SOLVED Random BSODs can be fine for a week then BAM Multiple

Joined
Feb 20, 2011
Messages
6
Reaction score
0
Hi everyone really hope you can help me,
From about 2 weeks or so ago my computer started BSOD constantly, then it stopped, then after a week again it happens constantly, last night it happened again and again and again.

I had heard that my BSODs could have been caused by my graphics card, where when it goes into low power mode it can drop below the 1V it needs, I changed the settings by editing the profile XML and that is when my computer had no problems what so ever for a week, so I thought I had fixed the problem, then like I said last night it just happened again and again, nothing has changed(As far as I know).

It usually happened when the comp was idle(Thus the power settings thing) but yesterday it was abit more...aggressive?
I will attach my mini dumps and really hope you can help, it is doing my head in!!!

Oh yeah I have ran memtest and it's fine, also windows memory diag. Ran primetest and it runs fine EXCEPT every now and again a processor(Worker) will stop with a rounding error (Expected 0.4 instead of 0.5 I think it is) but this does not always happen.

One last thing, one of the dumps it says is from 02/01/2011 but that isn't true, it was because I reset my bios but didn't put the right date.

Hope this is enough information!
Thanks again!
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
1. Uninstall Avast:

http://www.avast.com/uninstall-utility

https://www.microsoft.com/security_essentials/



2. Uninstall RivaTuner/EVGA Precision/MSI Afterburner:

RTCore64.sys Wed May 25 02:39:12 2005



3. Uninstall Loki:

ps7agqwb.sys Mon Feb 25 12:54:42 2008















Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\021911-23212-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c5f000 PsLoadedModuleList = 0xfffff800`02e9ce50
Debug session time: Sat Feb 19 08:30:21.429 2011 (UTC - 5:00)
System Uptime: 0 days 2:36:55.161
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {e9, 2, 1, fffff80002cd37b4}

Probably caused by : win32k.sys ( win32k!SetWakeBit+f8 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000e9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cd37b4, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f070e0
 00000000000000e9 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeSetEvent+124
fffff800`02cd37b4 48894108        mov     qword ptr [rcx+8],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  fffff88002b2d870 -- (.trap 0xfffff88002b2d870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007859588 rbx=0000000000000000 rcx=00000000000000e1
rdx=fffffa8007d43160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cd37b4 rsp=fffff88002b2da00 rbp=0000000000000000
 r8=0000000000000000  r9=000000000000000a r10=fffff80002c5f000
r11=fffff88002b2d9d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!KeSetEvent+0x124:
fffff800`02cd37b4 48894108        mov     qword ptr [rcx+8],rax ds:00000000`000000e9=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cceca9 to fffff80002ccf740

STACK_TEXT:  
fffff880`02b2d728 fffff800`02cceca9 : 00000000`0000000a 00000000`000000e9 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02b2d730 fffff800`02ccd920 : 00000000`00000004 fffffa80`07859580 fffffa80`06581660 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02b2d870 fffff800`02cd37b4 : fffffa80`075ff1b0 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff880`02b2da00 fffff960`0018b57c : 00000000`00000000 fffff960`00000002 00000000`00000000 00000000`000000e1 : nt!KeSetEvent+0x124
fffff880`02b2da70 fffff960`00182f43 : fffff900`c01e7b20 00000000`00000001 00000000`00000004 fffff800`02cdb1e3 : win32k!SetWakeBit+0xf8
fffff880`02b2daa0 fffff960`00183964 : 00000000`00000000 fffff960`003a0a90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x157
fffff880`02b2daf0 fffff960`001146d4 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`8000042c : win32k!RawInputThread+0x9b4
fffff880`02b2dbc0 fffff960`0019419a : fffffa80`00000002 fffff880`02b19f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`02b2dbf0 fffff800`02cce993 : fffffa80`065815a0 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`02b2dc20 000007fe`fd853d5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0055f818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd853d5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!SetWakeBit+f8
fffff960`0018b57c 488b5c2430      mov     rbx,qword ptr [rsp+30h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  win32k!SetWakeBit+f8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0

