Can anyone help me?

Page 1 of 2 12 LastLast

  1. Posts : 16
    win 7 64 ultimate
       #1

    Can anyone help me?


    I get random BSOD's aplenty! seems like a new one daily. I got plenty of dump files for ya if yer daring. Unfortunately I can't upload any of them because it's saying I don't have "ownership".
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    JTHMfreak said:
    I get random BSOD's aplenty! seems like a new one daily. I got plenty of dump files for ya if yer daring. Unfortunately I can't upload any of them because it's saying I don't have "ownership".
    You must follow these instructions
    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  3. Posts : 16
    win 7 64 ultimate
    Thread Starter
       #3

    Can anyone help me?


    I get random BSOD's aplenty! seems like a new one daily. I got plenty of dump files for ya if yer daring. Any help is greatly appreciated, I'm at my wits end. Did a fresh install late dec early jan.
      My Computer


  4. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #4

    Update your creative sound card drivers, ha20x22k.sys seemed to be the cause
      My Computer


  5. Posts : 16
    win 7 64 ultimate
    Thread Starter
       #5

    Thank you, so that was causing all those BSOD's?
      My Computer


  6. Posts : 16
    win 7 64 ultimate
    Thread Starter
       #6

    Got another one less than 30 minutes after updating creative drivers.
      My Computer


  7. Posts : 2,528
    Windows 10 Pro x64
       #7

    Upload new data, we'll see if it matches the previous. Updating drivers to fix a problem only works if the developers of the driver fixed said problem between versions .
      My Computer


  8. Posts : 16
    win 7 64 ultimate
    Thread Starter
       #8

    Okay re-zipped the .dmp files, I hope some new info can be found
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #9

    I looked at your four most recent dumps. All indicate memory corruption.

    Update this driver or upgrade your keyboard. If you have another keyboard you can try, you can uninstall this one see if it helps your system's stability.
    Lycosa.sys Fri Jan 18 03:51:42 2008 - Razer Tarantula Keyboard Driver. Razer Support.
    If the above does not work, I suggest that you test your RAM with Memtest following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for an hour or so. Let it run for at least 7 passes. This will take 6-8 hours. Post back with your results.


    Code:
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
    Debug session time: Mon Jan 31 23:20:44.694 2011 (GMT-5)
    System Uptime: 0 days 6:58:38.342
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {918, 2, 0, fffff8800458ecee}
    
    Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchDdiNotifyDpcWorker+86 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000918, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800458ecee, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf90e0
     0000000000000918 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    dxgmms1!VidSchDdiNotifyDpcWorker+86
    fffff880`0458ecee 498b8cc638090000 mov     rcx,qword ptr [r14+rax*8+938h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880030af860 -- (.trap 0xfffff880030af860)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007732ad0
    rdx=fffffa800774e9b0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800458ecee rsp=fffff880030af9f0 rbp=0000000000000000
     r8=0000000000000001  r9=0000000000000000 r10=fffff80002a51000
    r11=fffff880030af860 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    dxgmms1!VidSchDdiNotifyDpcWorker+0x86:
    fffff880`0458ecee 498b8cc638090000 mov     rcx,qword ptr [r14+rax*8+938h] ds:0057:00000000`00000938=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac0ca9 to fffff80002ac1740
    
