BSOD - Mostly When Video Rendering - New PC

Joined
Dec 22, 2010
Messages
7
Reaction score
0
I've been dealing with BSOD after I installed Windows7 on a my new PC.

It used to happen time to time, now it usually happens (9 of 10 times) when I want to do video rendering. It just freezes and I get BSOD.

I truly hope you guys can help me because it's driving me crazy :(

Thank you!
 

Attachments

Last edited:
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Welcome to w7forums, that's the best avatar I ever saw, expressive. :)

Let's see,

Code:
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred
0x124_AuthenticAMD_PROCESSOR_BUS_PRV


1. Update drivers for a slim chance they'll fix it:

E1G6032E.sys Wed May 28 19:14:51 2008
Intel(R) PRO/1000 Adapter NDIS 6

Lycosa.sys Wed Sep 30 00:45:50 2009
Razer Tarantula Keyboard

nusb3hub.sys Thu Jan 21 22:22:18 2010
NEC USB 3.0 (motherboard driver)


2. Uninstall Daemon Tools and then cleanup its driver with this tool:

http://www.duplexsecure.com/en/faq


Unfortunately stop0x124 is involved here, which means blame the hardware. Things to try:

1. The Power Supply can cause this error
2. Update drivers
3. Check the CPU and RAM settings in the bios
4. No overheating, no overclocking
5. Consider bios upgrade if that's an option


Additionally, you may want to test CPU with Prime95 and test RAM with the memtest:

https://www.w7forums.com/prime95-cpu-stress-testing-t9038.html

https://www.w7forums.com/memtest86-memory-testing-t9067.html





Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122210-34554-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x8301f000 PsLoadedModuleList = 0x83167810
Debug session time: Wed Dec 22 06:57:57.435 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:11.965
Loading Kernel Symbols
..................................................
Loading User Symbols
Mini Kernel Dump does not contain unloaded driver list
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 124, {0, 86c558fc, 0, 0}

Probably caused by : hardware

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 00000000, Machine Check Exception
Arg2: 86c558fc, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000, High order 32-bits of the MCi_STATUS value.
Arg4: 00000000, Low order 32-bits of the MCi_STATUS value.

Debugging Details:
------------------


BUGCHECK_STR:  0x124_AuthenticAMD

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

STACK_TEXT:  
8e327cc4 830edfc5 86c558e0 83186c28 83186c20 nt!WheapCreateTriageDumpFromPreviousSession+0x32
8e327ce4 830eedef 83186c20 86c558e0 83186c50 nt!WheapProcessWorkQueueItem+0x56
8e327d00 8308cf3b 83186c20 00000000 85cc24c0 nt!WheapWorkQueueWorkerRoutine+0x1f
8e327d50 8322d6d3 00000001 ab5a0b4d 00000000 nt!ExpWorkerThread+0x10d
8e327d90 830df0f9 8308ce2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  0x124_AuthenticAMD_PROCESSOR_BUS_PRV

BUCKET_ID:  0x124_AuthenticAMD_PROCESSOR_BUS_PRV

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122210-14336-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50
Debug session time: Wed Dec 22 08:19:35.930 2010 (UTC - 5:00)
System Uptime: 0 days 2:01:37.226
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, c, 8, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031070e0
 0000000000000000 

CURRENT_IRQL:  c

FAULTING_IP: 
+3538346362626361
00000000`00000000 ??              ???

PROCESS_NAME:  svchost.exe

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

TRAP_FRAME:  fffff8800679c570 -- (.trap 0xfffff8800679c570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=0000000000000003
rdx=f8800679c7a00006 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8800679c700 rbp=0000000000000000
 r8=0000000000004cc0  r9=0000000000000000 r10=0000000000000030
r11=fffff88002fd5180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ececa9 to fffff80002ecf740

FAILED_INSTRUCTION_ADDRESS: 
+3538346362626361
00000000`00000000 ??              ???