FAILURE_BUCKET_ID:  X64_0xA_win32k!SetWakeBit+f8

BUCKET_ID:  X64_0xA_win32k!SetWakeBit+f8

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\021911-23275-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c4f000 PsLoadedModuleList = 0xfffff800`02e8ce50
Debug session time: Sat Feb 19 12:15:06.777 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:12.510
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002cd74c5, 0, 204000010}

Probably caused by : ntkrnlmp.exe ( nt!FsRtlLookupPerFileObjectContext+a5 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cd74c5, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000204000010, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!FsRtlLookupPerFileObjectContext+a5
fffff800`02cd74c5 48395810        cmp     qword ptr [rax+10h],rbx

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000204000010

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef70e0
 0000000204000010 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  wmpnscfg.exe

CURRENT_IRQL:  1

EXCEPTION_RECORD:  fffff88008b20ad8 -- (.exr 0xfffff88008b20ad8)
ExceptionAddress: fffff80002cd74c5 (nt!FsRtlLookupPerFileObjectContext+0x00000000000000a5)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000204000010
Attempt to read from address 0000000204000010

TRAP_FRAME:  fffff88008b20b80 -- (.trap 0xfffff88008b20b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000204000000 rbx=0000000000000000 rcx=fffffa80086822f8
rdx=fffffa8006128b20 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cd74c5 rsp=fffff88008b20d10 rbp=0000000000000000
 r8=0000000000000000  r9=fffffa80069407b0 r10=fffffa80053bee20
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!FsRtlLookupPerFileObjectContext+0xa5:
fffff800`02cd74c5 48395810        cmp     qword ptr [rax+10h],rbx ds:00000002`04000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cf9a39 to fffff80002cbf740

STACK_TEXT:  
fffff880`08b20308 fffff800`02cf9a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02cd74c5 00000000`00000000 : nt!KeBugCheckEx
fffff880`08b20310 fffff800`02cbed82 : fffff880`08b20ad8 fffffa80`06128b20 fffff880`08b20b80 fffffa80`086822c0 : nt!KiDispatchException+0x1b9
fffff880`08b209a0 fffff800`02cbd8fa : 00000000`00000000 fffffa80`06128b20 fffffa80`0613c000 fffffa80`0648d010 : nt!KiExceptionDispatch+0xc2
fffff880`08b20b80 fffff800`02cd74c5 : fffff880`08b20db0 fffff880`00d9732e fffffa80`07961510 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`08b20d10 fffff880`00d96aaf : 00000000`00000000 fffff880`08b20e10 fffffa80`069407b0 fffff880`08b21038 : nt!FsRtlLookupPerFileObjectContext+0xa5
fffff880`08b20d50 fffff880`00d94922 : 00000000`00000000 fffff800`02dc92fa 00000000`00000000 00000000`00000000 : fltmgr!FltpGetStartingCallbackNode+0x3f
fffff880`08b20de0 fffff800`02cd6c21 : fffffa80`0781cae0 00000000`00000000 fffff880`08b20f18 fffff880`03eb3c18 : fltmgr!FltpPreFsFilterOperation+0xa2
fffff880`08b20e70 fffff800`02faf5e8 : fffff880`00d94710 00000000`00000000 fffffa80`063f4030 fffff880`00d94880 : nt!FsFilterPerformCallbacks+0xcd
fffff880`08b20ed0 fffff800`02cab923 : fffff880`08b21260 fffff880`08b21200 fffffa80`08682cd0 fffff880`02fd3180 : nt!FsRtlAcquireFileForCcFlushEx+0xd0
fffff880`08b21170 fffff800`02ca242c : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x1c3
fffff880`08b21230 fffff800`02fb849a : 00000000`00000000 00000000`00000006 00000000`01000000 00000000`00000000 : nt!MiFlushDataSection+0x190
fffff880`08b212a0 fffff800`02fadd13 : fffff880`08b21500 00000000`00000000 fffff880`08b215a8 fffff880`08b214f8 : nt!MmCreateSection+0x2ce
fffff880`08b214b0 fffff800`0311c005 : fffff8a0`048216d8 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
fffff880`08b21530 fffff800`0311c3b7 : 00000000`00000010 fffff8a0`0b1e2d10 fffff880`08b216c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
fffff880`08b21620 fffff800`0311c7e7 : fffff880`08b21740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
fffff880`08b21710 fffff800`0311cc0f : 00000023`5f6d76e4 fffffa80`08122b30 fffff8a0`0b101000 00000000`c00000ce : nt!PfSnPrefetchScenario+0x187
fffff880`08b21980 fffff800`02f146df : 00000000`00000000 00000000`fc0d39bf fffffa80`070c84f0 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
fffff880`08b21a50 fffff800`02f8afec : fffffa80`07669b60 fffffa80`070c84f0 00000000`14050800 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x4fc30
fffff880`08b21a80 fffff800`02c9dd55 : fffff880`02f63180 00000000`00000000 fffff800`02f8aef0 fffffa80`07669b60 : nt!PspUserThreadStartup+0xfc
fffff880`08b21ae0 fffff800`02c9dcd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`08b21c20 00000000`76f72ca0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`0022f8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f72ca0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!FsRtlLookupPerFileObjectContext+a5
fffff800`02cd74c5 48395810        cmp     qword ptr [rax+10h],rbx

