Regular BSOD's after being away!

Joined
Sep 22, 2010
Messages
613
Reaction score
102
RAM looks to be the causer of your crashes.

- the RAM settings look right, although sometimes makers put a special note as to certain settings such as the voltage, that needs to be adjusted manually

- could be faulty RAM or a bad memory slot

- motherboard and the ram sticks must be compatibe


Uninstall VMWare
VMNetSrv.sys Wed Jan 16 06:52:01 2008


Uninstall Pure Networks, Inc. Network Magic NDIS Relay
purendis.sys Sat Jun 06 00:32:06 2009


Uninstall Lavasoft
Lbd.sys Thu Feb 03 09:23:53 2011


Update Marvell
mv91xx.sys Fri Dec 25 01:45:39 2009


Update Automap MIDI
automap.sys Mon Jun 29 11:13:06 2009



If crashes persist, start removing the memory sticks one by one to find out which one is guilty.

www.memtest.org


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-21325-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03268000 PsLoadedModuleList = 0xfffff800`034a5e50
Debug session time: Sat Apr 16 10:49:24.896 2011 (UTC - 4:00)
System Uptime: 0 days 0:40:48.098
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {403, fffff6800006d810, afd0000298315025, 730077006f0064}

Probably caused by : win32k.sys ( win32k!EngUnmapFontFileFD+8a )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800006d810
Arg3: afd0000298315025
Arg4: 00730077006f0064

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_403

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8000334a6c8 to fffff800032d8740

STACK_TEXT:  
fffff880`0c4d0278 fffff800`0334a6c8 : 00000000`0000001a 00000000`00000403 fffff680`0006d810 afd00002`98315025 : nt!KeBugCheckEx
fffff880`0c4d0280 fffff800`03309381 : 00000003`00000000 fffff680`0006da60 fffffa80`086fcb30 ede00001`1b961025 : nt! ?? ::FNODOBFM::`string'+0x31ef2
fffff880`0c4d0430 fffff800`0330bdf9 : 00000000`00000000 00000000`0e145fff fffff900`00000000 fffff900`00000000 : nt!MiDeleteVirtualAddresses+0x408
fffff880`0c4d05f0 fffff800`035ef010 : fffffa80`0c34d430 0007ffff`00000000 fffffa80`0870b8c0 fffffa80`0870b8c0 : nt!MiRemoveMappedView+0xd9
fffff880`0c4d0710 fffff960`0007851e : fffff900`00000000 fffff900`c009e1b8 fffff900`00000001 fffff900`c232d010 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0c4d07d0 fffff960`0029bd33 : fffff900`c00a0d10 00000000`00000000 fffffa80`00000040 00000000`00000000 : win32k!EngUnmapFontFileFD+0x8a
fffff880`0c4d0830 fffff960`0026305a : fffff960`0029bca8 fffff880`0c4d0950 fffff900`c009ff30 fffff960`000293b5 : win32k!ttfdSemDestroyFont+0x8b
fffff880`0c4d0860 fffff960`0026128e : fffffa80`0b6831d0 fffff880`0c4d0960 fffff880`0c4d09c0 fffff880`0c4d0c20 : win32k!PDEVOBJ::DestroyFont+0xf2
fffff880`0c4d08d0 fffff960`00087ad3 : fffffa80`0b6831d0 fffff900`c232d010 fffff900`c008a010 00000000`00000000 : win32k!RFONTOBJ::vDeleteRFONT+0x4a
fffff880`0c4d0940 fffff960`00087507 : fffff900`c232d010 fffff880`0c4d09e0 fffff900`c232d010 fffff880`0c4d0c20 : win32k!RFONTOBJ::bMakeInactiveHelper+0x427
fffff880`0c4d09c0 fffff960`00088ab4 : 00000000`00000000 00000000`00000000 fffff880`0c4d0c20 fffff880`0c4d10b0 : win32k!RFONTOBJ::vMakeInactive+0xa3
fffff880`0c4d0a60 fffff960`000425b1 : 00000000`000004d4 fffff900`c23ab8f4 00000000`00000000 fffff900`00000004 : win32k!RFONTOBJ::bInit+0x1ec
fffff880`0c4d0b80 fffff960`002144da : 00000000`00000000 fffff880`0000008c fffff880`00000082 00000000`00000000 : win32k!GreExtTextOutWLocked+0x7e5
fffff880`0c4d0fa0 fffff960`0008cf0f : 00000000`76b06e30 fffff960`0008af94 fffff880`00666666 fffff900`00ffffff : win32k!GreBatchTextOut+0x26a
fffff880`0c4d1040 fffff800`032d789c : 00000000`00000004 fffff960`001ed460 00000000`00000001 fffffa80`00000001 : win32k!NtGdiFlushUserBatch+0x377
fffff880`0c4d12a0 00000000`74752dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x25
00000000`000cd398 fffff800`032d0080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752dd9
fffff880`0c4d1690 00000000`000ce248 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCallUserMode
fffff880`0c4d1698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0c4d1db0 : 0xce248


