934ca20 fffff880`0185fc90 : fffffa80`063ec000 8cb47af3`02d69eaf 90c991a9`00000000 fffff880`0934cae0 : tcpip!IppProcessDeliverList+0x59
    fffff880`0934ca90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x231
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyMdlToMdlIndirect+81
    fffff880`01706391 448b6928        mov     r13d,dword ptr [rcx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyMdlToMdlIndirect+81
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+81
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+81
    
    Followup: MachineOwner
    ---------
    
    Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
    Debug session time: Mon Nov 15 18:20:45.128 2010 (GMT-5)
    System Uptime: 0 days 1:44:55.501
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff960000e4603, fffff88007999070, 0}
    
    Probably caused by : win32k.sys ( win32k!HmgLockEx+a3 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff960000e4603, Address of the exception record for the exception that caused the bugcheck
    Arg3: fffff88007999070, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    win32k!HmgLockEx+a3
    fffff960`000e4603 0fb7430c        movzx   eax,word ptr [rbx+0Ch]
    
    CONTEXT:  fffff88007999070 -- (.cxr 0xfffff88007999070)
    rax=fffff900c0200000 rbx=0000000000000000 rcx=fffffa8008a05b60
    rdx=fffff900c0200000 rsi=0000000000000000 rdi=fffff900c0200000
    rip=fffff960000e4603 rsp=fffff88007999a40 rbp=0000000000000000
     r8=0000000000000001  r9=0000000000000000 r10=0000000000000000
    r11=fffff88007999aa8 r12=000000000429f200 r13=0000000000000000
    r14=0000000000000001 r15=0000000000000001
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    win32k!HmgLockEx+0xa3:
    fffff960`000e4603 0fb7430c        movzx   eax,word ptr [rbx+0Ch] ds:002b:00000000`0000000c=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff9600029cd00 to fffff960000e4603
    
    STACK_TEXT:  
    fffff880`07999a40 fffff960`0029cd00 : fffff900`c31e0300 00000000`00000001 00000000`0112167c fffff900`c00f6a40 : win32k!HmgLockEx+0xa3
    fffff880`07999ab0 fffff960`0029c1fe : fffff900`c31e0300 00000000`00000000 0000167c`624d4653 00000000`0000001d : win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x40
    fffff880`07999ae0 fffff960`0029d103 : 00000000`00000000 00000000`0112167c fffff900`c31e0300 00000000`0429f24c : win32k!SFMLOGICALSURFACE::DeInitialize+0x4e
    fffff880`07999b20 fffff960`001f9bf7 : 00000000`00000000 fffff900`c00bf010 fffff900`c31e0300 00000000`00000020 : win32k!bhLSurfDestroyLogicalSurfaceObject+0x4b
    fffff880`07999b60 fffff960`0021aed0 : 00000000`00000001 00000000`00000001 fffff880`07999ca0 00000000`00000000 : win32k!GreSfmCloseCompositorRef+0x10f
    fffff880`07999ba0 fffff800`02a79993 : fffffa80`08a05b60 fffffa80`096b1780 000007fe`00000000 fffffa80`096b1780 : win32k!NtGdiHLSurfSetInformation+0x1a8
    fffff880`07999c20 000007fe`ff0a4efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0265f5d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`ff0a4efa
    
    
    FOLLOWUP_IP: 
    win32k!HmgLockEx+a3
    fffff960`000e4603 0fb7430c        movzx   eax,word ptr [rbx+0Ch]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!HmgLockEx+a3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    STACK_COMMAND:  .cxr 0xfffff88007999070 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_win32k!HmgLockEx+a3
    
    BUCKET_ID:  X64_0x3B_win32k!HmgLockEx+a3
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Fri Nov 19 18:21:10.299 2010 (GMT-5)
    System Uptime: 0 days 1:19:44.673
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff900c00c07a0, 0, fffff9600073dc51, 0}
    
    
    Could not read faulting driver name
    Probably caused by : cdd.dll ( cdd!CddBitmapHw::Release+31 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff900c00c07a0, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff9600073dc51, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf80e0
     fffff900c00c07a0 
    
