![]() |
|
23 Dec 2010 | #1 |
|
I'm having a lot of BOSD's
Hi guys,
I'm having issues with my windows 7 x64. A lot o BOSD's and since I'm a newbie I can't figure it out. I took your advice and used memtest for about 12 hours (7 passes) with no errors. Can you please help ? I've attached two minidumps. Thank you for your time and consideration. |
My System Specs![]() |
. |
|
23 Dec 2010 | #2 |
|
Hi guys,
I'm having issues with my windows 7 x64. A lot o BOSD's and since I'm a newbie I can't figure it out. I took your advice and used memtest for about 12 hours (7 passes) with no errors. Can you please help ? I've attached two minidumps. Thank you for your time and consideration. Thanks Ken |
My System Specs![]() |
30 Dec 2010 | #3 |
|
Thank you for your answer ! I overclocked it from 2.8 to 3.3GHz (found how on youtube) but now I updated the BIOS and went on default settings. It is still happening....
Can you please help ? Thank you and have a Happy New Year !! |
My System Specs![]() |
. |
|
30 Dec 2010 | #4 |
|
Please read this tutorial and follow the instructions. Upload all of the files generated. This will help us to help you better.
https://www.sevenforums.com/crashes-d...tructions.html While you are troubleshooting, I suggest that you uninstall Eset using this removal tool: Tool. Your version of Eset is know to cause BSOD's on some Win 7 systems. Once you get your system stable, you can try Eset agaion; but I recommend the latest version. Download and install Microsoft Security Essentials in it place and make sure Windows Firewall is turned on. I looked at your latest dumps and none are error code 124. Quote:
Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.
Error code 3B (2X), SYSTEM_SERVICE_EXCEPTION. Usual causes: System service, Device driver, graphics driver, ?memory. Error code BE, ATTEMPTED_WRITE_TO_READONLY_MEMORY. Usual causes: Device driver, Memory. Follow the instructions in the tutorial above, upload the files to us, uninstall Eset, reboot and see how your systems does. Code:
indows 7 Kernel Version 7600 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`03815000 PsLoadedModuleList = 0xfffff800`03a52e50 Debug session time: Wed Dec 29 06:16:56.391 2010 (GMT-5) System Uptime: 0 days 12:14:30.687 Loading Kernel Symbols ............................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {0, 0, 0, 0} Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e ) Followup: MachineOwner --------- 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully. FAULTING_IP: +5932952f007edd34 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x1E PROCESS_NAME: WinRAR.exe CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff880030d35d8 -- (.exr 0xfffff880030d35d8) ExceptionAddress: fffff80003890e39 (nt!KiProcessExpiredTimerList+0x0000000000000129) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff880030d3680 -- (.trap 0xfffff880030d3680) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa8006366d08 rbx=0000000000000000 rcx=f7fffa8006366d08 rdx=fffff880030a8700 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003890e39 rsp=fffff880030d3810 rbp=fffffa8006360468 r8=fffffa800871ec00 r9=0000000000000008 r10=fffff80003815000 r11=fffff880030d37e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KiProcessExpiredTimerList+0x129: fffff800`03890e39 48894108 mov qword ptr [rcx+8],rax ds:f7fffa80`06366d10=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000387d46e to fffff80003885710 STACK_TEXT: fffff880`030d26c8 fffff800`0387d46e : fffffa80`08840630 fffffa80`08930ac8 fffff880`030d2e40 fffff800`038b2668 : nt!KeBugCheck fffff880`030d26d0 fffff800`038ab40d : fffff800`03a93b7c fffff800`039cde84 fffff800`03815000 fffff880`030d35d8 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`030d2700 fffff800`038b2a90 : fffff800`039d4a40 fffff880`030d2778 fffff880`030d35d8 fffff800`03815000 : nt!RtlpExecuteHandlerForException+0xd fffff880`030d2730 fffff800`038bf9ef : fffff880`030d35d8 fffff880`030d2e40 fffff880`00000000 fffffa80`06366d00 : nt!RtlDispatchException+0x410 fffff880`030d2e10 fffff800`03884d82 : fffff880`030d35d8 fffffa80`06360468 fffff880`030d3680 00000000`00000000 : nt!KiDispatchException+0x16f fffff880`030d34a0 fffff800`0388368a : 00000000`00000005 00000000`00433f05 fffffa80`00433f05 fffff880`0164808f : nt!KiExceptionDispatch+0xc2 fffff880`030d3680 fffff800`03890e39 : fffffa80`0871ec20 fffffa80`0871ec68 fffffa80`0871ec68 fffffa80`06360400 : nt!KiGeneralProtectionFault+0x10a fffff880`030d3810 fffff800`038914be : 00000066`9c2d360e fffff880`030d3e88 00000000`002b1b41 fffff880`030a6da8 : nt!KiProcessExpiredTimerList+0x129 fffff880`030d3e60 fffff800`03890cb7 : fffff880`030a41c2 fffffa80`002b1b41 