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!FsRtlLookupPerFileObjectContext+a5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!FsRtlLookupPerFileObjectContext+a5

BUCKET_ID:  X64_0x1E_c0000005_nt!FsRtlLookupPerFileObjectContext+a5

Followup: MachineOwner
---------

















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\021911-22604-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Sat Feb 19 15:31:56.648 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:21.991
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {1000e008a, 2, 1, fffff80002cc2624}

Probably caused by : ntkrnlmp.exe ( nt!KeReleaseMutant+274 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000001000e008a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cc2624, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef10e0
 00000001000e008a 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeReleaseMutant+274
fffff800`02cc2624 48894108        mov     qword ptr [rcx+8],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff88006884960 -- (.trap 0xfffff88006884960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005d2fcf0 rbx=0000000000000000 rcx=00000001000e0082
rdx=fffffa8005d2fcf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc2624 rsp=fffff88006884af0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffffa80053bc570
r11=00000000001f0001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KeReleaseMutant+0x274:
fffff800`02cc2624 48894108        mov     qword ptr [rcx+8],rax ds:47a0:00000001`000e008a=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cb8ca9 to fffff80002cb9740

STACK_TEXT:  
fffff880`06884818 fffff800`02cb8ca9 : 00000000`0000000a 00000001`000e008a 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`06884820 fffff800`02cb7920 : 00000000`0f17ee00 fffffa80`05d2fcf0 fffff880`06884a80 fffffa80`07625060 : nt!KiBugCheckDispatch+0x69
fffff880`06884960 fffff800`02cc2624 : fffffa80`2079654b fffffa80`053d43c0 00000000`00000508 fffff800`02fccfd6 : nt!KiPageFault+0x260
fffff880`06884af0 fffff800`02fb1c5e : 00000000`00000000 00000000`00000001 fffffa80`053bc570 00000000`00000000 : nt!KeReleaseMutant+0x274
fffff880`06884ba0 fffff800`02cb8993 : fffffa80`07625060 fffff880`00000000 00000000`7ef8f000 fffffa80`05d2fcf0 : nt!NtReleaseMutant+0x86
fffff880`06884c20 00000000`74a12dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02ffe958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a12dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KeReleaseMutant+274
fffff800`02cc2624 48894108        mov     qword ptr [rcx+8],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeReleaseMutant+274

