New PC, BSoD every few hours

Joined
Dec 21, 2010
Messages
5
Reaction score
0
Just bought this PC about 2 weeks ago. It crashed at seemingly random times, but mostly when playing World of Warcraft. However, it has happened in any situation I have found myself doing so far.

The zipped files you request should be attached.

The motherboard model is an Asus M4A78LT-M LE (this was on the box that came with the PC from newegg).

If you need more information, please let me know. I really do appreciate any help in solving this matter :D
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Uninstall Lavasoft Ad-Aware.

Install MSE as the replacement:

https://www.microsoft.com/security_essentials/



Update Atheros L1c PCI-E Gigabit Ethernet:

L1C62x64.sys Fri Sep 04 01:39:09 2009




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-20280-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e87e50
Debug session time: Sun Dec 19 12:19:13.477 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:18.835
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ce7372, fffff88006bf8ee0, 0}

Probably caused by : memory_corruption ( nt!MiReferenceControlArea+202 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ce7372, Address of the instruction which caused the bugcheck
Arg3: fffff88006bf8ee0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiReferenceControlArea+202
fffff800`02ce7372 48894108        mov     qword ptr [rcx+8],rax

CONTEXT:  fffff88006bf8ee0 -- (.cxr 0xfffff88006bf8ee0)
rax=fffffa8003bc69d8 rbx=fffffa80042cd980 rcx=f7fffa80049b15a8
rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000001
rip=fffff80002ce7372 rsp=fffff88006bf98b0 rbp=fffff880009e9180
 r8=0000000000000000  r9=fffff880009e9180 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff80002ef4040
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiReferenceControlArea+0x202:
fffff800`02ce7372 48894108        mov     qword ptr [rcx+8],rax ds:002b:f7fffa80`049b15b0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  mscorsvw.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002ce7372

STACK_TEXT:  
fffff880`06bf98b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiReferenceControlArea+0x202


FOLLOWUP_IP: 
nt!MiReferenceControlArea+202
fffff800`02ce7372 48894108        mov     qword ptr [rcx+8],rax

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiReferenceControlArea+202

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88006bf8ee0 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiReferenceControlArea+202

BUCKET_ID:  X64_0x3B_nt!MiReferenceControlArea+202

Followup: MachineOwner
---------




























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121710-13072-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e57e50
Debug session time: Fri Dec 17 21:35:22.558 2010 (UTC - 5:00)
System Uptime: 0 days 21:33:13.057
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002dbf0f3, fffff88006af6b90, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+43 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002dbf0f3, Address of the instruction which caused the bugcheck
Arg3: fffff88006af6b90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!ExFreePoolWithTag+43
fffff800`02dbf0f3 418b45f0        mov     eax,dword ptr [r13-10h]

CONTEXT:  fffff88006af6b90 -- (.cxr 0xfffff88006af6b90)
rax=0000000000000000 rbx=fffffa8004ace390 rcx=f7fffa80048ac1d0
rdx=0000000000000000 rsi=fffff8a00dce2320 rdi=fffffa8005689000
rip=fffff80002dbf0f3 rsp=fffff88006af7560 rbp=0000000000000001
 r8=0000000000000002  r9=0000000000000090 r10=fffff80002c1a000
r11=fffff88003a99a08 r12=0000000000000000 r13=f7fffa80048ac1d0
r14=0000000000000000 r15=fffff8a00bffd390
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!ExFreePoolWithTag+0x43:
fffff800`02dbf0f3 418b45f0        mov     eax,dword ptr [r13-10h] ds:002b:f7fffa80`048ac1c0=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002dbf0f3

STACK_TEXT:  
fffff880`06af7560 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x43


FOLLOWUP_IP: 
nt!ExFreePoolWithTag+43
fffff800`02dbf0f3 418b45f0        mov     eax,dword ptr [r13-10h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExFreePoolWithTag+43

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88006af6b90 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExFreePoolWithTag+43