00000000`00000000 00000000`00000041 : nt!KiTimerExpiration+0x1be fffff880`030d3f00 fffff800`0388b865 : 0000058a`00000000 fffffa80`06518b60 00000000`00000000 fffff800`0393e230 : nt!KiRetireDpcList+0x277 fffff880`030d3fb0 fffff800`0388b67c : fffff880`030a4180 fffff800`03892618 00000000`00000000 fffff880`07544c28 : nt!KxRetireDpcList+0x5 fffff880`07544be0 fffff800`038cf113 : fffff800`038923ac fffff800`03892418 00000000`00009ca5 fffff880`07544ca0 : nt!KiDispatchInterruptContinue fffff880`07544c10 fffff800`03892418 : 00000000`00009ca5 fffff880`07544ca0 00000000`00190750 00000000`00008000 : nt!KiDpcInterruptBypass+0x13 fffff880`07544c20 00000001`3fdca952 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8 00000000`06b4f9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1`3fdca952 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiKernelCalloutExceptionHandler+e fffff800`0387d46e 90 nop SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e Followup: MachineOwner --------- System Uptime: 0 days 0:52:39.315 Loading Kernel Symbols ............................................................... ................................................................ ...................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80003b96cc4, fffff88003bbc030, 0} Probably caused by : hardware ( nt!IopXxxControlFile+bc1 ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80003b96cc4, Address of the exception record for the exception that caused the bugcheck Arg3: fffff88003bbc030, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!IopXxxControlFile+bc1 fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh] CONTEXT: fffff88003bbc030 -- (.cxr 0xfffff88003bbc030) rax=fffffa8008e90b60 rbx=fffffa80072d3c40 rcx=0000000008547b00 rdx=0000057ffbe7f7f8 rsi=fffffa8008547bd8 rdi=fffffa8008547ac0 rip=fffff80003b96cc4 rsp=fffff88003bbca08 rbp=fffff88003bbcca0 r8=0000000000000000 r9=0000000000000000 r10=fffff880009b2ca0 r11=fffffa8007d70680 r12=0000000000000008 r13=0000000000000001 r14=0000000000000001 r15=fffffa8008901da0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!IopXxxControlFile+0xbc1: fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh] ds:002b:00000000`08547a81=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: HWMonitor 1.17 CURRENT_IRQL: 0 MISALIGNED_IP: nt!IopXxxControlFile+bc1 fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh] LAST_CONTROL_TRANSFER: from fffffa8008e90b60 to fffff80003b96cc4 STACK_TEXT: fffff880`03bbca08 fffffa80`08e90b60 : fffff800`03b96f66 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xbc1 fffff880`03bbcb38 fffff800`03b96f66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`08e90b60 fffff880`03bbcb40 fffff800`0387a993 : 00000000`73682450 00000000`0098f170 00000000`0098fd20 fffff880`03bbcc20 : nt!NtDeviceIoControlFile+0x56 fffff880`03bbcbb0 00000000`73682dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0098f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73682dd9 FOLLOWUP_IP: nt!IopXxxControlFile+bc1 fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!IopXxxControlFile+bc1 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .cxr 0xfffff88003bbc030 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: X64_IP_MISALIGNED BUCKET_ID: X64_IP_MISALIGNED Followup: MachineOwner --------- Debug session time: Thu Dec 30 03:28:06.166 2010 (GMT-5) System Uptime: 0 days 12:55:28.461 Loading Kernel Symbols ............................................................... ................................................................ ........................ Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck BE, {fffff960002e0010, 80800001e6074021, fffff8800745cd80, b} Probably caused by : win32k.sys ( win32k!SpBitBlt+4a3 ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff960002e0010, Virtual address for the attempted write. Arg2: 80800001e6074021, PTE contents. Arg3: fffff8800745cd80, (reserved) Arg4: 000000000000000b, (reserved) Debugging Details: ------------------ CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xBE PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8800745cd80 -- (.trap 0xfffff8800745cd80) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff900c1e57850 rbx=0000000000000000 rcx=fffff900c1e578b8 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff960001e1baf rsp=fffff8800745cf10 rbp=000000000000f0f0 r8=fffff900c2aae0f8 r9=0000000000000001 r10=fffff8800745d0e0 r11=fffff8800745cee0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc win32k!SpBitBlt+0x4a3: fffff960`001e1baf ff155be40f00 call qword ptr [win32k!