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xA_nt!KeReleaseMutant+274

BUCKET_ID:  X64_0xA_nt!KeReleaseMutant+274

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00d73000 fffff880`00dca000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03fe7000 fffff880`03ffd000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`081ae000 fffff880`081b6000   ALSysIO64 ALSysIO64.sys Sun Apr 19 15:41:04 2009 (49EB7E50)
fffff880`04328000 fffff880`0433c000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`0411d000 fffff880`04132000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01181000 fffff880`0118c000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`051f6000 fffff880`051fe000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`040f1000 fffff880`040f7000   AsIO     AsIO.sys     Thu Apr 22 07:18:03 2010 (4BD0306B)
fffff880`0290e000 fffff880`02917000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
fffff880`028d4000 fffff880`0290e000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
fffff880`02c8a000 fffff880`02c94000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
fffff880`040a8000 fffff880`040f1000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
fffff880`02da3000 fffff880`02db3000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
fffff880`0114e000 fffff880`01157000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01157000 fffff880`01181000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`048a2000 fffff880`050d9000   atikmdag atikmdag.sys Tue Jan 04 21:48:52 2011 (4D23DC14)
fffff880`04132000 fffff880`0417f000   atikmpag atikmpag.sys Tue Jan 04 21:19:38 2011 (4D23D53A)
fffff880`016dc000 fffff880`016e4000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`02871000 fffff880`028c0000   atksgt   atksgt.sys   Sun May 17 09:36:34 2009 (4A1012E2)
fffff960`00960000 fffff960`009c1000   ATMFD    ATMFD.DLL    Fri Jan 07 00:49:20 2011 (4D26A960)
fffff880`04061000 fffff880`040a6000   aux2by7h aux2by7h.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`02cf7000 fffff880`02cfe000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ea1000 fffff880`03eb2000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02965000 fffff880`02983000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`02cc4000 fffff880`02cee000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01400000 fffff880`01430000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d15000 fffff880`00d73000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01440000 fffff880`014b3000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03ebb000 fffff880`03ecb000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`028c0000 fffff880`028c9000   cpuz134_x64 cpuz134_x64.sys Fri Jul 09 07:16:58 2010 (4C37052A)
fffff880`064d6000 fffff880`064e4000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e00000 fffff880`03e83000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03e83000 fffff880`03ea1000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03fd8000 fffff880`03fe7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`016c6000 fffff880`016dc000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`064ae000 fffff880`064d0000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`064f0000 fffff880`064f9000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`064e4000 fffff880`064f0000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`064f9000 fffff880`0650c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06527000 fffff880`06533000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`050d9000 fffff880`051cd000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04800000 fffff880`04846000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`011d8000 fffff880`011ec000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0118c000 fffff880`011d8000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`014c4000 fffff880`014ce000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015c0000 fffff880`015fa000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0177a000 fffff880`017c4000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`051cd000 fffff880`051da000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02c00000 fffff800`02c49000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04846000 fffff880`0486a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06415000 fffff880`06471000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`0657f000 fffff880`06598000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`06598000 fffff880`065a0080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06571000 fffff880`0657f000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07a66000 fffff880`07b2e000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`016bd000 fffff880`016c6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`041e1000 fffff880`041ff000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04000000 fffff880`0400f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`065ca000 fffff880`065d8000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`042e5000 fffff880`04328000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0174f000 fffff880`0177a000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`064d0000 fffff880`064d5200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`07b2e000 fffff880`07b3b000   lirsgt   lirsgt.sys   Sun May 17 09:06:57 2009 (4A100BF1)
fffff880`02938000 fffff880`0294d000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`043d5000 fffff880`043f8000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cf4000 fffff880`00d01000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06533000 fffff880`06541000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`042d4000 fffff880`042e3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`065d8000 fffff880`065e5000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`01134000 fffff880`0114e000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02983000 fffff880`0299b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0299b000 fffff880`029c8000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02800000 fffff880`0284e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0284e000 fffff880`02871000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02d5c000 fffff880`02d67000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e09000 fffff880`00e13000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03fcd000 fffff880`03fd8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`016ab000 fffff880`016bd000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014ce000 fffff880`015c0000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04238000 fffff880`04244000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04244000 fffff880`04273000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043c0000 fffff880`043d5000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03f01000 