BUCKET_ID:  X64_0x3B_nt!ExFreePoolWithTag+43

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-15225-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e55e50
Debug session time: Sun Dec 19 19:35:27.050 2010 (UTC - 5:00)
System Uptime: 0 days 7:15:22.737
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8800421b507, fffff88007aa6c40, 0}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800421b507, Address of the instruction which caused the bugcheck
Arg3: fffff88007aa6c40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`0421b507 488908          mov     qword ptr [rax],rcx

CONTEXT:  fffff88007aa6c40 -- (.cxr 0xfffff88007aa6c40)
rax=f7fff8a00261b468 rbx=fffffa80040d5910 rcx=fffff8a00261b468
rdx=fffffa8005666000 rsi=fffff8a001537b40 rdi=fffffa800566a000
rip=fffff8800421b507 rsp=fffff88007aa7610 rbp=0000000000000001
 r8=fffffa800566b3c0  r9=0000000000000001 r10=0000000000000018
r11=fffff88007aa75e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff8a00d5fc690
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f:
fffff880`0421b507 488908          mov     qword ptr [rax],rcx ds:002b:f7fff8a0`0261b468=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8800421b507

STACK_TEXT:  
fffff880`07aa7610 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f


FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`0421b507 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff88007aa6c40 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f

BUCKET_ID:  X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122010-18189-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c55000 PsLoadedModuleList = 0xfffff800`02e92e50
Debug session time: Mon Dec 20 20:48:25.647 2010 (UTC - 5:00)
System Uptime: 1 days 0:56:10.130
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002c8c03e, fffff88008163100, 0}

Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegment+96 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c8c03e, Address of the instruction which caused the bugcheck
Arg3: fffff88008163100, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiRemoveUnusedSegment+96
fffff800`02c8c03e 48894108        mov     qword ptr [rcx+8],rax

CONTEXT:  fffff88008163100 -- (.cxr 0xfffff88008163100)
rax=fffffa8004075718 rbx=0000000000000000 rcx=f7fffa8004456f18
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000001
rip=fffff80002c8c03e rsp=fffff88008163ad0 rbp=fffff880009e9180
 r8=0000000000000001  r9=0000000000000001 r10=0000000000000002
r11=0000000000000001 r12=fffffa80040d59c0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiRemoveUnusedSegment+0x96:
fffff800`02c8c03e 48894108        mov     qword ptr [rcx+8],rax ds:002b:f7fffa80`04456f20=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d85359 to fffff80002c8c03e

STACK_TEXT:  
fffff880`08163ad0 fffff800`02d85359 : fffffa80`040d59c0 00000000`00000000 fffffa80`040d59c0 000fffff`ffffffff : nt!MiRemoveUnusedSegment+0x96
fffff880`08163b20 fffff800`02d216cc : fffffa80`040d59c0 00000000`00000000 00000000`00000001 00000000`0003a757 : nt!MiCheckForControlAreaDeletion+0x39
fffff880`08163b70 fffff800`02c88cd8 : 00000000`00000002 00000000`00000000 fffffa80`023ded00 00000000`00000080 : nt! ?? ::FNODOBFM::`string'+0x10c6c
fffff880`08163be0 fffff800`02d8629d : fffffa80`023ded00 fffff880`08163d00 00000000`00000080 00000000`0004c482 : nt!MiRestoreTransitionPte+0xcc
fffff880`08163c40 fffff800`02d34ade : 00000000`00000002 fffff880`08163d00 fffff880`02194c00 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`08163cc0 fffff800`02ce1ca2 : 00000000`00000001 fffff900`c3590000 fffff880`08164020 fffff6fc`8061ac80 : nt! ?? ::FNODOBFM::`string'+0x29bb7
fffff880`08163db0 fffff800`02cdfcf1 : 00000000`0004a2a1 00000000`00000000 fffff880`08164448 fffff960`002b2e7b : nt!MiDispatchFault+0x8c2
fffff880`08163ec0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1


FOLLOWUP_IP: 
nt!MiRemoveUnusedSegment+96
fffff800`02c8c03e 48894108        mov     qword ptr [rcx+8],rax

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiRemoveUnusedSegment+96

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88008163100 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiRemoveUnusedSegment+96