_imp_PsGetCurrentThreadWin32Thread (fffff960`002e0010)] ds:fffff960`002e0010={nt!PsGetCurrentThreadWin32Thread (fffff800`038cb990)} Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000393fae2 to fffff800038bf740 STACK_TEXT: fffff880`0745cc18 fffff800`0393fae2 : 00000000`000000be fffff960`002e0010 80800001`e6074021 fffff880`0745cd80 : nt!KeBugCheckEx fffff880`0745cc20 fffff800`038bd82e : 00000000`00000001 00000000`00000000 00000420`00000000 00000436`00000780 : nt! ?? ::FNODOBFM::`string'+0x4237e fffff880`0745cd80 fffff960`001e1baf : fffff900`c39c8b10 00000000`00000000 00000000`0000f0f0 fffff900`c1efd018 : nt!KiPageFault+0x16e fffff880`0745cf10 fffff960`0005f88d : fffff900`c00cf028 00000000`00000000 00000000`00000000 fffff880`0745d0e0 : win32k!SpBitBlt+0x4a3 fffff880`0745d300 fffff960`0005f474 : 00000000`00000000 00000000`00f00021 fffff880`0745d550 fffff900`0000f0f0 : win32k!GrePatBltLockedDC+0x2f9 fffff880`0745d3b0 fffff960`0005f144 : fffff880`0745d550 fffff800`038cb772 fffff880`0745d5a0 00000000`00000000 : win32k!GrePolyPatBltInternal+0x2ec fffff880`0745d500 fffff960`0005f0c3 : fffff900`c0805390 fffff900`c0805390 00000000`01100073 fffff960`0023b192 : win32k!GrePolyPatBlt+0x74 fffff880`0745d570 fffff960`00147035 : fffff900`c0805390 00000000`01100073 00000000`00000000 fffff900`c0805390 : win32k!FillRect+0x63 fffff880`0745d5d0 fffff960`00146f5d : 00000000`00000000 fffff900`c0805390 00000000`01100073 ffffffff`f6011c8d : win32k!xxxPaintRect+0xb5 fffff880`0745d600 fffff960`00196e18 : 00000000`00000000 fffff900`c0805390 ffffffff`f6011c8d fffff800`03bd8500 : win32k!xxxFillWindow+0x9d fffff880`0745d660 fffff960`000e9897 : 00000000`00000000 00000000`00000014 00000000`00000000 fffff800`03bb1fd1 : win32k!xxxDWP_EraseBkgnd+0xdc fffff880`0745d6b0 fffff960`000f0a9c : 00000000`00000000 fffff900`c0805390 00000000`00000014 00000000`0001004c : win32k!xxxRealDefWindowProc+0x507 fffff880`0745d8c0 fffff960`000e2be7 : fffff900`c0805390 00000000`0000029e 00000000`00000014 fffffa80`087dbb60 : win32k!xxxWrapRealDefWindowProc+0x3c fffff880`0745d8f0 fffff960`000effbe : 00000000`0001004c 00000000`00000014 fffffa80`0867d060 00000000`00000000 : win32k!NtUserfnNCDESTROY+0x27 fffff880`0745d930 fffff800`038be993 : fffffa80`087dbb60 fffff880`0745daa0 00000000`02f8d8a8 00000000`0001004c : win32k!NtUserMessageCall+0x132 fffff880`0745d9b0 00000000`778ba08a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`02f8d888 fffff800`038b7080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778ba08a fffff880`0745de10 fffff880`0745de28 : fffff880`0745e178 00000000`00000000 fffff960`00000018 00000000`00000002 : nt!KiCallUserMode fffff880`0745de18 fffff880`0745e178 : 00000000`00000000 fffff960`00000018 00000000`00000002 fffff880`0745e4f0 : 0xfffff880`0745de28 fffff880`0745de20 00000000`00000000 : fffff960`00000018 00000000`00000002 fffff880`0745e4f0 00000000`00000000 : 0xfffff880`0745e178 STACK_COMMAND: kb FOLLOWUP_IP: win32k!SpBitBlt+4a3 fffff960`001e1baf ff155be40f00 call qword ptr [win32k!_imp_PsGetCurrentThreadWin32Thread (fffff960`002e0010)] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: win32k!SpBitBlt+4a3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c FAILURE_BUCKET_ID: X64_0xBE_win32k!SpBitBlt+4a3 BUCKET_ID: X64_0xBE_win32k!SpBitBlt+4a3 Followup: MachineOwner --------- 4: kd> lmtsmn start end module name fffff880`02d9d000 fffff880`02ddb000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f15000 fffff880`00f6c000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02c3f000 fffff880`02cc9000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`02ddb000 fffff880`02df1000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`03faa000 fffff880`03fbf000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`00db6000 fffff880`00dca000 amdsata amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655) fffff880`01075000 fffff880`01080000 amdxata amdxata.sys Wed Oct 07 16:13:10 2009 (4ACCF656) fffff880`072ad000 fffff880`072de000 AODDriver2 AODDriver2.sys Wed May 05 00:03:12 2010 (4BE0EE00) fffff880`00d83000 fffff880`00d8c000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00d8c000 fffff880`00db6000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`048f5000 fffff880`05106000 atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94) fffff880`03e00000 fffff880`03e4c000 atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F) fffff880`01931000 fffff880`01939000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486) fffff880`019ab000 fffff880`019b2000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03f73000 fffff880`03f84000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`06bdf000 fffff880`06bfd000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`007c0000 fffff960`007e7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A) fffff880`073bf000 