BSOD, not sure what to do.

Joined
Apr 24, 2011
Messages
2
Reaction score
0
This is going to be a little bit difficult seeing as it isn't my computer these problems are occurring to, it's my friends. But I have attached the dumpfiles to this post. His current system specs are.

250GTS Gigabtye Graphics Card
Q6600 2.4ghz Intel CPU
Seagate 320GB HDD
EVGA 780i Motherboard
2x2GB DDR2 800mhz Ram -.- Generic

The problems started when he reformatted the other day and he would get BSOD, so he tried reformatting again thinking the reformat was the problem. He is still getting BSOD. He has tested bother of his RAM modules and both of the sockets he uses. The computer BSOD at random between, 45 seconds after booting and 2hours after boot.
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Hello and Welcome to w7forums. :)


042411-21777-01.dmp
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : athrxusb.sys ( athrxusb+5af17 )

042411-21387-01.dmp
BugCheck 3B, {c0000005, fffff800028d2670, fffff88003fc8cc0, 0}
Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

042411-19546-01.dmp
BugCheck 1000007E, {ffffffffc0000005, fffff800028b29eb, fffff880031db908, fffff880031db170}
Probably caused by : ntkrnlmp.exe ( nt!ExpScanGeneralLookasideList+a0 )

042411-18127-01.dmp
BugCheck 19, {3, fffffa80043df3f0, fffffa80043df3f0, 27c9bb4303d1c2de}
Probably caused by : Pool_Corruption ( nt!ExFreePool+780 )


Update drivers:

Atheros Wireless LAN USB
athrxusb.sys Mon Jan 29 07:57:10 2007

Razer Tarantula Keyboard
Lycosa.sys Fri Jan 18 03:51:42 2008

nForce
nvmf6264.sys Wed Nov 11 18:16:48 2009




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-18127-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
Debug session time: Sat Apr 23 11:57:36.848 2011 (UTC - 4:00)
System Uptime: 0 days 0:12:35.002
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa80043df3f0, fffffa80043df3f0, 27c9bb4303d1c2de}

Probably caused by : Pool_Corruption ( nt!ExFreePool+780 )

Followup: Pool_corruption
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa80043df3f0, the pool entry being checked.
Arg3: fffffa80043df3f0, the read back flink freelist value (should be the same as 2).
Arg4: 27c9bb4303d1c2de, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  SearchFilterHo

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff800029ba130 to fffff80002888f00

STACK_TEXT:  
fffff880`09c257d8 fffff800`029ba130 : 00000000`00000019 00000000`00000003 fffffa80`043df3f0 fffffa80`043df3f0 : nt!KeBugCheckEx
fffff880`09c257e0 fffff800`029bc4c1 : fffffa80`04613150 fffffa80`0437eb00 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x780
fffff880`09c25870 fffff800`0288e0bc : fffffa80`0437eb30 00000000`00000000 fffff8a0`65726854 fffffa80`03f6cde0 : nt!ExFreePoolWithTag+0x411
fffff880`09c25920 fffff800`02b9c194 : fffff8a0`03441760 00000000`00000000 fffffa80`06922060 00000000`00000000 : nt!ObfDereferenceObject+0xdc
fffff880`09c25980 fffff800`02b45870 : 00000000`00000128 fffff8a0`03441760 fffff8a0`035a44a0 00000000`00000128 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`09c25a10 fffff800`02b457e4 : 00000000`00000004 00000000`00000000 fffffa80`0465b060 fffff800`02b2ef21 : nt!ObpCloseHandleProcedure+0x30
fffff880`09c25a50 fffff800`02b446ae : fffff8a0`03130001 00000000`00000001 fffffa80`0465b060 fffffa80`0465b101 : nt!ExSweepHandleTable+0x74
fffff880`09c25a90 fffff800`02b6b724 : fffff8a0`03130060 00000000`00000000 00000000`00000000 fffffa80`068b7960 : nt!ObKillProcess+0x62
fffff880`09c25ad0 fffff800`02b44cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x3f4
fffff880`09c25ba0 fffff800`02888153 : fffffa80`0465b060 00000000`00000000 fffffa80`06922060 fffffa80`04622860 : nt!NtTerminateProcess+0x138
fffff880`09c25c20 00000000`7701017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0020fb08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7701017a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExFreePool+780
fffff800`029ba130 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExFreePool+780