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!EngUnmapFontFileFD+8a
fffff960`0007851e 48837c242800    cmp     qword ptr [rsp+28h],0

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  win32k!EngUnmapFontFileFD+8a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d23ecb0

FAILURE_BUCKET_ID:  X64_0x1a_403_win32k!EngUnmapFontFileFD+8a

BUCKET_ID:  X64_0x1a_403_win32k!EngUnmapFontFileFD+8a

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-21028-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03266000 PsLoadedModuleList = 0xfffff800`034a3e50
Debug session time: Sat Apr 16 11:23:20.017 2011 (UTC - 4:00)
System Uptime: 0 days 0:32:33.109
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a20b80a6fc, 0, fffff880012c45a9, 5}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsCheckExistingFile+f9 )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a20b80a6fc, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012c45a9, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350e0e0
 fffff8a20b80a6fc 

FAULTING_IP: 
Ntfs!NtfsCheckExistingFile+f9
fffff880`012c45a9 8b8bac000000    mov     ecx,dword ptr [rbx+0ACh]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88009942520 -- (.trap 0xfffff88009942520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00b80a6b0 rbx=0000000000000000 rcx=00000000000000a0
rdx=fffffa80061d3b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012c45a9 rsp=fffff880099426b0 rbp=0000000000000000
 r8=0000000000000001  r9=0000000000000000 r10=fffff8800bfcefb0
r11=fffffa80061d3b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
Ntfs!NtfsCheckExistingFile+0xf9:
fffff880`012c45a9 8b8bac000000    mov     ecx,dword ptr [rbx+0ACh] ds:3cf0:00000000`000000ac=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800033558c1 to fffff800032d6740