fffff880`073dc000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112) fffff880`01978000 fffff880`019a2000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`03c1e000 fffff880`03dc1000 cfosspeed6 cfosspeed6.sys Tue Dec 21 10:26:50 2010 (4D10C73A) fffff880`00ca9000 fffff880`00d69000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`01901000 fffff880`01931000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00c4b000 fffff880`00ca9000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`01149000 fffff880`011bc000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`03ebe000 fffff880`03ece000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`073dc000 fffff880`073e5000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0) fffff880`0734f000 fffff880`07357000 cpuz_x64 cpuz_x64.sys Tue Dec 02 08:51:19 2008 (49353D57) fffff880`06ae2000 fffff880`06af0000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03ed2000 fffff880`03f55000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`03f55000 fffff880`03f73000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`02d8e000 fffff880`02d9d000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`018eb000 fffff880`01901000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`057d5000 fffff880`057f7000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`06afa000 fffff880`06b0e000 dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655) fffff880`06b2b000 fffff880`06b3e000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`06af0000 fffff880`06afa000 dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35) fffff880`06b3e000 fffff880`06b4a000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`05106000 fffff880`051fa000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`04800000 fffff880`04846000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`02ac8000 fffff880`02b9a000 eamon eamon.sys Tue Sep 29 06:51:47 2009 (4AC1E6C3) fffff880`019b2000 fffff880`019d5000 ehdrv ehdrv.sys Tue Sep 29 06:52:21 2009 (4AC1E6E5) fffff880`05600000 fffff880`05620000 epfwwfpr epfwwfpr.sys Tue Sep 29 06:47:10 2009 (4AC1E5AE) fffff880`010d7000 fffff880`010eb000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`0108b000 fffff880`010d7000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`013da000 fffff880`013e4000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`018b1000 fffff880`018eb000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`03806000 fffff800`0384f000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`04846000 fffff880`0486a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`06b73000 fffff880`06b8c000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`06b8c000 fffff880`06b94080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`06b65000 fffff880`06b73000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`02a00000 fffff880`02ac8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`018a8000 fffff880`018b1000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03fc8000 fffff880`03fe6000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03fe6000 fffff880`03ff5000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff800`00ba8000 fffff800`00bb2000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`05686000 fffff880`056c9000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`013af000 fffff880`013c9000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`015a3000 fffff880`015ce000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`057f7000 fffff880`057fc200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`02bbb000 fffff880`02bd0000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`06bbc000 fffff880`06bdf000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00c2a000 fffff880`00c37000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65) fffff880`06bae000 fffff880`06bbc000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`05675000 fffff880`05684000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`06ba1000 fffff880`06bae000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00d69000 fffff880`00d83000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`06800000 fffff880`0682d000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`0682d000 fffff880`0687b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`0687b000 fffff880`0689e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`01080000 fffff880`0108b000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`015f0000 fffff880`015fb000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f75000 fffff880`00f7f000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`010eb000 fffff880`01149000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03c0c000 