pc crashes randomly

Joined
Dec 11, 2010
Messages
1
Reaction score
0
Hi all
i have recently built a pc. my pc setup is
intel core i5 760
4 GB DDR3 RAM
ATI HD 5670 1 gb DDR5
500 GB HD

My problem is my system crashes randomly. sometimes while playing games or at start up or sometimes a sleep state. first i thought it might me the video card driver issue but i upgraded the driver with the latest driver. but still having the same issue. please help me out on this. i have attached the dump files here with.

Thanks
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
NTFS_FILE_SYSTEM (24) by fileinfo.sys
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f) by ntkrpamp.exe


1. Your Eset is old, for now uninstall and replace it with MSE:

eamon.sys Mon Nov 16 02:51:09 2009
ehdrv.sys Mon Nov 16 02:51:43 2009
epfw.sys Mon Nov 16 02:45:46 2009
Epfwndis.sys Thu Apr 09 08:42:36 2009
epfwwfp.sys Mon Nov 16 02:45:45 2009

http://www.microsoft.com/security_essentials/


2. Update Intel Management Engine Interface:

HECI.sys Thu Sep 17 15:54:12 2009


3. Start -> cmd -> type -> chkdsk /r


Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-18844-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0b000 PsLoadedModuleList = 0x82b53810
Debug session time: Sat Dec 11 15:29:56.275 2010 (UTC - 5:00)
System Uptime: 0 days 8:45:58.633
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 801dc000, 0, 0}

Probably caused by : ntkrpamp.exe ( nt!KeDelayExecutionThread+3e2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801dc000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Blizzard Downl

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 00cefcd0 to 82a7821b

STACK_TEXT:  
8f297cd8 00cefcd0 00cefc8c 97460e2c ffffffff nt!KeDelayExecutionThread+0x3e2
WARNING: Frame IP not in any known module. Following frames may be wrong.
8f297cf4 82a75792 86fa2f70 82a93d01 8f297cd8 0xcefcd0
8f297d1c 82a4e42a 00cefcd0 00000000 00000000 nt!ExReleaseResourceLite+0xf
8f297d1c 0000003b 00cefcd0 00000000 00000000 nt!KiFastCallEntry+0x12a
00000001 00000000 00000000 00000000 00000000 0x3b


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KeDelayExecutionThread+3e2
82a7821b 5d              pop     ebp

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KeDelayExecutionThread+3e2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007

FAILURE_BUCKET_ID:  0x7f_8_nt!KeDelayExecutionThread+3e2

BUCKET_ID:  0x7f_8_nt!KeDelayExecutionThread+3e2

Followup: MachineOwner


---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121110-24102-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a19000 PsLoadedModuleList = 0x82b61810
Debug session time: Sat Dec 11 06:39:51.044 2010 (UTC - 5:00)
System Uptime: 0 days 2:46:05.012
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 001904fb
Arg2: 8d77f6c0
Arg3: 8d77f2a0
Arg4: 82c91199

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for eamon.sys
*** ERROR: Module load completed but symbols could not be loaded for eamon.sys

EXCEPTION_RECORD:  8d77f6c0 -- (.exr 0xffffffff8d77f6c0)
ExceptionAddress: 82c91199 (nt!PfpRpFileKeyUpdate+0x00000199)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 1008080c
Attempt to read from address 1008080c

CONTEXT:  8d77f2a0 -- (.cxr 0xffffffff8d77f2a0)
eax=965bf3a0 ebx=14081014 ecx=a12040f8 edx=ffffffff esi=82b50730 edi=10080808
eip=82c91199 esp=8d77f788 ebp=8d77f7b8 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!PfpRpFileKeyUpdate+0x199:
82c91199 8b5f04          mov     ebx,dword ptr [edi+4] ds:0023:1008080c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  1008080c

READ_ADDRESS: GetPointerFromAddress: unable to read from 82b81718
Unable to read MiSystemVaType memory at 82b61160
 1008080c 

FOLLOWUP_IP: 
fileinfo!FIStreamLog+6f
8b5e8bc3 8b0d80775e8b    mov     ecx,dword ptr [fileinfo!FIGlobals+0x5c0 (8b5e7780)]

FAULTING_IP: 
nt!PfpRpFileKeyUpdate+199
82c91199 8b5f04          mov     ebx,dword ptr [edi+4]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from 82aafbeb to 82c91199