fffff880`03f10000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02db3000 fffff880`02df8000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016ef000 fffff880`0174f000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02d67000 fffff880`02d78000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03fc1000 fffff880`03fcd000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c49000 fffff800`03226000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0124e000 fffff880`013f1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02cee000 fffff880`02cf7000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0434e000 fffff880`04366000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`0486a000 fffff880`0489a000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`03edb000 fffff880`03f01000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`01079000 fffff880`0108e000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00dca000 fffff880`00dfd000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0111d000 fffff880`01124000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`01124000 fffff880`01134000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014b3000 fffff880`014c4000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`01695000 fffff880`016ab000   pe3agqwb pe3agqwb.sys Mon Feb 25 12:55:13 2008 (47C30101)
fffff880`07b3b000 fffff880`07be1000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`06471000 fffff880`064ae000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`0108e000 fffff880`010ac000   ps7agqwb ps7agqwb.sys Mon Feb 25 12:54:42 2008 (47C300E2)
fffff880`00d01000 fffff880`00d15000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`011ec000 fffff880`011f7e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`04214000 fffff880`04238000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04273000 fffff880`0428e000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0428e000 fffff880`042af000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`042af000 fffff880`042c9000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03f70000 fffff880`03fc1000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`042c9000 fffff880`042d4000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02d41000 fffff880`02d4a000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`081b6000 fffff880`081e4000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`02d4a000 fffff880`02d53000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d53000 fffff880`02d5c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`08000000 fffff880`08038000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`0165b000 fffff880`01695000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0294d000 fffff880`02965000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0400f000 fffff880`04061000   Rt64win7 Rt64win7.sys Mon Feb 08 22:42:09 2010 (4B70D991)
fffff880`08038000 fffff880`0803e000   RTCore64 RTCore64.sys Wed May 25 02:39:12 2005 (42941D90)
fffff880`03f66000 fffff880`03f70000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 19:11:52 2010 (4B70A848)
fffff880`03f5c000 fffff880`03f66000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 17:27:34 2010 (4B71E156)
fffff880`00cc0000 fffff880`00cef000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`07be1000 fffff880`07bec000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041d5000 fffff880`041e1000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03f10000 fffff880`03f2d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01654000 fffff880`0165b000   speedfan speedfan.sys Sun Sep 24 09:26:48 2006 (45168798)
fffff880`0164c000 fffff880`01654000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`00ed5000 fffff880`00ffb000   spng     spng.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`08118000 fffff880`081ae000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08040000 fffff880`080a7000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`07a00000 fffff880`07a2d000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`042e3000 fffff880`042e4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`07a2d000 fffff880`07a3f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d96000 fffff880`02da3000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`081e4000 fffff880`081ef000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`02d78000 fffff880`02d96000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03f48000 fffff880`03f5c000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`081ef000 fffff880`081fe000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`040f7000 fffff880`0411d000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0433c000 fffff880`0434e000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`065a1000 fffff880`065bbc00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06541000 fffff880`0655e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0489a000 fffff880`0489bf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`051e5000 fffff880`051f6000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04366000 fffff880`043c0000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`051da000 fffff880`051e5000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0417f000 fffff880`041d5000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0650c000 fffff880`06527000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00e13000 fffff880`00e20000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02cfe000 fffff880`02d0c000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02d0c000 fffff880`02d31000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017c4000 fffff880`017d4000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`010ac000 fffff880`010c1000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010c1000 fffff880`0111d000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01600000 fffff880`0164c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03f2d000 fffff880`03f48000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02d31000 fffff880`02d41000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e22000 fffff880`00ec6000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec6000 fffff880`00ed5000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c9f000 fffff880`02ca8000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00370000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`03eb2000 fffff880`03ebb000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e00000 fffff880`00e09000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02c94000 fffff880`02c9f000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 20:10:33 2009 (4A5BCCF9)
fffff880`02917000 fffff880`02938000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`065bc000 fffff880`065ca000   XENfiltv XENfiltv.sys Thu Jul 30 23:40:32 2009 (4A7267B0)
fffff880`0655e000 fffff880`06570100   xusb21   xusb21.sys   Thu Aug 13 18:10:17 2009 (4A848F49)