    STACK_TEXT:  
    fffff880`030af718 fffff800`02ac0ca9 : 00000000`0000000a 00000000`00000918 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`030af720 fffff800`02abf920 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`030af860 fffff880`0458ecee : 00000000`00000000 fffffa80`00000030 fffffa80`00000001 0005afaf`0005afae : nt!KiPageFault+0x260
    fffff880`030af9f0 fffff880`0458ec4c : 00000000`00000001 fffffa80`07732340 00000000`00000000 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpcWorker+0x86
    fffff880`030afa40 fffff880`044951cf : fffffa80`05243480 00000000`00000022 00000000`00000000 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpc+0x94
    fffff880`030afa90 fffff880`048b5429 : fffffa80`05300000 fffffa80`05300000 00000000`00000000 00000000`00000002 : dxgkrnl!DxgNotifyDpcCB+0x77
    fffff880`030afac0 fffffa80`05300000 : fffffa80`05300000 00000000`00000000 00000000`00000002 fffffa80`05300000 : nvlddmkm+0xb3429
    fffff880`030afac8 fffffa80`05300000 : 00000000`00000000 00000000`00000002 fffffa80`05300000 00000000`00000000 : 0xfffffa80`05300000
    fffff880`030afad0 00000000`00000000 : 00000000`00000002 fffffa80`05300000 00000000`00000000 00000000`00000000 : 0xfffffa80`05300000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchDdiNotifyDpcWorker+86
    fffff880`0458ecee 498b8cc638090000 mov     rcx,qword ptr [r14+rax*8+938h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchDdiNotifyDpcWorker+86
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ccf7c90
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchDdiNotifyDpcWorker+86
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchDdiNotifyDpcWorker+86
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Tue Feb  1 03:15:19.880 2011 (GMT-5)
    System Uptime: 0 days 3:26:57.224
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C4, {91, 0, fffffa8007764210, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4904 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
    A device driver attempting to corrupt the system has been caught.  This is
    because the driver was specified in the registry as being suspect (by the
    administrator) and the kernel has enabled substantial checking of this driver.
    If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
    be among the most commonly seen crashes.
    Arguments:
    Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
        the operating system. The only supported way to extend a kernel
        mode stack is by using KeExpandKernelStackAndCallout.
    Arg2: 0000000000000000
    Arg3: fffffa8007764210
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xc4_91
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88002ef8c88 -- (.exr 0xfffff88002ef8c88)
    ExceptionAddress: fffff80002a71653 (nt!memmove+0x0000000000000223)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 0000000000000000
    Attempt to read from address 0000000000000000
    
    TRAP_FRAME:  fffff88002ef8d30 -- (.trap 0xfffff88002ef8d30)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88002ef8f60 rbx=0000000000000000 rcx=fffff88002ef8f60
    rdx=0000077ffd1070a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a71653 rsp=fffff88002ef8ec8 rbp=fffff88002ef9510
     r8=0000000000000001  r9=0000000000000000 r10=fffff88002ef9010
    r11=fffff88002ef8f60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!memmove+0x223:
    fffff800`02a71653 8a040a          mov     al,byte ptr [rdx+rcx] ds:00000000`00000000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002acf24a to fffff80002a7a740
    
    STACK_TEXT:  
    fffff880`02ef7d98 fffff800`02acf24a : 00000000`000000c4 00000000`00000091 00000000`00000000 fffffa80`07764210 : nt!KeBugCheckEx
    fffff880`02ef7da0 fffff800`02aa76b3 : fffffa80`07306840 fffff880`064a6eec 00000000`00000003 fffffa80`07765010 : nt! ?? ::FNODOBFM::`string'+0x4904
    fffff880`02ef7de0 fffff800`02ab49ef : fffff880`02ef8c88 fffff880`02ef89f0 fffff880`02ef8d30 fffff880`02ef8f70 : nt!RtlDispatchException+0x33
    fffff880`02ef84c0 fffff800`02a79d82 : fffff880`02ef8c88 00000000`00000000 fffff880`02ef8d30 00000000`00000001 : nt!KiDispatchException+0x16f
    fffff880`02ef8b50 fffff800`02a788fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`02ef8d30 fffff800`02a71653 : fffff800`02a4f9a0 00000000`00000000 00000000`00000001 00000000`00000001 : nt!KiPageFault+0x23a
    fffff880`02ef8ec8 fffff800`02a4f9a0 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000001 : nt!memmove+0x223
    fffff880`02ef8ed0 fffff800`02a4f720 : fffff880`02ef8f70 fffffa80`00000001 fffff880`02ef8f70 fffff880`02ef9800 : nt!KiOpFetchBytes+0x30
    fffff880`02ef8f00 fffff800`02ab4e7f : fffff880`02ef97a8 fffffa80`00000000 00000000`ceda7000 00000000`00000000 : nt!KiOpDecode+0x68
    fffff880`02ef8f50 fffff800`02ab49a6 : fffff880`02ef97a8 fffff880`02ef9850 fffff880`02ef9850 00000000`00000000 : nt!KiPreprocessFault+0x53
    fffff880`02ef8fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x126
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4904
    fffff800`02acf24a cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4904
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904
    