STACK_TEXT:  
8d77f7b8 82aafbeb 00000000 a12040f8 8d77f890 nt!PfpRpFileKeyUpdate+0x199
8d77f814 8b5e8bc3 8d77f87c 85a68820 a2e877f0 nt!PfFileInfoNotify+0x4ae
8d77f8a0 8b5e8d3d 8d77f8b0 a2e877c0 871af72f fileinfo!FIStreamLog+0x6f
8d77f8c4 8b3a55f4 a2e877f0 00000008 00000000 fileinfo!FIStreamCleanup+0x79
8d77f8e0 8b3a57c0 a2e877c0 a2e877c0 8d77f904 fltmgr!DoFreeContext+0x66
8d77f8f0 8b3b6722 a2e877c0 871af728 871af700 fltmgr!DoReleaseContext+0x42
8d77f904 8b3c3793 871af72c 871af728 ffffffff fltmgr!FltpDeleteContextList+0x15c
8d77f924 8b3c39b4 871af700 a12040f8 00000000 fltmgr!CleanupStreamListCtrl+0x1b
8d77f938 82c377b8 871af704 aa5e2d42 00000000 fltmgr!DeleteStreamListCtrlCallback+0x5a
8d77f978 8b6dbfb2 a12040f8 a1204008 a12040f8 nt!FsRtlTeardownPerStreamContexts+0x13a
8d77f994 8b6d2b3b 00000705 a1204030 a1204008 Ntfs!NtfsDeleteScb+0x214
8d77f9ac 8b64271e 85312118 a12040f8 00000000 Ntfs!NtfsRemoveScb+0xc5
8d77f9c8 8b6c30d2 85312118 a1204008 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x62
8d77fa0c 8b63fbec 85312118 a12040f8 a12042a0 Ntfs!NtfsTeardownStructures+0x68
8d77fa34 8b6bf55b 85312118 a12040f8 a12042a0 Ntfs!NtfsDecrementCloseCounts+0xaf
8d77fa94 8b6c11a9 85312118 a12040f8 a1204008 Ntfs!NtfsCommonClose+0x4f2
8d77fb30 82a554bc 00000000 857d7c48 857d7c48 Ntfs!NtfsFsdClose+0x403
8d77fb48 8b3a820c 86092630 857d7c48 00000000 nt!IofCallDriver+0x63
8d77fb6c 8b3a83cb 8d77fb8c 86092630 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
8d77fba4 82a554bc 86092630 857d7c48 857d7e44 fltmgr!FltpDispatch+0xc5
8d77fbbc 926102ab 857d7c48 86cc6af0 87206da0 nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
8d77fbd0 82a554bc 86cc6af0 857d7c48 8603f024 eamon+0x52ab
8d77fbe8 82c5adc7 8513aeb0 87206d88 00000000 nt!IofCallDriver+0x63
8d77fc2c 82c3a6f4 87206da0 87206da0 87206d88 nt!IopDeleteFile+0x10c
8d77fc44 82a81f60 00000000 853062c8 85f4bd18 nt!ObpRemoveObjectRoutine+0x59
8d77fc58 82a81ed0 87206da0 82a540a3 00000000 nt!ObfDereferenceObjectWithTag+0x88
8d77fc60 82a540a3 00000000 853062c8 87206da0 nt!ObfDereferenceObject+0xd
8d77fc78 82ab1ea3 00000001 00000000 852ae0d0 nt!CcDeleteSharedCacheMap+0x131
8d77fca8 82ab9ed6 8d77fcc4 aa5e293a 851362f0 nt!CcWriteBehind+0x715
8d77fd00 82a86f2b 851362f0 00000000 85132d48 nt!CcWorkerThread+0x164
8d77fd50 82c2766d 00000000 aa5e29aa 00000000 nt!ExpWorkerThread+0x10d
8d77fd90 82ad90d9 82a86e1e 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  fileinfo!FIStreamLog+6f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fileinfo

IMAGE_NAME:  fileinfo.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18f

STACK_COMMAND:  .cxr 0xffffffff8d77f2a0 ; kb

FAILURE_BUCKET_ID:  0x24_fileinfo!FIStreamLog+6f

BUCKET_ID:  0x24_fileinfo!FIStreamLog+6f

Followup: MachineOwner
---------





DRIVERS :