    FAULTING_IP: 
    cdd!CddBitmapHw::Release+31
    fffff960`0073dc51 483b9080070000  cmp     rdx,qword ptr [rax+780h]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  aion.bin
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff8800777f6b0 -- (.trap 0xfffff8800777f6b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff900c00c0020 rbx=0000000000000000 rcx=fffff900c296d380
    rdx=fffffa800924e4a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff9600073dc51 rsp=fffff8800777f840 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=0000000000003bbe
    r11=fffff8800777f860 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    cdd!CddBitmapHw::Release+0x31:
    fffff960`0073dc51 483b9080070000  cmp     rdx,qword ptr [rax+780h] ds:0005:fffff900`c00c07a0=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b40f14 to fffff80002ac0740
    
    STACK_TEXT:  
    fffff880`0777f548 fffff800`02b40f14 : 00000000`00000050 fffff900`c00c07a0 00000000`00000000 fffff880`0777f6b0 : nt!KeBugCheckEx
    fffff880`0777f550 fffff800`02abe82e : 00000000`00000000 fffff900`c00bf010 00000000`00000000 fffff900`c351d370 : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`0777f6b0 fffff960`0073dc51 : 00000000`00000000 00000db8`00000000 000013ea`00000000 fffff900`c351d370 : nt!KiPageFault+0x16e
    fffff880`0777f840 fffff960`001453f0 : 00000000`00000001 fffff900`c00bf010 00000000`00000001 fffff900`c35774f0 : cdd!CddBitmapHw::Release+0x31
    fffff880`0777f880 fffff960`0014d861 : 00000000`00000000 00000000`00000001 fffff900`c35774f0 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x358
    fffff880`0777f9d0 fffff960`00144c9c : 00000000`00000db8 00000000`00000000 fffff900`c00fa010 fffff960`00000000 : win32k!NtGdiCloseProcess+0x2c9
    fffff880`0777fa30 fffff960`001443e3 : fffffa80`091c5d00 00000000`00000001 fffffa80`0924e4a0 00000000`774a351c : win32k!GdiProcessCallout+0x200
    fffff880`0777fab0 fffff800`02da5a01 : fffffa80`091c5d00 00000000`00000000 00000000`00000000 fffffa80`0924e4a0 : win32k!W32pProcessCallout+0x6b
    fffff880`0777fae0 fffff800`02d7d85b : 00000000`00000000 00000000`00000001 fffffa80`055ec000 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`0777fba0 fffff800`02abf993 : fffffa80`055ec060 00000000`00000000 00000000`fffdb001 fffffa80`0924e4a0 : nt!NtTerminateProcess+0x25b
    fffff880`0777fc20 00000000`77b2001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b2001a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    cdd!CddBitmapHw::Release+31
    fffff960`0073dc51 483b9080070000  cmp     rdx,qword ptr [rax+780h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  cdd!CddBitmapHw::Release+31
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: cdd
    