    BUCKET_ID:  X64_0xc4_91_nt!_??_::FNODOBFM::_string_+4904
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Tue Feb  1 16:31:08.510 2011 (GMT-5)
    System Uptime: 0 days 0:38:29.760
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {403, fffff6800002bb10, e9700000727d386f, fffff68e0002bb10}
    
    Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::Free+a2 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000403, The subtype of the bugcheck.
    Arg2: fffff6800002bb10
    Arg3: e9700000727d386f
    Arg4: fffff68e0002bb10
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_403
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002b436c8 to fffff80002ad1740
    
    STACK_TEXT:  
    fffff880`08b5bc38 fffff800`02b436c8 : 00000000`0000001a 00000000`00000403 fffff680`0002bb10 e9700000`727d386f : nt!KeBugCheckEx
    fffff880`08b5bc40 fffff800`02b02381 : 00000000`00000000 fffff680`0002bff8 fffffa80`05ed8060 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x31ef2
    fffff880`08b5bdf0 fffff800`02b130da : 00000000`00000000 00000000`0582ffff fffffa80`00000000 fffffa80`05ed8060 : nt!MiDeleteVirtualAddresses+0x408
    fffff880`08b5bfb0 fffff800`02ad0993 : ffffffff`ffffffff fffff8a0`0249ce58 fffff8a0`0249ce80 fffff880`00008000 : nt!NtFreeVirtualMemory+0x5ca
    fffff880`08b5c0a0 fffff800`02accf30 : fffff880`045c54b2 fffff8a0`098f36f0 fffffa80`05ed8060 fffffa80`05d073b0 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`08b5c238 fffff880`045c54b2 : fffff8a0`098f36f0 fffffa80`05ed8060 fffffa80`05d073b0 fffff8a0`0249ce50 : nt!KiServiceLinkage
    fffff880`08b5c240 fffff880`045b0b5a : 00000000`00000000 fffff8a0`0132b790 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0xa2
    fffff880`08b5c270 fffff880`045ab523 : fffffa80`048bb9c0 00000000`00000001 fffff8a0`098f36f0 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x112
    fffff880`08b5c320 fffff880`04591ecc : 00000000`00000000 fffff8a0`00000000 fffffa80`0774c000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
    fffff880`08b5c3f0 fffff880`044d3ccc : 00000000`00000000 fffff8a0`01739000 fffff8a0`01739000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
    fffff880`08b5c420 fffff880`044d365f : fffff8a0`01739000 fffff8a0`0173a300 fffff8a0`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
    fffff880`08b5c510 fffff880`0450174f : fffff8a0`0160f9c0 fffff8a0`013a97e0 fffff8a0`0160f9c0 fffff880`08b5c930 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0xa3
    fffff880`08b5c560 fffff880`04500e7b : fffff8a0`00000799 fffff8a0`0160f9c0 fffff880`08b5c8c0 fffff880`08b5c8f0 : dxgkrnl!DXGCONTEXT::Present+0x2cb
    fffff880`08b5c880 fffff960`0027bbfc : fffffa80`07b3e060 00000000`00000000 fffff8a0`02609690 fffff8a0`00000010 : dxgkrnl!DxgkPresent+0x543
    fffff880`08b5cbf0 fffff800`02ad0993 : fffffa80`07b3e060 00000000`03c8cea0 00000000`00369e99 00000000`00000000 : win32k!NtGdiDdDDIPresent+0x18
    fffff880`08b5cc20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VIDMM_PROCESS_HEAP::Free+a2
    fffff880`045c54b2 488b0e          mov     rcx,qword ptr [rsi]
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::Free+a2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ccf7c90
    