STACK_TEXT:  
fffff880`0679c428 fffff800`02ececa9 : 00000000`0000000a 00000000`00000000 00000000`0000000c 00000000`00000008 : nt!KeBugCheckEx
fffff880`0679c430 fffff800`02ecd920 : 00000000`00000000 00000000`00000005 fffffa80`08214000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0679c570 00000000`00000000 : 00000000`00040001 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02ecd920 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260

BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122210-14430-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`0303fe50
Debug session time: Tue Dec 21 17:11:47.130 2010 (UTC - 5:00)
System Uptime: 0 days 22:26:49.009
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff8800166b9b6}

Probably caused by : ndis.sys ( ndis!memcmp+6 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8800166b9b6

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002e71ca9 to fffff80002e72740

STACK_TEXT:  
fffff880`009edd68 fffff800`02e71ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009edd70 fffff800`02e70172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009edeb0 fffff880`0166b9b6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`0a1d85e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!memcmp+0x6


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ndis!memcmp+6
fffff880`0166b9b6 087222          or      byte ptr [rdx+22h],dh

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  ndis!memcmp+6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ndis

IMAGE_NAME:  ndis.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc184

FAILURE_BUCKET_ID:  X64_0x7f_8_ndis!memcmp+6

BUCKET_ID:  X64_0x7f_8_ndis!memcmp+6

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122210-19437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030a5e50
Debug session time: Wed Dec 22 08:27:40.405 2010 (UTC - 5:00)
System Uptime: 0 days 0:06:30.716
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ed79e4, fffff88009d71250, 0}

Probably caused by : hardware ( nt!KiSystemServiceExit+49 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ed79e4, Address of the instruction which caused the bugcheck
Arg3: fffff88009d71250, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KiSystemServiceExit+49
fffff800`02ed79e4 8801            mov     byte ptr [rcx],al

CONTEXT:  fffff88009d71250 -- (.cxr 0xfffff88009d71250)
rax=fffff880009e7180 rbx=0000000005365b90 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed79e4 rsp=fffff88009d71c20 rbp=fffff88009d71ca0
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8006a36570
r11=fffffa8006f4a060 r12=00000000053dadd0 r13=0000000000000000
r14=0000000000000001 r15=0000000000000001
iopl=0         nv up di pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010046
nt!KiSystemServiceExit+0x49:
fffff800`02ed79e4 8801            mov     byte ptr [rcx],al ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  vegas100.exe

CURRENT_IRQL:  0

MISALIGNED_IP: 
nt!KiSystemServiceExit+49
fffff800`02ed79e4 8801            mov     byte ptr [rcx],al

LAST_CONTROL_TRANSFER:  from 0000000076f4ff5a to fffff80002ed79e4

STACK_TEXT:  
fffff880`09d71c20 00000000`76f4ff5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x49
00000000`0bc5fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f4ff5a


FOLLOWUP_IP: 
nt!KiSystemServiceExit+49
fffff800`02ed79e4 8801            mov     byte ptr [rcx],al

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiSystemServiceExit+49

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff88009d71250 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED

BUCKET_ID:  X64_IP_MISALIGNED

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\122210-14710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e62000 PsLoadedModuleList = 0xfffff800`0309fe50
Debug session time: Wed Dec 22 09:11:26.345 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:52.641
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ed19e4, fffff8800bb17250, 0}

Probably caused by : hardware ( nt!KiSystemServiceExit+49 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ed19e4, Address of the instruction which caused the bugcheck
Arg3: fffff8800bb17250, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!KiSystemServiceExit+49
fffff800`02ed19e4 8801            mov     byte ptr [rcx],al

CONTEXT:  fffff8800bb17250 -- (.cxr 0xfffff8800bb17250)
rax=fffff880009e7180 rbx=0000000005398ee0 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed19e4 rsp=fffff8800bb17c20 rbp=fffff8800bb17ca0
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8006a1a570
r11=fffffa800a959060 r12=00000000056a6e50 r13=0000000000000000
r14=0000000000000001 r15=0000000000000001
iopl=0         nv up di pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010046
nt!KiSystemServiceExit+0x49:
fffff800`02ed19e4 8801            mov     byte ptr [rcx],al ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  vegas100.exe