    IMAGE_NAME:  cdd.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bf4408a
    
    FAILURE_BUCKET_ID:  X64_0x50_cdd!CddBitmapHw::Release+31
    
    BUCKET_ID:  X64_0x50_cdd!CddBitmapHw::Release+31
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmtsmn
    start             end                 module name
    fffff880`05200000 fffff880`0523e000   1394ohci 1394ohci.sys Wed Oct 14 23:35:12 2009 (4AD69870)
    fffff880`02fcc000 fffff880`02fdb000   Acceler  Acceler.sys  Mon Nov 23 16:55:13 2009 (4B0B04C1)
    fffff880`00eb8000 fffff880`00f0f000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`01b2f000 fffff880`01bb9000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02e10000 fffff880`02e26000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0131e000 fffff880`01329000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`012d0000 fffff880`012d9000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`012d9000 fffff880`01303000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0586f000 fffff880`05891000   AtiHdmi  AtiHdmi.sys  Wed Nov 18 18:25:33 2009 (4B04826D)
    fffff880`04a80000 fffff880`050b7000   atikmdag atikmdag.sys Thu Dec 17 18:24:40 2009 (4B2ABDB8)
    fffff880`02e44000 fffff880`02e8b000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
    fffff880`01a89000 fffff880`01a90080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
    fffff880`01b14000 fffff880`01b200c0   avgrkx64 avgrkx64.sys Wed Feb 10 22:52:44 2010 (4B737F0C)
    fffff880`0478d000 fffff880`047de000   avgtdia  avgtdia.sys  Thu Jun 03 17:09:57 2010 (4C081A25)
    fffff880`00f80000 fffff880`00f8c000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`0750f000 fffff880`07518000   BCM42RLY BCM42RLY.sys Tue Dec 08 11:12:34 2009 (4B1E7AF2)
    fffff880`052e2000 fffff880`055d0000   bcmwl664 bcmwl664.sys Tue Dec 08 11:10:06 2009 (4B1E7A5E)
    fffff880`046e1000 fffff880`046e8000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`01be8000 fffff880`01bf9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`063be000 fffff880`063dc000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00730000 fffff960`00757000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`046ae000 fffff880`046d8000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cf5000 fffff880`00db5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`05985000 fffff880`05997000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`01ae4000 fffff880`01b14000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c97000 fffff880`00cf5000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`02fdb000 fffff880`02fdf500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00f77000 fffff880`00f80000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`02e00000 fffff880`02e10000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05e63000 fffff880`05e71000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01a6b000 fffff880`01a89000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`01a5c000 fffff880`01a6b000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01ace000 fffff880`01ae4000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`059a9000 fffff880`059cb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05e71000 fffff880`05e84000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0448e000 fffff880`04698000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`05fa3000 fffff880`05faf000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`050b7000 fffff880`051ab000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`051ab000 fffff880`051f1000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`04a24000 fffff880`04a6d000   e1k62x64 e1k62x64.sys Thu Dec 10 12:37:53 2009 (4B2131F1)
    fffff880`0751f000 fffff880`07555000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`01375000 fffff880`01389000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01329000 fffff880`01375000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`015d1000 fffff880`015db000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01a94000 fffff880`01ace000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`017a2000 fffff880`017ec000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02a07000 fffff800`02a50000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04a00000 fffff880`04a24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05f66000 fffff880`05f7f000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05f55000 fffff880`05f66000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`05f7f000 fffff880`05f87080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05e00000 fffff880`05e0e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`062f6000 fffff880`063be000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`0161a000 fffff880`01623000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`055dd000 fffff880`055fb000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010c6000 fffff880`012d0000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`02fe0000 fffff880`02ff6000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`017ec000 fffff880`017fa000   ioatdma  ioatdma.sys  Tue Jul 14 07:37:04 2009 (4A5C6DE0)
    fffff880`02f10000 fffff880`02f6c000   itecir   itecir.sys   Mon Mar 09 04:58:47 2009 (49B4DA47)
    fffff880`051f1000 fffff880`05200000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05f88000 fffff880`05f96000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`05942000 fffff880`05985000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`015a6000 fffff880`015c0000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01777000 fffff880`017a2000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`059cb000 fffff880`059d0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`059d1000 fffff880`059e6000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05e92000 fffff880`05eb5000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c3f000 fffff880`00c83000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05e84000 fffff880`05e92000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`02fbd000 fffff880`02fcc000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05f96000 fffff880`05fa3000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00db5000 fffff880`00dcf000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`063dc000 fffff880`063f4000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`06200000 fffff880`0622d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`068dd000 fffff880`0692b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0692b000 fffff880`0694e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01303000 fffff880`0130e000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2)