fffff880`03c17000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`01896000 fffff880`018a8000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`01451000 fffff880`01543000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`02c24000 fffff880`02c30000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`00dca000 fffff880`00df9000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0574c000 fffff880`05761000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`03dc1000 fffff880`03dd0000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02cc9000 fffff880`02d0e000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01543000 fffff880`015a3000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`013e4000 fffff880`013f5000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03c00000 fffff880`03c0c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`0384f000 fffff800`03e2b000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`0120c000 fffff880`013af000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`019a2000 fffff880`019ab000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`056db000 fffff880`056f2000 nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D) fffff880`0486a000 fffff880`0489a000 nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61) fffff880`02d17000 fffff880`02d3d000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00fbf000 fffff880`00fd4000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f7f000 fffff880`00fb2000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00fe9000 fffff880`00ff0000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00ff0000 fffff880`01000000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`013c9000 fffff880`013da000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`06e8b000 fffff880`06f31000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`05798000 fffff880`057d5000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00c37000 fffff880`00c4b000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`02c00000 fffff880`02c24000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`00c00000 fffff880`00c1b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`0562f000 fffff880`05650000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`05650000 fffff880`0566a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02d3d000 fffff880`02d8e000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`0566a000 fffff880`05675000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`019f3000 fffff880`019fc000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`015de000 fffff880`015e7000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`015e7000 fffff880`015f0000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`0185c000 fffff880`01896000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`02bd0000 fffff880`02be8000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`0489c000 fffff880`048f3000 Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA) fffff880`05761000 fffff880`05797d80 RtHDMIVX RtHDMIVX.sys Tue Jan 26 22:04:58 2010 (4B5FAD5A) fffff880`068a8000 fffff880`06ae1080 RTKVHD64 RTKVHD64.sys Tue Apr 06 06:17:30 2010 (4BBB0A3A) fffff880`01854000 fffff880`0185c000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`07217000 fffff880`072ad000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`06f70000 fffff880`06fd7000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`06f31000 fffff880`06f5e000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`01013000 fffff880`01075000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE) fffff880`05684000 fffff880`05685480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`06f5e000 fffff880`06f70000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`01000000 fffff880`0100d000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`011e1000 fffff880`011ff000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`03deb000 fffff880`03dff000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`00460000 fffff960`0046a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`03f84000 fffff880`03faa000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`056c9000 fffff880`056db000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`06b4a000 fffff880`06b64c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`06b0e000 fffff880`06b2b000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`0489a000 fffff880`0489bf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03ead000 fffff880`03ebe000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235) fffff880`056f2000 fffff880`0574c000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268) fffff880`03e4c000 fffff880`03e57000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03e57000 