Code:
start    end        module name
8b498000 8b4e0000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
90641000 9069b000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
90994000 909a6000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b5e9000 8b5f2000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
8b5bd000 8b5c6000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b5c6000 8b5e9000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
90e38000 914cb000   atikmdag atikmdag.sys Tue Oct 26 22:26:21 2010 (4CC78DCD)
908b6000 908f3000   atikmpag atikmpag.sys Tue Oct 26 22:14:03 2010 (4CC78AEB)
8b9eb000 8b9f2000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
90887000 90895000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8b2b0000 8b2b8000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
90bbd000 90bd6000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
97230000 9724e000   cdd      cdd.dll      unavailable (00000000)
8b800000 8b81f000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8b2fa000 8b3a5000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b994000 8b9b9000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8b2b8000 8b2fa000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8b774000 8b7d1000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
90e27000 90e34000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
96b2d000 96b3a000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
9080b000 9086f000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
9086f000 90887000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
90793000 9079f000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b983000 8b994000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
91b43000 91b5c000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
96b45000 96b4e000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
96b3a000 96b45000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
96b4e000 96b5f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
96b23000 96b2d000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
914cb000 91582000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:26:15 2009 (4A5BC297)
91582000 915bb000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
908f3000 9092c000   e1k6232  e1k6232.sys  Tue Apr 06 03:36:16 2010 (4BBAE470)
90a26000 90af2000   eamon    eamon.sys    Mon Nov 16 02:51:09 2009 (4B01046D)
8b3d9000 8b3f6000   ehdrv    ehdrv.sys    Mon Nov 16 02:51:43 2009 (4B01048F)
90af2000 90b15000   epfw     epfw.sys     Mon Nov 16 02:45:46 2009 (4B01032A)
90989000 90994000   Epfwndis Epfwndis.sys Thu Apr 09 08:42:36 2009 (49DDED3C)
90bef000 90bfd000   epfwwfp  epfwwfp.sys  Mon Nov 16 02:45:45 2009 (4B010329)
8b400000 8b411000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b3a5000 8b3d9000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b7df000 8b7e8000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
8b951000 8b983000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8bb78000 8bba9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82e1b000 82e52000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
915bb000 915da000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
91ac4000 91b14000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
915da000 915e4080   HECI     HECI.sys     Thu Sep 17 15:54:12 2009 (4AB293E4)
96b6a000 96b7d000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
96b7d000 96b83480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
96b5f000 96b6a000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
90b38000 90bbd000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b949000 8b951000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
90977000 90989000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
907e5000 907f2000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
96ba8000 96bb4000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
80bc5000 80bcd000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
91a2d000 91a61000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
8b761000 8b774000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8b914000 8b939000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
90b15000 90b25000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
96bbf000 96bda000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8b227000 8b29f000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
96bb4000 96bbf000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
907f2000 907ff000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
96b86000 96b91000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8b5a7000 8b5bd000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
90bd6000 90be8000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
90a00000 90a23000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:14:24 2009 (4A5BBFD0)
91b5c000 91b97000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
96bda000 96bf5000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
90606000 90611000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8b4e9000 8b4f1000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b736000 8b761000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
90789000 90793000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b939000 8b949000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b81f000 8b8d6000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
909be000 909c9000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
909c9000 909eb000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
91ab3000 91ac4000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
906f3000 90701000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
9069b000 906cd000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
8b8d6000 8b914000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
90611000 9061f000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
9077f000 90789000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a0b000 82e1b000   nt       ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
8b607000 8b736000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
8bbf9000 8bc00000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
906d4000 906f3000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
90e0f000 90e27000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
8b526000 8b537000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
90be8000 90bef000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
8b4f1000 8b51b000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8b592000 8b599000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
8b599000 8b5a7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b7d1000 8b7df000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
98811000 988a8000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
91b14000 91b43000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
8b29f000 8b2b0000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
909a6000 909be000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
9079f000 907b7000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
907b7000 907ce000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
907ce000 907e5000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
9073e000 9077f000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
909eb000 909f5000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
8b7f5000 8b7fd000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8b411000 8b419000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8b5f2000 8b5fa000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8ba00000 8ba2d000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
90b25000 90b38000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
96831000 96b226c0   RTKVHDA  RTKVHDA.sys  Fri May 07 06:55:23 2010 (4BE3F19B)
988a8000 988b2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
915e5000 915ef000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
90701000 9071b000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
8bbf1000 8bbf9000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
9892f000 98980000   srv      srv.sys      Mon Jul 13 19:15:10 2009 (4A5BBFFE)
988e0000 9892f000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
988b2000 988d3000   srvnet   srvnet.sys   Mon Jul 13 19:14:45 2009 (4A5BBFE5)
90e34000 90e35380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8ba2f000 8bb78000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
988d3000 988e0000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
90636000 90641000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
9061f000 90636000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
9072e000 9073e000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
97200000 97209000   TSDDD    TSDDD.dll    unavailable (00000000)
90895000 908b6000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
91a61000 91a6f000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
96b91000 96ba8000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
96b84000 96b85700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
90e00000 90e0f000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
91a6f000 91ab3000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
9092c000 90977000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
915ef000 915fa000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
8b51b000 8b526000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8b9f2000 8b9fe000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8b200000 8b221000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8bba9000 8bbb1380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8b537000 8b547000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b547000 8b592000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8bbb2000 8bbf1000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
9071b000 9072e000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8b7e8000 8b7f5000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8b419000 8b48a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8b48a000 8b498000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
906cd000 906d4000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
973a0000 975ea000   win32k   win32k.sys   unavailable (00000000)
8b4e0000 8b4e9000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)

Unloaded modules:
98980000 989ea000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
98980000 989ea000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
989ea000 989ef000   atidcmxx.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00005000
8b9b9000 8b9c6000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8b9c6000 8b9d1000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
8b9d1000 8b9da000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
8b9da000 8b9eb000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
Joined
Dec 20, 2010
Messages
3
Reaction score
0
Use the Microsoft driver for the ATI video card. Try this http://majorgeeks.com/ATI_Tray_Tools_d4569.html

I don't bother using CCC, don't even think about AOD for now either.. Until ATI releases a fix for their timing issue with cards.. Yep.. the graphics cards cause havoc switching from low to high and back to low power states. Use the ATI tray tool.. My settings I use on my 5770 is 875:1350
make sure you also check system integrity with system file checker...
in search box type CMD , then right click it and run as Administrator .. once you have your elevated command prompt. type in sfc /scannow

wish you the best.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top