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+780

BUCKET_ID:  X64_0x19_3_nt!ExFreePool+780

Followup: Pool_corruption
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-19546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0284e000 PsLoadedModuleList = 0xfffff800`02a8be50
Debug session time: Sat Apr 23 19:40:27.610 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:35.811
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff800028b29eb, fffff880031db908, fffff880031db170}

Probably caused by : ntkrnlmp.exe ( nt!ExpScanGeneralLookasideList+a0 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028b29eb, The address that the exception occurred at
Arg3: fffff880031db908, Exception Record Address
Arg4: fffff880031db170, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpScanGeneralLookasideList+a0
fffff800`028b29eb 418b40d8        mov     eax,dword ptr [r8-28h]

EXCEPTION_RECORD:  fffff880031db908 -- (.exr 0xfffff880031db908)
ExceptionAddress: fffff800028b29eb (nt!ExpScanGeneralLookasideList+0x00000000000000a0)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880031db170 -- (.cxr 0xfffff880031db170)
rax=0000000000000000 rbx=fffff80002a63760 rcx=0000000073e4a9de
rdx=000000003108dfa0 rsi=fffffa80018c2040 rdi=000000000000ffff
rip=fffff800028b29eb rsp=fffff880031dbb40 rbp=0000000000000001
 r8=251de5e735429917  r9=0000000000005c41 r10=000000003108dfa0
r11=000000000000abdc r12=0000000000000000 r13=fffff80002a63750
r14=0000000000000000 r15=fffff88002f67f40
iopl=0         nv up ei pl nz na po cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010207
nt!ExpScanGeneralLookasideList+0xa0:
fffff800`028b29eb 418b40d8        mov     eax,dword ptr [r8-28h] ds:002b:251de5e7`354298ef=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002af60e0
 ffffffffffffffff 

FOLLOWUP_IP: 
nt!ExpScanGeneralLookasideList+a0
fffff800`028b29eb 418b40d8        mov     eax,dword ptr [r8-28h]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff800028d20e0 to fffff800028b29eb

STACK_TEXT:  
fffff880`031dbb40 fffff800`028d20e0 : 00000000`00000001 00000000`00000008 00000000`00000001 fffff800`02af6900 : nt!ExpScanGeneralLookasideList+0xa0
fffff880`031dbba0 fffff800`028d316e : 00000000`00000008 fffff880`031dbc10 00000000`00000001 fffffa80`00000000 : nt!ExAdjustLookasideDepth+0x40
fffff880`031dbbd0 fffff800`02b617c6 : fffffa80`018e8040 00000000`00000080 fffffa80`018c2040 00000000`00000001 : nt!KeBalanceSetManager+0x1be
fffff880`031dbd40 fffff800`0289cc26 : fffff880`02f63180 fffffa80`018e8040 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031dbd80 00000000`00000000 : fffff880`031dc000 fffff880`031d6000 fffff880`031db710 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpScanGeneralLookasideList+a0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff880031db170 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_nt!ExpScanGeneralLookasideList+a0

BUCKET_ID:  X64_0x7E_nt!ExpScanGeneralLookasideList+a0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-21387-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02856000 PsLoadedModuleList = 0xfffff800`02a93e50
Debug session time: Sat Apr 23 21:07:10.373 2011 (UTC - 4:00)
System Uptime: 0 days 0:35:57.574
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800028d2670, fffff88003fc8cc0, 0}