CURRENT_IRQL:  0

MISALIGNED_IP: 
nt!KiSystemServiceExit+49
fffff800`02ed19e4 8801            mov     byte ptr [rcx],al

LAST_CONTROL_TRANSFER:  from 00000000775cff5a to fffff80002ed19e4

STACK_TEXT:  
fffff880`0bb17c20 00000000`775cff5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x49
00000000`0bb1fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775cff5a


FOLLOWUP_IP: 
nt!KiSystemServiceExit+49
fffff800`02ed19e4 8801            mov     byte ptr [rcx],al

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiSystemServiceExit+49

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff8800bb17250 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED

BUCKET_ID:  X64_IP_MISALIGNED

Followup: MachineOwner
---------


Drivers:

Code:
start             end                 module name
fffff880`0426a000 fffff880`042a8000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f8e000 fffff880`00fe5000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`05605000 fffff880`0564a000   aef97r9q aef97r9q.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`02c93000 fffff880`02d1d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05663000 fffff880`05679000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04109000 fffff880`0411e000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01135000 fffff880`01140000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04802000 fffff880`0480a000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`01102000 fffff880`0110b000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0110b000 fffff880`01135000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00720000 fffff960`00781000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
fffff880`013c8000 fffff880`013cf000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`040d2000 fffff880`040e3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07d5c000 fffff880`07d7a000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00840000 fffff960`00867000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`014b6000 fffff880`014e0000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c83000 fffff880`00d43000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c25000 fffff880`00c83000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014e3000 fffff880`01556000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`05653000 fffff880`05663000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`07c71000 fffff880`07c7a000   cpuz134_x64 cpuz134_x64.sys Fri Jul 09 07:16:58 2010 (4C37052A)
fffff880`065e7000 fffff880`065f5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04031000 fffff880`040b4000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`06415000 fffff880`06417f00   dadder   dadder.sys   Mon Apr 19 05:04:42 2010 (4BCC1CAA)
fffff880`040b4000 fffff880`040d2000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02de6000 fffff880`02df5000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05b08000 fffff880`05b2a000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0640c000 fffff880`06415000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06400000 fffff880`0640c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05b30000 fffff880`05b43000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`065db000 fffff880`065e7000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042ee000 fffff880`043e2000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04200000 fffff880`04246000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`041d9000 fffff880`041fc980   E1G6032E E1G6032E.sys Wed May 28 19:14:51 2008 (483DE76B)
fffff880`0118c000 fffff880`011a0000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01140000 fffff880`0118c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01567000 fffff880`01571000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`017b1000 fffff880`017fb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e19000 fffff800`02e62000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04246000 fffff880`0426a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05730000 fffff880`05749000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05749000 fffff880`05751080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05b43000 fffff880`05b51000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07c94000 fffff880`07d5c000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`016b5000 fffff880`016be000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0575d000 fffff880`0576c000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05a94000 fffff880`05aa2000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0577d000 fffff880`057c0000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013ae000 fffff880`013c8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05b2a000 fffff880`05b2f200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05a00000 fffff880`05a15000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05bdb000 fffff880`05bfe000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`08787000 fffff880`08791000   LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
fffff880`05b89000 fffff880`05bdad00   lvrs64   lvrs64.sys   Tue Nov 09 21:36:46 2010 (4CDA053E)
fffff880`07607000 fffff880`079fda80   lvuvc64  lvuvc64.sys  Tue Nov 09 21:37:14 2010 (4CDA055A)
fffff880`065f5000 fffff880`065f9f80   Lycosa   Lycosa.sys   Wed Sep 30 00:45:50 2009 (4AC2E27E)
fffff880`00c04000 fffff880`00c11000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`08791000 fffff880`0879f000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0576c000 fffff880`0577b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05a87000 fffff880`05a94000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`010e8000 fffff880`01102000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`07d7a000 fffff880`07d92000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07d92000 fffff880`07dbf000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07c00000 fffff880`07c4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07c4e000 fffff880`07c71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01000000 fffff880`0100b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fe5000 fffff880`00fef000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`011a0000 fffff880`011fe000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02ddb000 fffff880`02de6000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`016a3000 fffff880`016b5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016bf000 fffff880`017b1000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0569d000 