fffff880`03ead000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`06b95000 fffff880`06ba1000 usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A) fffff880`00fb2000 fffff880`00fbf000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`019d5000 fffff880`019e3000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`011bc000 fffff880`011e1000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`015ce000 fffff880`015de000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00fd4000 fffff880`00fe9000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`01808000 fffff880`01854000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`03dd0000 fffff880`03deb000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`019e3000 fffff880`019f3000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e62000 fffff880`00f06000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f06000 fffff880`00f15000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02d0e000 fffff880`02d17000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00040000 fffff960`0034f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C) fffff880`03fbf000 fffff880`03fc8000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f6c000 fffff880`00f75000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`02b9a000 fffff880`02bbb000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) Unloaded modules: fffff880`073ef000 fffff880`073f9000 HWiNFO64A.SY Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`073e5000 fffff880`073ef000 HWiNFO64A.SY Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`073b6000 fffff880`073bf000 cpuz135_x64. Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`07385000 fffff880`073b6000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`07374000 fffff880`07385000 WinUsb.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`0736a000 fffff880`07374000 HWiNFO64A.SY Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`07361000 fffff880`0736a000 cpuz135_x64. Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`07357000 fffff880`07361000 HWiNFO64A.SY Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`072de000 fffff880`0734f000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01939000 fffff880`01947000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01947000 fffff880`01951000 dump_storpor Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01951000 fffff880`01965000 dump_amdsata Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01965000 fffff880`01978000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 4: kd> !sysinfo cpuinfo [CPU Information] ~MHz = REG_DWORD 3500 Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0 Identifier = REG_SZ AMD64 Family 16 Model 10 Stepping 0 ProcessorNameString = REG_SZ AMD Phenom(tm) II X6 1055T Processor VendorIdentifier = REG_SZ AuthenticAMD |
My System Specs![]() |
![]() |
Thread Tools | |
Similar help and support threads | ||||
Thread | Forum | |||
BOSD when doing nothing Hello forum I built my system 4 months a go since then i'v been getting BSOD for no real reason most of the time whilst on the net or doing nothing. All so the system has been frezzing resulting in me turning of at the mains. Things i have done are: Run memtest86 for 5 passed Prime95 for... |
BSOD Help and Support | |||
BOSD again... Hi guys, I have a problem with my HP laptop with windows 7 home premium. Just after I bought it, many bsod appears three or more times per day until I called HP support and they got the pc and change the network card and two usb ports that appears to be the problem, but after a week with the laptop... |
BSOD Help and Support | |||
BOSD help.. The text document (dxdiag) is my system information I really dont know what to do any more.. it happens even before i format my com. Before i had windows 7 , it was window xp .. Can any professionals give me some suggestion on how do i fix this. |
BSOD Help and Support | |||
bosd plz help hello ive tried everything the comp is new but the cd rom i built it if u need specs but i keep getting this bosd when playing world of warcraft and idk why. p.s. im not computer savy here is the info |
BSOD Help and Support | |||
Bosd (help) crashing and i dont know why, please somone help xD im tryin to upload the dmp file, but it wont let me x.x wont even let me zip it up |
BSOD Help and Support |
Our Sites |
Site Links |
About Us |
Find Us |
Windows 7 Forums is an independent web site and has not been authorized,
sponsored, or otherwise approved by Microsoft Corporation.
"Windows 7" and related materials are trademarks of Microsoft Corp.
© Designer Media Ltd All times are GMT -5. The time now is 08:02. |
![]() ![]() ![]() ![]() ![]() |