Probably caused by : ntkrnlmp.exe ( nt!IofCallDriver+50 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800028d2670, Address of the instruction which caused the bugcheck
Arg3: fffff88003fc8cc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!IofCallDriver+50
fffff800`028d2670 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

CONTEXT:  fffff88003fc8cc0 -- (.cxr 0xfffff88003fc8cc0)
rax=000000000000000e rbx=0000000000000000 rcx=fffffa8004650a10
rdx=fffffa8002ae6b40 rsi=0000000000070048 rdi=0000000000000000
rip=fffff800028d2670 rsp=fffff88003fc9698 rbp=fffffa8004650a10
 r8=b133cb0d0233f5bd  r9=000000000000000e r10=fffff880009ebfa0
r11=fffffa8002a133b0 r12=0000000000000000 r13=fffffa800464fcd0
r14=fffffa8002274e30 r15=0000000000000001
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!IofCallDriver+0x50:
fffff800`028d2670 49ff64c070      jmp     qword ptr [r8+rax*8+70h] ds:002b:b133cb0d`0233f69d=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  taskhost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800028d2670

STACK_TEXT:  
fffff880`03fc9698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x50


FOLLOWUP_IP: 
nt!IofCallDriver+50
fffff800`028d2670 49ff64c070      jmp     qword ptr [r8+rax*8+70h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!IofCallDriver+50

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff88003fc8cc0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

BUCKET_ID:  X64_0x3B_nt!IofCallDriver+50

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-21777-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0281b000 PsLoadedModuleList = 0xfffff800`02a58e50
Debug session time: Sat Apr 23 21:12:55.913 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:04.113
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : athrxusb.sys ( athrxusb+5af17 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3332313336383065
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80003c95728 -- (.exr 0xfffff80003c95728)
ExceptionAddress: fffff880048e0f17 (athrxusb+0x000000000005af17)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80003c957d0 -- (.trap 0xfffff80003c957d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000099 rbx=0000000000000000 rcx=0000000000000099
rdx=fffffa800306a0ac rsi=0000000000000000 rdi=0000000000000000
rip=fffff880048e0f17 rsp=fffff80003c95960 rbp=0000000000000000
 r8=00000000000000a3  r9=fffffa800306a0ac r10=fffff80002a06880
r11=fffff80003c95b18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
athrxusb+0x5af17:
fffff880`048e0f17 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000288346e to fffff8000288b710

STACK_TEXT:  
fffff800`03c94818 fffff800`0288346e : fffff880`0195b800 fffff880`0152205b fffff800`03c94f90 fffff800`028b8668 : nt!KeBugCheck
fffff800`03c94820 fffff800`028b140d : fffff800`02a99b7c fffff800`029d3ea4 fffff800`0281b000 fffff800`03c95728 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`03c94850 fffff800`028b8a90 : fffff800`029dab34 fffff800`03c948c8 fffff800`03c95728 fffff800`0281b000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`03c94880 fffff800`028c59ef : fffff800`03c95728 fffff800`03c94f90 fffff800`00000000 25a47428`394ea9ff : nt!RtlDispatchException+0x410
fffff800`03c94f60 fffff800`0288ad82 : fffff800`03c95728 fffffa80`046bffbb fffff800`03c957d0 fffff880`0490c265 : nt!KiDispatchException+0x16f
fffff800`03c955f0 fffff800`0288968a : 00000000`00000000 fffffa80`03ea4168 00000000`00000000 fffffa80`03ea4060 : nt!KiExceptionDispatch+0xc2
fffff800`03c957d0 fffff880`048e0f17 : 00000000`00000000 fffffa80`030e4050 fffffa80`030e4050 fffff880`042d1ba2 : nt!KiGeneralProtectionFault+0x10a
fffff800`03c95960 00000000`00000000 : fffffa80`030e4050 fffffa80`030e4050 fffff880`042d1ba2 ffff0099`0000000c : athrxusb+0x5af17


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athrxusb+5af17
fffff880`048e0f17 ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  athrxusb+5af17