Unloaded modules:
fffff880`080a7000 fffff880`08118000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`017d4000 fffff880`017e2000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`017e2000 fffff880`017ee000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`017ee000 fffff880`017f7000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0121a000 fffff880`0122d000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Joined
Feb 20, 2011
Messages
6
Reaction score
0
Thanks people! Sorry I took a while I was at work.
As an aside I did un install MSI Afterburner after reading the forums abit before my post.
Just uninstalling avast and I got rid of that Loki file by going to a starforce remover as I had already uninstalled Loki a while ago.

Here's my rammon and cpu-z report attached, if you want the pictures let me know, as I thought the reports would be more useful?

Also the precise moment this first happened I installed Darksiders using the dvd and it was just installing using the steam interface, is it just a coincidence or could this have a meaning(I don't know, direct X trying to install again like in every steam game, just going wrong instead?).
The game itself works fine btw lol.

Again thanks for all your help, I got into abit of a loose end and had to ask for help (I usually try and do all computer related stuff myself lol).
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
RAM is set right DDR1333 9-9-9-24.
2 Unknown's x 2048Mb
2 Kingston's x 1024Mb

Are you still having crashes?
 
Joined
Feb 20, 2011
Messages
6
Reaction score
0
Well I stopped having crashes yesterday, but like I said it seems to be like every week at the moment. It could it have had something to do with MSI Afterburner? Because it seems to have been fine since removing that. But I also removed my wireless mouse to see if that helped, the mouse is a blaze BL-1178 TOMAHAWK and it has no drivers ANYWHERE that I can find, it would just use the windows generic driver. The thing is there is a driver that is supposed to be for it on the chinese blaze website, but that doesn't work either (For anyone apparently), emailed them about a week and half ago and no reply, so I removed the mouse just in case. Thanks everyone for your help, I feel like my computer is the least likely it is to crash now!
But I will post up any dumps I get (Hopefully none!) but after what I said, you can expect them if they happen around Friday lol.
Thanks again, I never would have removed MSI Afterburner if it wasn't for this forum, as I thought I should keep more of an eye on temperatures rather than software I have installed.
Temperatures are always great though, so I should worry less about that :).
 
Joined
Feb 20, 2011
Messages
6
Reaction score
0
Spoke too soon, computer crashed last earlier hours this morning, No crash dump because it just froze, then wouldn't load the bios up. One thing changed though, I heard 5 quick beeps which means processor error. First and only time I heard it. Computer is working fine again now though.... I think I will take everything apart and put back together tomorrow.
 
Joined
Feb 20, 2011
Messages
6
Reaction score
0
See that is where I thought the problem would be too, but I tried out each one individually in my brothers computer and it ran fine, plus (When the computer was having one of its episodes) I tried each out individually in my computer and the freezes still occurred. I am beggining to think it might be a processor or motherboard issue, so that is why I will make sure both are ok tomorrow. It's just so inconsistant that is why it is bothering me, and it's 95% of the time when the computer is idle. An example was last night I left a video playlist running on VLC player, when I woke up the computer had frozen ON THE DESKTOP i.e after the whole playlist had stopped playing, bearing in mind that the comp had froze when I posted yesterday, the playlist was on more or less straight after the freeze, meaning the comp had all night when it was playing the videos to freeze again, but froze after and it wouldn't have been long after the videos stopped playing because the desktop was still on screen, when if it is inactive for 20 mins the display goes into standby.

I hope all that made sense as it's the recollection I have of yesterday/this morning.

I will try swapping the ram out tomorrow when I open the computer up, thanks for all your help, sorry for the confusing problem, I mean I would understand if the computer was under load, but when idle??? Ever heard of any problems like that?
 
Joined
Feb 20, 2011
Messages
6
Reaction score
0
You won't believe this, 2 of the screws had come undone what had the motherboard joined to the case(When I first built the computer a while ago I put the screws in too tightly so to be safe I didn't put them in as tight....not tight enough it may seem) so my motherboard was slightly bending up at one corner, this slight bend is of course where the ram and towards the centre the cpu sit..... Been running Prime95 with no errors what so ever now... So you were pretty much right it was a ram problem lol! Thanks for all your help! Of course I may be jumping the gun and it might crash again, but i'm hopeful :)
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
See that is where I thought the problem would be too, but I tried out each one individually in my brothers computer and it ran fine, plus (When the computer was having one of its episodes) I tried each out individually in my computer and the freezes still occurred.
That's the whole point: they may be working fine individually, but they may be causing crashes when combined in one system. Even if their rates are identical.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads

random BSODs 5
random BSODs 5
Random BSODs 18
SOLVED random BSODs 12
Random BSODs 1
Random BSODs 4
Random BSODs 1
Random BSoDs 28

Top