    fffff880`04746000 fffff880`04751000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f18000 fffff880`00f22000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01389000 fffff880`013e7000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`01a51000 fffff880`01a5c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01608000 fffff880`0161a000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01625000 fffff880`01717000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02e26000 fffff880`02e32000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`062cb000 fffff880`062de000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`00dcf000 fffff880`00dfe000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0585a000 fffff880`0586f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`0447f000 fffff880`0448e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04400000 fffff880`04445000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01717000 fffff880`01777000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`04751000 fffff880`04762000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`047f4000 fffff880`04800000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a50000 fffff800`0302c000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01403000 fffff880`015a6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`046d8000 fffff880`046e1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`06278000 fffff880`062cb000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`04459000 fffff880`0447f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f62000 fffff880`00f77000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f22000 fffff880`00f55000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0130e000 fffff880`0131e000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015c0000 fffff880`015d1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0694e000 fffff880`069f4000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05891000 fffff880`058ce000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c83000 fffff880`00c97000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`015db000 fffff880`015ff000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`058ea000 fffff880`05905000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`05905000 fffff880`05926000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`05926000 fffff880`05940000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`01a00000 fffff880`01a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0472b000 fffff880`04734000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04734000 fffff880`0473d000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0473d000 fffff880`04746000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`00c00000 fffff880`00c3a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`0525e000 fffff880`05274000   rimmpx64 rimmpx64.sys Fri Oct 03 02:39:15 2008 (48E5BE13)
    fffff880`05274000 fffff880`0528b000   rimspx64 rimspx64.sys Mon Mar 03 04:19:03 2008 (47CBC287)
    fffff880`0528b000 fffff880`052e2000   rixdpx64 rixdpx64.sys Fri Jul 27 06:45:50 2007 (46A9CCDE)
    fffff880`062de000 fffff880`062f6000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0523e000 fffff880`0525e000   sdbus    sdbus.sys    Thu Dec 17 00:46:36 2009 (4B29C5BC)
    fffff880`069f4000 fffff880`069ff000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01600000 fffff880`01608000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`07479000 fffff880`0750f000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`0683f000 fffff880`068a6000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`06800000 fffff880`0682d000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`05ed8000 fffff880`05f55000   stwrt64  stwrt64.sys  Tue Sep 15 15:55:27 2009 (4AAFF12F)
    fffff880`05940000 fffff880`05941480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`02f6c000 fffff880`02fbd000   SynTP    SynTP.sys    Thu Oct 22 21:20:19 2009 (4AE104D3)
    fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`0682d000 fffff880`0683f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`04780000 fffff880`0478d000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`04762000 fffff880`04780000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`01bd4000 fffff880`01be8000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`02e8b000 fffff880`02eb1000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`05e0e000 fffff880`05e63000   udfs     udfs.sys     Tue Oct 06 22:34:35 2009 (4ACBFE3B)
    fffff880`05997000 fffff880`059a9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05faf000 fffff880`05fcc000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`055fb000 fffff880`055fcf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04a6d000 fffff880`04a7e000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
    fffff880`05800000 fffff880`0585a000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF)
    fffff880`02eba000 fffff880`02f10000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05fcc000 fffff880`05ff9200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
    fffff880`00f55000 fffff880`00f62000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`046e8000 fffff880`046f6000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`046f6000 fffff880`0471b000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00f8c000 fffff880`00fa1000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00fa1000 fffff880`00ffd000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`055d0000 fffff880`055dd000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`047de000 fffff880`047f4000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`01bb9000 fffff880`01bd4000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`0471b000 fffff880`0472b000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e05000 fffff880`00ea9000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ea9000 fffff880`00eb8000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04450000 fffff880`04459000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
    fffff880`07518000 fffff880`0751f000   WinRing0x64 WinRing0x64.sys Sat Jul 26 09:29:37 2008 (488B26C1)
    fffff880`02eb1000 fffff880`02eba000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f0f000 fffff880`00f18000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`04445000 fffff880`04450000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 20:10:33 2009 (4A5BCCF9)
    fffff880`05eb5000 fffff880`05ed6000   WudfPf   WudfPf.sys   Fri Jan 15 02:32:54 2010 (4B501A26)
    