BUCKET_ID:  X64_0x3B_nt!MiRemoveUnusedSegment+96

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122010-19032-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c64000 PsLoadedModuleList = 0xfffff800`02ea1e50
Debug session time: Mon Dec 20 20:49:56.477 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:39.960
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002cf11b5, 0, ffffffffffffffff}

Probably caused by : memory_corruption ( nt!MiCheckVirtualAddress+155 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cf11b5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiCheckVirtualAddress+155
fffff800`02cf11b5 483b4118        cmp     rax,qword ptr [rcx+18h]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c0e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  ATICustomerCar

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88006ca2858 -- (.exr 0xfffff88006ca2858)
ExceptionAddress: fffff80002cf11b5 (nt!MiCheckVirtualAddress+0x0000000000000155)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88006ca2900 -- (.trap 0xfffff88006ca2900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000073644 rbx=0000000000000000 rcx=f7fffa80050da700
rdx=fffffa80057a2b30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cf11b5 rsp=fffff88006ca2a90 rbp=fffff88006ca2b40
 r8=fffff88006ca2ba0  r9=fffff6fb40001cd8 r10=fffff6800039b220
r11=fffff6fb40001cd8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiCheckVirtualAddress+0x155:
fffff800`02cf11b5 483b4118        cmp     rax,qword ptr [rcx+18h] ds:6025:f7fffa80`050da718=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d0ea39 to fffff80002cd4740

STACK_TEXT:  
fffff880`06ca2088 fffff800`02d0ea39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cf11b5 00000000`00000000 : nt!KeBugCheckEx
fffff880`06ca2090 fffff800`02cd3d82 : fffff880`06ca2858 00000000`00000000 fffff880`06ca2900 fffff880`06ca2ba8 : nt!KiDispatchException+0x1b9
fffff880`06ca2720 fffff800`02cd268a : fffffa80`03125d30 fffff800`02cfab83 29d00001`061f1025 00000001`061f1121 : nt!KiExceptionDispatch+0xc2
fffff880`06ca2900 fffff800`02cf11b5 : fffffa80`054c9b60 ffffffff`ffffffff 00000000`00000000 fffff880`06ca2b40 : nt!KiGeneralProtectionFault+0x10a
fffff880`06ca2a90 fffff800`02cee633 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`00000000 : nt!MiCheckVirtualAddress+0x155
fffff880`06ca2ac0 fffff800`02cd282e : 00000000`00000008 00000000`0018fc30 00000000`0008e301 00000000`00008000 : nt!MmAccessFault+0x233
fffff880`06ca2c20 00000000`73644080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0008e338 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73644080


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiCheckVirtualAddress+155
fffff800`02cf11b5 483b4118        cmp     rax,qword ptr [rcx+18h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!MiCheckVirtualAddress+155

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!MiCheckVirtualAddress+155

BUCKET_ID:  X64_0x1E_c0000005_nt!MiCheckVirtualAddress+155

Followup: MachineOwner
---------


Drivers:

Code:
start             end                 module name
fffff880`00ec4000 fffff880`00f1b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c4d000 fffff880`02cd7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`011dc000 fffff880`011f2000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`019d7000 fffff880`019ec000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03a61000 fffff880`03a69000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`00df7000 fffff880`00e00000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`045d1000 fffff880`045f1000   AtihdW76 AtihdW76.sys Thu Jul 15 08:46:49 2010 (4C3F0339)
fffff880`03a6a000 fffff880`0427b000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`01800000 fffff880`0184c000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`01883000 fffff880`0188b000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`018f4000 fffff880`018fb000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`019a0000 fffff880`019b1000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`060ce000 fffff880`060ec000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006c0000 fffff960`006e7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018c1000 fffff880`018eb000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d1d000 fffff880`00ddd000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01853000 fffff880`01883000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cbf000 fffff880`00d1d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01169000 fffff880`011dc000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`01227000 fffff880`01237000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`057c1000 fffff880`057cf000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c26000 fffff880`02c44000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c17000 fffff880`02c26000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0148f000 fffff880`014a5000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`052c2000 fffff880`052e4000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`057db000 fffff880`057e4000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`057cf000 fffff880`057db000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`057e4000 fffff880`057f7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05344000 fffff880`05350000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0427b000 fffff880`0436f000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0436f000 fffff880`043b5000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00c81000 fffff880`00c95000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c35000 fffff880`00c81000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01455000 fffff880`0148f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01557000 fffff880`015a1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`043ec000 fffff880`043f9000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02c1b000 fffff800`02c64000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`043b5000 fffff880`043d9000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05307000 fffff880`05320000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05320000 fffff880`05328080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05600000 fffff880`0560e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`06006000 fffff880`060ce000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0144c000 fffff880`01455000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`044ed000 fffff880`044fc000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05329000 fffff880`05337000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc9000 fffff800`00bd3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0450d000 fffff880`04550000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013e2000 fffff880`013fc000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0152c000 fffff880`01557000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`052e4000 fffff880`052e9200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`043d9000 fffff880`043ec000   L1C62x64 L1C62x64.sys Fri Sep 04 01:39:09 2009 (4AA0A7FD)
fffff880`010f6000 fffff880`0110b000   Lbd      Lbd.sys      Tue May 25 03:45:36 2010 (4BFB8020)
fffff880`053a2000 fffff880`053b7000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0535e000 fffff880`05381000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c9e000 fffff880`00cab000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05350000 fffff880`0535e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`044fc000 fffff880`0450b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05337000 fffff880`05344000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00ddd000 fffff880`00df7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`060ec000 fffff880`06104000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06104000 fffff880`06131000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06131000 fffff880`0617f000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0617f000 fffff880`061a2000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01959000 fffff880`01964000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f24000 fffff880`00f2e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0110b000 fffff880`01169000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c0c000 fffff880`02c17000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0143a000 fffff880`0144c000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01000000 fffff880`010f2000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0445c000 fffff880`04468000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04468000 fffff880`04497000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`045bc000 fffff880`045d1000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d4b000 fffff880`02d5a000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cd7000 fffff880`02d1c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`014cc000 fffff880`0152c000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01964000 fffff880`01975000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c00000 fffff880`02c0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c64000 fffff800`03240000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0123f000 fffff880`013e2000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018eb000 fffff880`018f4000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d25000 fffff880`02d4b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`014a5000 fffff880`014c2000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f6e000 fffff880`00f83000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f2e000 fffff880`00f61000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ff4000 fffff880`00ffb000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e00000 fffff880`00e10000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06631000 fffff880`066d7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05285000 fffff880`052c2000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cab000 fffff880`00cbf000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04438000 fffff880`0445c000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04497000 fffff880`044b2000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`044b2000 fffff880`044d3000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`044d3000 fffff880`044ed000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02da6000 fffff880`02df7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0193e000 fffff880`01947000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01947000 fffff880`01950000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01950000 fffff880`01959000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`053b7000 fffff880`053cf000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`066d7000 fffff880`066e2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0121b000 fffff880`01227000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d5a000 fffff880`02d77000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015ed000 fffff880`015f5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06a75000 fffff880`06b0b000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06721000 fffff880`06788000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`066e2000 fffff880`0670f000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0450b000 fffff880`0450c480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0670f000 fffff880`06721000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01993000 fffff880`019a0000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01975000 fffff880`01993000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d92000 fffff880`02da6000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`019b1000 fffff880`019d7000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04550000 fffff880`04562000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`052ea000 fffff880`05307000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`057f7000 fffff880`057f8f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`019ec000 fffff880`019fd000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04562000 fffff880`045bc000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03a00000 fffff880`03a0b000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03a0b000 fffff880`03a61000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f61000 fffff880`00f6e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018fb000 fffff880`01909000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`05613000 fffff880`057c1000   viahduaa viahduaa.sys Mon Jan 11 05:05:18 2010 (4B4AF7DE)
fffff880`01909000 fffff880`0192e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f83000 fffff880`00f98000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f98000 fffff880`00ff4000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`015a1000 fffff880`015ed000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d77000 fffff880`02d92000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0192e000 fffff880`0193e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e11000 fffff880`00eb5000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eb5000 fffff880`00ec4000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d1c000 fffff880`02d25000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`02c44000 fffff880`02c4d000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f1b000 fffff880`00f24000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05381000 fffff880`053a2000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0188b000 fffff880`01899000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01899000 fffff880`018a5000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018a5000 fffff880`018ae000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018ae000 fffff880`018c1000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Dec 21, 2010
Messages
5
Reaction score
0
Update Atheros L1c PCI-E Gigabit Ethernet:

L1C62x64.sys Fri Sep 04 01:39:09 2009
Could you maybe provide a link for this update? I have been searching and ran the search for driver update on windows and can't seem to find one.
 