    FAILURE_BUCKET_ID:  X64_0x1a_403_dxgmms1!VIDMM_PROCESS_HEAP::Free+a2
    
    BUCKET_ID:  X64_0x1a_403_dxgmms1!VIDMM_PROCESS_HEAP::Free+a2
    
    Followup: MachineOwner
    ---------
    
    5: kd> lmtsmn
    start             end                 module name
    fffff880`04164000 fffff880`041a2000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00ed2000 fffff880`00f29000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`01967000 fffff880`019f1000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`05660000 fffff880`05676000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`040a9000 fffff880`040be000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00ec0000 fffff880`00ecb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`06595000 fffff880`0659e000   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D)
    fffff880`0655b000 fffff880`06595000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
    fffff880`019f1000 fffff880`019fb000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
    fffff880`04060000 fffff880`04083000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
    fffff880`01957000 fffff880`01967000   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:27 2010 (4C8651AB)
    fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e96000 fffff880`00ec0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`018ab000 fffff880`018b2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02c83000 fffff880`02c94000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`0c9a1000 fffff880`0c9bf000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      Tue Nov 02 00:59:22 2010 (4CCF9AAA)
    fffff880`01878000 fffff880`018a2000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c88000 fffff880`00d48000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01812000 fffff880`01842000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c2a000 fffff880`00c88000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0113c000 fffff880`011af000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`05648000 fffff880`05658000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0697e000 fffff880`0698c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02c00000 fffff880`02c83000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`064d0000 fffff880`0650d000   CT20XUT  CT20XUT.SYS  Wed Jul 07 09:44:15 2010 (4C3484AF)
    fffff880`0569c000 fffff880`05744b80   ctaud2k  ctaud2k.sys  Wed Jul 07 09:42:14 2010 (4C348436)
    fffff880`0681a000 fffff880`0697e000   CTEXFIFX CTEXFIFX.SYS Wed Jul 07 09:44:03 2010 (4C3484A3)
    fffff880`064b4000 fffff880`064d0000   CTHWIUT  CTHWIUT.SYS  Wed Jul 07 09:44:19 2010 (4C3484B3)
    fffff880`05600000 fffff880`05631000   ctoss2k  ctoss2k.sys  Wed Jul 07 09:38:24 2010 (4C348350)
    fffff880`05631000 fffff880`05639000   ctprxy2k ctprxy2k.sys Wed Jul 07 09:42:17 2010 (4C348439)
    fffff880`0647c000 fffff880`064b4000   ctsfm2k  ctsfm2k.sys  Wed Jul 07 09:38:10 2010 (4C348342)
    fffff880`02ddc000 fffff880`02dfa000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02dcd000 fffff880`02ddc000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01235000 fffff880`0124b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05782000 fffff880`057a4000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06998000 fffff880`069a1000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0698c000 fffff880`06998000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`069a1000 fffff880`069b4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`069b4000 fffff880`069c0000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0449c000 fffff880`04590000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 22:51:31 2010 (4CCF7CB3)
    fffff880`04590000 fffff880`045d6000   dxgmms1  dxgmms1.sys  Mon Nov 01 22:50:56 2010 (4CCF7C90)
    fffff880`06000000 fffff880`0604a000   emupia2k emupia2k.sys Wed Jul 07 09:38:03 2010 (4C34833B)
    fffff880`010ca000 fffff880`010de000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00fa6000 fffff880`00ff2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01080000 fffff880`010ba000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0159c000 fffff880`015e6000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`06063000 fffff880`061f0000   ha20x22k ha20x22k.sys Wed Jul 07 09:41:25 2010 (4C348405)
    fffff800`02a18000 fffff800`02a61000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`069ce000 fffff880`069e7000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`069e7000 fffff880`069ef080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`069c0000 fffff880`069ce000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0c8d9000 fffff880`0c9a1000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01412000 fffff880`0141b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04485000 fffff880`04494000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06805000 fffff880`06813000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bcc000 fffff800`00bd6000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`057a4000 fffff880`057e7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01571000 fffff880`0159c000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05639000 fffff880`0563e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0659e000 fffff880`065b3000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06538000 fffff880`0655b000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`06800000 fffff880`06804980   Lycosa   Lycosa.sys   Fri Jan 18 03:51:42 2008 (4790689E)
    fffff880`00c09000 fffff880`00c16000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`0652a000 fffff880`06538000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`045d6000 fffff880`045e5000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`069f2000 fffff880`069ff000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0c9bf000 fffff880`0c9d7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`0c800000 fffff880`0c82d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0c82d000 fffff880`0c87b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0c87b000 fffff880`0c89e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01910000 fffff880`0191b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f32000 fffff880`00f3c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010de000 fffff880`0113c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02dc2000 fffff880`02dcd000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01400000 fffff880`01412000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0141f000 