fffff880`056a9000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`056a9000 fffff880`056d8000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05a72000 fffff880`05a87000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d91000 fffff880`02da0000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d1d000 fffff880`02d62000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02c57000 fffff880`02c68000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dcf000 fffff880`02ddb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e62000 fffff800`0343e000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0120b000 fffff880`013ae000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`015f7000 fffff880`01600000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`057d2000 fffff880`057ea000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`042a8000 fffff880`042d8000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`04800000 fffff880`04801180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`05aa2000 fffff880`05acb000   nvhda64v nvhda64v.sys Tue Sep 07 16:08:40 2010 (4C869BC8)
fffff880`04825000 fffff880`053fea80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`02d6b000 fffff880`02d91000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0104b000 fffff880`01060000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`01018000 fffff880`0104b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`010d1000 fffff880`010d8000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`010d8000 fffff880`010e8000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01556000 fffff880`01567000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`082dd000 fffff880`08383000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05acb000 fffff880`05b08000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`0879f000 fffff880`087aa000   PROCEXP141 PROCEXP141.SYS Thu Apr 15 05:24:06 2010 (4BC6DB36)
fffff880`00c11000 fffff880`00c25000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`05679000 fffff880`0569d000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`056d8000 fffff880`056f3000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`056f3000 fffff880`05714000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`05714000 fffff880`0572e000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`05752000 fffff880`0575d000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`013ed000 fffff880`013f6000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f6000 fffff880`013ff000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01200000 fffff880`01209000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bd000 fffff880`015f7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0480a000 fffff880`04822000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`00f5f000 fffff880`00f8e000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08383000 fffff880`0838e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0169b000 fffff880`016a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`08200000 fffff880`08271000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`00e30000 fffff880`00f56000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`086f1000 fffff880`08787000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0868a000 fffff880`086f1000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0838e000 fffff880`083bb000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0577b000 fffff880`0577c480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08271000 fffff880`08283000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02c86000 fffff880`02c93000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c68000 fffff880`02c86000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dbb000 fffff880`02dcf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00530000 fffff960`0053a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`040e3000 fffff880`04109000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`057c0000 fffff880`057d2000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05b6e000 fffff880`05b88c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05b51000 fffff880`05b6e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`042d8000 fffff880`042d9f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`043ed000 fffff880`043fe000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042da000 fffff880`042e7000   usbfilter usbfilter.sys Wed Oct 07 03:44:08 2009 (4ACC46C8)
fffff880`05a18000 fffff880`05a72000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`043e2000 fffff880`043ed000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04183000 fffff880`041d9000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fef000 fffff880`00ffc000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`013cf000 fffff880`013dd000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0572e000 fffff880`0572fd80   vHidDev  vHidDev.sys  Mon Dec 21 08:49:58 2009 (4B2F7D06)
fffff880`0641c000 fffff880`065cd000   viahduaa viahduaa.sys Tue Mar 02 06:30:18 2010 (4B8CF6CA)
fffff880`00e00000 fffff880`00e25000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`065cd000 fffff880`065db000   VMfilt64 VMfilt64.sys Thu Jul 30 23:40:32 2009 (4A7267B0)
fffff880`0168b000 fffff880`0169b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`01060000 fffff880`01075000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01075000 fffff880`010d1000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01571000 fffff880`015bd000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02da0000 fffff880`02dbb000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`013dd000 fffff880`013ed000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d43000 fffff880`00de7000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de7000 fffff880`00df6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d62000 fffff880`02d6b000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00320000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`0564a000 fffff880`05653000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f56000 fffff880`00f5f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0411e000 fffff880`04183000   yk62x64  yk62x64.sys  Mon Feb 15 10:46:41 2010 (4B796C61)

Unloaded modules:
fffff880`01480000 fffff880`0148e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0148e000 fffff880`0149a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0149a000 fffff880`014a3000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`014a3000 fffff880`014b6000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top