Nibiru2012

Quick Scotty, beam me up!
Joined
Oct 27, 2009
Messages
4,955
Reaction score
1,302
Could you maybe provide a link for this update? I have been searching and ran the search for driver update on windows and can't seem to find one.
Try this link and see if it helps out. This is a Czech (sp?) website. There's both the 32 and 64 bit drivers listed v1.0.0.36 10-22-2010

Drivers for Atheros L1C and Windows 7

Atheros drivers are a pain because the Atheros website does not provide drivers, they leave that to the vendor of the chipset such motherboard maker, laptop maker, computer maker, PCI card maker, etc.

Only the Czech website has drivers.

I hope this helps.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Could you maybe provide a link for this update? I have been searching and ran the search for driver update on windows and can't seem to find one.
To add to Nibiru's, I would also search downloads for your motherboard since this Atheros network card is a part of it.
 
Joined
Dec 21, 2010
Messages
5
Reaction score
0
How do I physically get the downloads to install once they are in my temp folder? I went to the link provided and got that file. But I just need the actual process to be spelled out to me to get this done. I'm sorry, I am just not very computer savvy with these sort of things :(
 

Elmer BeFuddled

Resident eejit
Joined
Jun 12, 2010
Messages
1,050
Reaction score
251
[FONT=&quot]Download the driver and extract it to a folder.[/FONT]
[FONT=&quot]Open the Device Manager.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Right click your device.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Choose Update Driver Software.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Select Browse My Computer.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Select Let me pick.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Select Have disk.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Select Browse.[/FONT]
[FONT=&quot]
[/FONT]
[FONT=&quot]Now navigate to the extracted folder and double click on the .inf. file.[/FONT]
[FONT=&quot]Hit OK, then next and it will install.[/FONT][FONT=&quot][/FONT]
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Or simply run the installer and follow the on-screen instructions.
 

Nibiru2012

Quick Scotty, beam me up!
Joined
Oct 27, 2009
Messages
4,955
Reaction score
1,302
Did you update your Atheros driver?

Since the driver is an ".inf" driver, you must use the method that Elmer Befuddled stated, there is no executable to install the driver for you.

IF you need more detailed info on how to do this let us know. I know this procedure so well I can nearly do it asleep. It's how I install Intel info drivers for the ICH10R chipset and the P45 chipset. Works the best and really gets the mobo in tune.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
No Lavasoft and not even sign of Atheros, looks like you renamed or deleted it. Although it was possible to update it,

Check your RAM settings in BIOS and test RAM overnight:

https://www.w7forums.com/memtest86-memory-testing-t9067.html











Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122410-27736-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e87e50
Debug session time: Fri Dec 24 14:18:17.390 2010 (UTC - 5:00)
System Uptime: 0 days 17:47:38.873
Loading Kernel Symbols
.............................................Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000

Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+3437323764383835
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9c3a8 -- (.exr 0xfffff80000b9c3a8)
ExceptionAddress: fffff80002cc5e20 (nt!KiProcessExpiredTimerList+0x0000000000000110)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9c450 -- (.trap 0xfffff80000b9c450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8005ef3b18
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc5e20 rsp=fffff80000b9c5e0 rbp=fffffa8005ace340
 r8=fffff80002e37001  r9=0000000000000003 r10=0000000000000047
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiProcessExpiredTimerList+0x110:
fffff800`02cc5e20 f00fba2f07      lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cb246e to fffff80002cba710