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athrxusb

IMAGE_NAME:  athrxusb.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  45bdef26

FAILURE_BUCKET_ID:  X64_0x1E_0_athrxusb+5af17

BUCKET_ID:  X64_0x1E_0_athrxusb+5af17

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`04315000 fffff880`04353000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f2a000 fffff880`00f81000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03e8a000 fffff880`03f14000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043b7000 fffff880`043cd000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010ba000 fffff880`010c5000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00d9e000 fffff880`00da7000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da7000 fffff880`00dd1000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04886000 fffff880`04918000   athrxusb athrxusb.sys Mon Jan 29 07:57:10 2007 (45BDEF26)
fffff880`019f2000 fffff880`019f9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04272000 fffff880`04283000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0273b000 fffff880`02759000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`007d0000 fffff960`007f7000   cdd      cdd.dll      unavailable (00000000)
fffff880`049ae000 fffff880`049cb000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`019bf000 fffff880`019e9000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cc4000 fffff880`00d84000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01925000 fffff880`01955000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c66000 fffff880`00cc4000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01183000 fffff880`011f6000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043a7000 fffff880`043b7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`049cb000 fffff880`049d9000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04254000 fffff880`04272000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03fee000 fffff880`03ffd000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0190f000 fffff880`01925000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045d0000 fffff880`045f2000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`049d9000 fffff880`049e3000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`0483f000 fffff880`04852000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04800000 fffff880`0483f000   dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`049a2000 fffff880`049ae000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0fcdc000 fffff880`0fdd0000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0f000000 fffff880`0f046000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0f046000 fffff880`0f053000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`01111000 fffff880`01125000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010c5000 fffff880`01111000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013ec000 fffff880`013f6000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018d5000 fffff880`0190f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02df8000 fffff800`02e41000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0fdd0000 fffff880`0fdf4000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04574000 fffff880`045d0000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04965000 fffff880`0497e000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0497e000 fffff880`04986080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04957000 fffff880`04965000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02673000 fffff880`0273b000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`018cc000 fffff880`018d5000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`042a9000 fffff880`042bf000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04490000 fffff880`0449f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04987000 fffff880`04995000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b98000 fffff800`00ba2000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`044b0000 fffff880`044f3000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013c1000 fffff880`013db000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`045f2000 fffff880`045f7200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`049e3000 fffff880`049f8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04860000 fffff880`04883000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`04952000 fffff880`04956980   Lycosa   Lycosa.sys   Fri Jan 18 03:51:42 2008 (4790689E)
fffff880`00c0e000 fffff880`00c52000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04852000 fffff880`04860000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0449f000 fffff880`044ae000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04995000 fffff880`049a2000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d84000 fffff880`00d9e000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02759000 fffff880`02771000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02771000 fffff880`0279e000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`0279e000 fffff880`027ec000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`02600000 fffff880`02623000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`01200000 fffff880`0120b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f8a000 fffff880`00f94000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01125000 fffff880`01183000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03fe3000 fffff880`03fee000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`018ba000 fffff880`018cc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014e4000 fffff880`015d6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fdf4000 fffff880`0fe00000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0443d000 fffff880`04450000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04200000 fffff880`0422f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0455f000 fffff880`04574000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03f88000 fffff880`03f97000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03f14000 fffff880`03f59000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0120b000 fffff880`0121c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e51000 fffff880`03e5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0281b000 fffff800`02df8000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0121e000 fffff880`013c1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019e9000 fffff880`019f2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fcda000 fffff880`0fcdb180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`0f07f000 fffff880`0fcd9d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`04353000 fffff880`043a6600   nvmf6264 nvmf6264.sys Wed Nov 11 18:16:48 2009 (4AFB45E0)
fffff880`00dd1000 fffff880`00dfc000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`0107b000 fffff880`010ba000   nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`01955000 fffff880`019a8000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03f62000 fffff880`03f88000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fd4000 fffff880`00fe9000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f94000 fffff880`00fc7000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013db000 fffff880`013ec000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03890000 fffff880`03936000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04400000 fffff880`0443d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c52000 fffff880`00c66000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`043cd000 fffff880`043f1000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0422f000 fffff880`0424a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04455000 fffff880`04476000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04476000 fffff880`04490000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e00000 fffff880`03e51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0181e000 fffff880`01827000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`014d5000 fffff880`014de000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f6000 fffff880`013ff000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01880000 fffff880`018ba000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01000000 fffff880`01018000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03936000 fffff880`03941000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0f053000 fffff880`0f05f000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03f97000 fffff880`03fb4000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01878000 fffff880`01880000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`04a97000 fffff880`04b08000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`04a02000 fffff880`04a97000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`03980000 fffff880`039e7000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`03941000 fffff880`0396e000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`01019000 fffff880`0107b000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`044ae000 fffff880`044af480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0396e000 fffff880`03980000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03e7d000 fffff880`03e8a000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`03e5f000 fffff880`03e7d000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03fcf000 fffff880`03fe3000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005d0000 fffff960`005da000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`04283000 fffff880`042a9000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`044f3000 fffff880`04505000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04935000 fffff880`04952000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04918000 fffff880`04919f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0f06a000 fffff880`0f07b000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04505000 fffff880`0455f000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`0f05f000 fffff880`0f06a000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042bf000 fffff880`04315000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0491a000 fffff880`04935000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00fc7000 fffff880`00fd4000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01800000 fffff880`0180e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015d6000 fffff880`015fb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fe9000 fffff880`00ffe000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0182c000 fffff880`01878000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03fb4000 fffff880`03fcf000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0180e000 fffff880`0181e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e77000 fffff880`00f1b000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f1b000 fffff880`00f2a000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f59000 fffff880`03f62000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00392000   win32k   win32k.sys   unavailable (00000000)
fffff880`00f81000 fffff880`00f8a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`01955000 fffff880`01963000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01963000 fffff880`0196d000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0196d000 fffff880`019ac000   dump_nvstor6
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003F000
fffff880`019ac000 fffff880`019bf000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Apr 24, 2011
Messages
2
Reaction score
0
He has the latest drivers for the motherboard and keyboard and he doesn't have the wireless LAN USB, so he doesn't know why he would need those drivers. However he does have the latest drivers for the wireless adaptor that he is using.