    Unloaded modules:
    fffff880`07555000 fffff880`075c6000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01b21000 fffff880`01b2f000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`04491000 fffff880`0469b000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0469b000 fffff880`046ae000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    All of these are hardware/hardware related (drivers) dumps. Outdated drivers can and do cause memory corruption and crashes with Win 7. I see the following out of date drivers loaded on your syste,. Those in red font are quiet obsolete. Update or eliminate these drivers.
    itecir.sys Mon Mar 09 04:58:47 2009 - ITE Tech IR driver system driver file. ITE Tech. Inc.

    rimmpx64.sys Fri Oct 03 02:39:15 2008 - Ricoh Memory Card Reader driver, OEM - none at Home | Ricoh Global. To my knowledge, there are no updates for these drivers. You can try you computer manufacturer's website. This card reader is obsolete. Uninstall it and upgrade to a new card reader certified compatible with Win 7.

    rimspx64.sys Mon Mar 03 04:19:03 2008 - Ricoh Memory Card Reader driver, OEM - none at Home | Ricoh Global. See above.

    rixdpx64.sys Fri Jul 27 06:45:50 2007
    - Ricoh Memory Card Reader driver, OEM - none at Home | Ricoh Global

    WinRing0x64.sys Sat Jul 26 09:29:37 2008 - many different programs that center around the using of the WinRing libraries, OEM - none at Winring.
    Navigate to C:\Windows\System 32\Drivers. Locate WinRing0x64.sys and rename it from .sys to .bak. Reboot and the driver will not load. However, this will break whatever program/utility this driver belongs to. Uninstall that program. It is obsolete.

    How to find drivers -
    - I have listed links to most of the drivers in the code box above. Please use the links there to see what info I've found about those drivers.
    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.


    - - The most common drivers are listed on this page:
    Driver Reference
    - - Driver manufacturer links are on this page:
    Drivers and Downloads
    Uninstall AVG, update or remove the above drivers. Reboot and let's see how your system runs. Please update us and let us know. If you get another BSOD upload it and we will go from there.
    Last edited by CarlTR6; 20 Nov 2010 at 17:24.
      My Computer


  3. Posts : 4
    Windows 7 Home Premium 64bit
    Thread Starter
       #3

    Thank you, I will try and update if anything happens.
    One more thing I'd like to ask : Can BSOD actually cause hardware damage ? And in my case, the last time I had BSOD, after the machined restarted itself, there was artifact, why ? Can it be somehow linked to video driver corruption ?
    Last edited by AwoNone; 20 Nov 2010 at 20:15.
      My Computer


  4. Posts : 4
    Windows 7 Home Premium 64bit
    Thread Starter
       #4

    Bump. Please can anyone reply. I really need an answer. Thanks !
      My Computer


  5. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #5

    Please don't bump. We get to each thread as quickly as we can. We are all volunteers here.

    A BSOD will not cause damage to your system. Windows protects your hardware by shutting down (crashing), which creates a BSOD, when something is wrong before you hardware can be harmed. The artifact can definitely be linked to your video card. It could be a driver and not necessarily a video driver causing conflict, corrupted memory, or even a bad video card. There was no indication in your dump of a video error; but since you have had an artifact, you can test your video card with Furmark. Follow the instructions in the tutorial below and monitor your video card temps during the test. Post back with your results.

    Video Card - Stress Test with Furmark
      My Computer


  6. Posts : 4
    Windows 7 Home Premium 64bit
    Thread Starter
       #6

    I'm sorry for bumping. The artifact was really upsetting cause last time I had one, which was 1 or 2 years ago, my graphic card was fried. I did Furmark stability test with GPUz to monitor load and temp, after 5min no artifact whatsoever but the temp reached upper 80s, 90 degree celcius so I stopped it there. I've installed latest driver from AMD/ATI, along with AVG removal, and will try to keep track of the BSOD.
    But in the end, it happened twice yesterday in the exact same situation - quitting Aion client. So I guess the client must have some sort of conflict. Hope it won't affect the hardware.
    Omg, as I'm typing this reply, 3-4 min after stopping Furmark, artifact comes back, the same as yesterday. My GPU temp right now is only 50. So I think the BSOD is caused by Aion client conflict but the artifact is not, could it be the last BSOD that makes something in the machine go wrong ? Any ideas ????
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #7

    A BSOD will not make something in your machine go wrong. A BSOD occurs because something in your machine is already wrong. The BSOD is the result of something being wrong, not the cause. Generally, an artifact does mean that the video card is faulty. Do you know what the maximum operating temp of your video card is? You can find in on your video card manufacturer's website. If running Furmark is causing the temp to exceed the maximum recommended temp and the temp has not leveled off (that it is, it is still climbing, this is a sign something is wrong with the video card. It could even be that the cooling fan is not working properly or the heat sink is improperly set.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 09:19.
Find Us