STACK_TEXT:  
fffff800`00b9b498 fffff800`02cb246e : 0050cd84`00000004 fffff800`00b9b710 fffff800`00b9bc10 fffff800`02ce7668 : nt!KeBugCheck
fffff800`00b9b4a0 fffff800`02ce040d : fffff800`02ec8b7c fffff800`02e02e84 fffff800`02c4a000 fffff800`00b9c3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b4d0 fffff800`02ce7a90 : fffff800`02e09b14 fffff800`00b9b548 fffff800`00b9c3a8 fffff800`02c4a000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b500 fffff800`02cf49ef : fffff800`00b9c3a8 fffff800`00b9bc10 fffff800`00000000 f7fffa80`06559cd0 : nt!RtlDispatchException+0x410
fffff800`00b9bbe0 fffff800`02cb9d82 : fffff800`00b9c3a8 fffffa80`05ace3a0 fffff800`00b9c450 fffffa80`03bfb4c0 : nt!KiDispatchException+0x16f
fffff800`00b9c270 fffff800`02cb868a : fffff880`00e99b50 fffffa80`04383d50 fffffa80`04c021d0 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c450 fffff800`02cc5e20 : fffffa80`06594830 fffffa80`0575e780 fffffa80`0575e780 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c5e0 fffff800`02cc64be : 00000095`26105c1b fffff800`00b9cc58 00000000`003ea847 fffff800`02e37b68 : nt!KiProcessExpiredTimerList+0x110
fffff800`00b9cc30 fffff800`02cc5cb7 : 0000002d`5a1453c2 0000002d`003ea847 0000002d`5a1453a7 00000000`00000047 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`02cc2eea : fffff800`02e34e80 fffff800`02e42c40 00000000`00000000 fffff880`00fddf44 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cb246e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00e68000 fffff880`00ebf000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`00e00000 fffff880`00e0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fc9000 fffff880`00fd2000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fd2000 fffff880`00ffc000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0143a000 fffff880`01442000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`00d23000 fffff880`00de3000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cc5000 fffff880`00d23000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012b3000 fffff880`01326000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`015e4000 fffff880`015fa000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0103d000 fffff880`01051000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00e0b000 fffff880`00e57000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01337000 fffff880`01341000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01200000 fffff880`0123a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01341000 fffff880`0138b000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c01000 fffff800`02c4a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`015db000 fffff880`015e4000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff800`00bcf000 fffff800`00bd9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`01299000 fffff880`012b3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01596000 fffff880`015c1000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00ca4000 fffff880`00cb1000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00faf000 fffff880`00fc9000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ec8000 fffff880`00ed2000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0123b000 fffff880`01299000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`015c9000 fffff880`015db000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01444000 fffff880`01536000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01536000 fffff880`01596000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff800`02c4a000 fffff800`03226000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01051000 fffff880`011f4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`00f12000 fffff880`00f27000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ed2000 fffff880`00f05000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f98000 fffff880`00f9f000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f9f000 fffff880`00faf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01326000 fffff880`01337000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00cb1000 fffff880`00cc5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`015c1000 fffff880`015c9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`00f05000 fffff880`00f12000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00f27000 fffff880`00f3c000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f3c000 fffff880`00f98000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0138b000 fffff880`013d7000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de3000 fffff880`00df2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ebf000 fffff880`00ec8000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
 

Nibiru2012

Quick Scotty, beam me up!
Joined
Oct 27, 2009
Messages
4,955
Reaction score
1,302
How do I physically get the downloads to install once they are in my temp folder? I went to the link provided and got that file. But I just need the actual process to be spelled out to me to get this done. I'm sorry, I am just not very computer savvy with these sort of things :(
Don't put any driver downloads in a "Temp" folder. You may lose them that way. I would put them in the downloads folder and then delete or save them as needed.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
I went to the link provided and got that file. But I just need the actual process to be spelled out to me to get this done.

Drivers come as a) installer.exe files or b) .zip/.rar archives. To install a) type just run the installer and let it do the job. To install b) extract the archive to a folder, and you have two variants here inside the folder with the extracted driver:

1) if it has the installer, click on it to run and install
2) if there's just data and inf files and no installer, goto device manager, locate and right click the device to update, browse to the folder with the extracted driver to let the system update from it.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top