fffff880`01511000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`057e7000 fffff880`057f3000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`04400000 fffff880`0442f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04800000 fffff880`04815000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d0a000 fffff880`02d19000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02c96000 fffff880`02cdb000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01511000 fffff880`01571000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0191b000 fffff880`0192c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02db6000 fffff880`02dc2000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a61000 fffff800`0303d000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01252000 fffff880`013f5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`018a2000 fffff880`018ab000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`053fe000 fffff880`053ff180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
    fffff880`04824000 fffff880`053fda80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
    fffff880`041a2000 fffff880`041f6080   nvmf6264 nvmf6264.sys Thu Aug 12 07:46:06 2010 (4C63DEFE)
    fffff880`040e7000 fffff880`040f2000   nvsmu    nvsmu.sys    Mon Jun 29 03:36:37 2009 (4A486F05)
    fffff880`02ce4000 fffff880`02d0a000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`040ca000 fffff880`040e7000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f7c000 fffff880`00f91000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f3c000 fffff880`00f6f000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0ca6c000 fffff880`0cb12000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05745000 fffff880`05782000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c16000 fffff880`00c2a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`05676000 fffff880`0569a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0442f000 fffff880`0444a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0444a000 fffff880`0446b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0446b000 fffff880`04485000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d65000 fffff880`02db6000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`057f3000 fffff880`057fe000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`018f5000 fffff880`018fe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`018fe000 fffff880`01907000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01907000 fffff880`01910000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01046000 fffff880`01080000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`065b3000 fffff880`065cb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0cb12000 fffff880`0cb1d000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`040be000 fffff880`040ca000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02d19000 fffff880`02d36000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`05658000 fffff880`05660000   serscan  serscan.sys  Mon Jul 13 20:35:32 2009 (4A5BD2D4)
    fffff880`01000000 fffff880`01046000   snapman  snapman.sys  Sat Apr 10 05:16:30 2010 (4BC041EE)
    fffff880`015f6000 fffff880`015fe000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0ce2a000 fffff880`0cec0000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`0cb5c000 fffff880`0cbc3000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`0cb1d000 fffff880`0cb4a000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`057fe000 fffff880`057ff480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`0cb4a000 fffff880`0cb5c000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0194a000 fffff880`01957000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0192c000 fffff880`0194a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d51000 fffff880`02d65000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04083000 fffff880`040a9000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`045e5000 fffff880`045f7000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0650d000 fffff880`0652a000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`069f0000 fffff880`069f1f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04153000 fffff880`04164000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`04000000 fffff880`0405a000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`040f2000 fffff880`040fd000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`040fd000 fffff880`04153000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00f6f000 fffff880`00f7c000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`018b2000 fffff880`018c0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`018c0000 fffff880`018e5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015e6000 fffff880`015f6000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f91000 fffff880`00fa6000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`011af000 fffff880`011fb000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d36000 fffff880`02d51000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`018e5000 fffff880`018f5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00d48000 fffff880`00dec000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00dec000 fffff880`00dfb000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02cdb000 fffff880`02ce4000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`00400000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`0563f000 fffff880`05648000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f29000 fffff880`00f32000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    
    Unloaded modules:
    fffff880`0cec0000 fffff880`0cf31000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01842000 fffff880`01850000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01850000 fffff880`0185c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0185c000 fffff880`01865000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01865000 fffff880`01878000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  10. Posts : 16
    win 7 64 ultimate
    Thread Starter
       #10

    Ok, updated the Lycosa drivers, hopefully that solves something seeing as how I've had about four bsods today all with different codes. The memory seems fine though as i had done a test just last week and it had reported no errors. The bsods go back to the beginning of January and every memtest86 I've done comes back fine.
      My Computer


 
Page 1 of 2 12 LastLast

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:40.
Find Us