Another note. He notices that the BSOD occur regularly during simple computing tasks such as streaming videos on youtube where as gaming it occurs a lot less.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
He has the latest drivers for the motherboard and keyboard and he doesn't have the wireless LAN USB, so he doesn't know why he would need those drivers. However he does have the latest drivers for the wireless adaptor that he is using.

Another note. He notices that the BSOD occur regularly during simple computing tasks such as streaming videos on youtube where as gaming it occurs a lot less.
1. nForce - of course his version could be the latest for his mobo, but I don't know for sure that it's the latest. I've seen nvmf6264.sys with the timestamp 2010. So if there is an update at the nVidia site, then go ahead and grab it. If no newer driver leave it as is.


2.
he doesn't have the wireless LAN USB
He has this driver for sure:

Atheros Wireless LAN USB
athrxusb.sys Mon Jan 29 07:57:10 2007


It's very old and must be replaced or its driver updated.



3. The keyboard -- it's this driver he has in his system for sure:

Razer Tarantula Keyboard
Lycosa.sys Fri Jan 18 03:51:42 2008


2007-2008 drivers are not for Windows 7.


4. In addition it might be helpful looking at his hardware settings, CPU/MEMORY/TIMINGS, everything must be set at stock values as recommended by the manufacturer.


Wrong hardware settings, defective hardware, and old incompattible drivers are known to cause blue screens. 2007-2008 drivers are not for Windows 7.

Tell him to update the keyboard and his Atheros, disconnect 'em if he can't update.
And attach this information:

- Passmark Rammon HTML.zip
- cpu-z CPU and MEMORY snips.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top