STACK_TEXT:  
fffff880`099423b8 fffff800`033558c1 : 00000000`00000050 fffff8a2`0b80a6fc 00000000`00000000 fffff880`09942520 : nt!KeBugCheckEx
fffff880`099423c0 fffff800`032d482e : 00000000`00000000 fffff8a2`0b80a650 fffff880`03bae300 fffff880`010c2257 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`09942520 fffff880`012c45a9 : fffffa80`05a85230 fffff880`0bfcebf0 fffff8a0`0b80a680 fffff8a0`06b77a90 : nt!KiPageFault+0x16e
fffff880`099426b0 fffff880`012c4d73 : fffff880`0bfcebf0 fffff8a0`0b80a680 00000000`00000002 fffff8a0`0c364201 : Ntfs!NtfsCheckExistingFile+0xf9
fffff880`09942740 fffff880`012c16ef : fffff880`0bfcebf0 00000000`00000000 00000000`0cea2140 fffff8a0`00000044 : Ntfs!NtfsOpenExistingAttr+0x73
fffff880`09942800 fffff880`012c1eff : fffffa80`05a85230 fffffa80`05e279d0 fffff8a0`0b80aac0 fffff880`00000044 : Ntfs!NtfsOpenAttributeInExistingFile+0x50f
fffff880`09942990 fffff880`012d2e76 : fffffa80`05a85230 fffffa80`05e279d0 fffff8a0`0b80aac0 00000000`00000701 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
fffff880`09942a80 fffff880`012cd28d : fffffa80`05a85230 fffffa80`05e279d0 fffff880`09942c60 fffff880`09942ca8 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`09942b50 fffff880`01236c0d : fffffa80`05a85230 fffffa80`05e279d0 fffff880`0bfcebf0 fffffa80`061d3b00 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`09942d30 fffff800`032ce5c7 : fffff880`0bfceb60 00000000`ffffffff 00000000`02ddf1e8 00000000`027af120 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`09942d60 fffff800`032ce581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0bfcea30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsCheckExistingFile+f9
fffff880`012c45a9 8b8bac000000    mov     ecx,dword ptr [rbx+0ACh]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Ntfs!NtfsCheckExistingFile+f9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsCheckExistingFile+f9

BUCKET_ID:  X64_0x50_Ntfs!NtfsCheckExistingFile+f9

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-30747-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03266000 PsLoadedModuleList = 0xfffff800`034a3e50
Debug session time: Sat Apr 16 15:30:04.980 2011 (UTC - 4:00)
System Uptime: 0 days 2:28:41.182
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 38, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880054b85b0 -- (.trap 0xfffff880054b85b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800c7704d0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8a00eccc818 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033dc827 rsp=fffff880054b8740 rbp=fffffa800c6b2000
 r8=fffffa800b8d0001  r9=fffffa800c70b048 r10=fffffa800c750450
r11=fffffa800c70cd20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiEmptyPageAccessLog+0xe7:
fffff800`033dc827 8b4138          mov     eax,dword ptr [rcx+38h] ds:fec8:00000000`00000038=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003282b7a to fffff800032d6740

STACK_TEXT:  
fffff880`054b8448 fffff800`03282b7a : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : nt!KeBugCheckEx
fffff880`054b8450 fffff800`032d482e : 00000000`00000000 00000000`00503001 fffff880`054b8600 fffff800`03510840 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`054b85b0 fffff800`033dc827 : 00000000`00000000 fffffa80`0c750490 00000014`00000000 fffff680`00093000 : nt!KiPageFault+0x16e
fffff880`054b8740 fffff800`033dca80 : fffffa80`0b8dfb30 00000003`00000000 00000000`00000000 fffffa80`0c7704d0 : nt!MiEmptyPageAccessLog+0xe7
fffff880`054b87b0 fffff800`033dcc86 : fffffa80`0c70b000 9a400000`86875025 fffff680`000941d8 fffffa80`01b36d80 : nt!MiAllocateAccessLog+0x80
fffff880`054b87e0 fffff800`03349cfe : 00000003`00000000 fffffa80`019395f0 00000000`1283b000 9a400000`86875025 : nt!MiLogPageAccess+0x46
fffff880`054b8830 fffff800`03309df9 : 00000000`00000000 00000000`12888fff fffff880`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33652
fffff880`054b89f0 fffff800`035ed010 : fffffa80`059f91c0 0007ffff`00000000 fffffa80`0c7504d0 fffffa80`0c7504d0 : nt!MiRemoveMappedView+0xd9
fffff880`054b8b10 fffff800`035ed41b : 00000980`00000000 00000000`12260000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b0
fffff880`054b8bd0 fffff800`032d5993 : 00000000`00000000 00000000`00000df6 fffffa80`0b8dfb30 00000000`ca8d95d2 : nt!NtUnmapViewOfSection+0x5f
fffff880`054b8c20 00000000`77b0f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04c3dc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b0f95a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`03282b7a cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-24866-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`0348ce50
Debug session time: Sat Apr 16 17:33:07.727 2011 (UTC - 4:00)
System Uptime: 0 days 0:33:29.929
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a20635af58, 1, fffff88010b8eb7d, 5}


Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135 )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a20635af58, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88010b8eb7d, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034f70e0
 fffff8a20635af58 

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
fffff880`10b8eb7d 488908          mov     qword ptr [rax],rcx

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880029240b0 -- (.trap 0xfffff880029240b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a20635af58 rbx=0000000000000000 rcx=fffff8a00635af58
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010b8eb7d rsp=fffff88002924240 rbp=fffff8a00635ae50
 r8=fffffa800c50ff30  r9=0000000000000090 r10=fffff88003088d00
r11=fffffa800638e770 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x135:
fffff880`10b8eb7d 488908          mov     qword ptr [rax],rcx ds:3000:fffff8a2`0635af58=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000333e8c1 to fffff800032bf740

STACK_TEXT:  
fffff880`02923f48 fffff800`0333e8c1 : 00000000`00000050 fffff8a2`0635af58 00000000`00000001 fffff880`029240b0 : nt!KeBugCheckEx
fffff880`02923f50 fffff800`032bd82e : 00000000`00000001 fffffa80`0c3c3f70 fffffa80`0638e700 fffff800`033f42dd : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`029240b0 fffff880`10b8eb7d : 00000000`00000000 fffffa80`0c3c3f70 fffffa80`00000001 fffff880`10ba8f09 : nt!KiPageFault+0x16e
fffff880`02924240 fffff880`10b89523 : fffffa80`0c3c3f70 00000000`00000001 fffff8a0`0635ae50 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x135
fffff880`029242f0 fffff880`10b6fecc : 00000000`00000000 00000000`00000000 fffffa80`05e8b8b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`029243c0 fffff880`10ab1ccc : fffff8a0`0d029bb0 fffff8a0`0ddee000 fffff8a0`0ddee000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`029243f0 fffff880`10ab23ac : fffff8a0`0d029bb0 fffff8a0`05c4bf10 00000000`00000001 fffff8a0`0ddee000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`029244e0 fffff880`10ab1651 : fffff8a0`0ddee000 fffff8a0`0ddee000 fffff8a0`01e667a0 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyResource+0x84
fffff880`02924510 fffff880`10adf74f : fffff8a0`0cd43090 fffff8a0`031d1820 fffff8a0`0cd43090 fffff880`02924930 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0x95
fffff880`02924560 fffff880`10adee7b : fffff8a0`00000799 fffff8a0`0cd43090 fffff880`029248c0 fffff880`029248f0 : dxgkrnl!DXGCONTEXT::Present+0x2cb
fffff880`02924880 fffff960`001bc9b4 : fffffa80`05de3390 00000000`00000000 fffff8a0`0df95340 00000000`00000010 : dxgkrnl!DxgkPresent+0x543
fffff880`02924bf0 fffff800`032be993 : fffffa80`05de3390 00000000`03a7f960 000007fe`eec4d610 00000000`00000000 : win32k!NtGdiDdDDIPresent+0x18
fffff880`02924c20 000007fe`fdb613ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03a7ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdb613ca


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
fffff880`10b8eb7d 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa174

FAILURE_BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135

BUCKET_ID:  X64_0x50_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`04bb4000 fffff880`04bf2000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f73000 fffff880`00fca000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0423d000 fffff880`042c7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04ac5000 fffff880`04adb000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010fd000 fffff880`01108000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04bf2000 fffff880`04bfa000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`08fe8000 fffff880`08ff3000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c8a000 fffff880`00c93000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0103f000 fffff880`01069000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04a74000 fffff880`04a7c000   automap  automap.sys  Mon Jun 29 11:13:06 2009 (4A48DA02)
fffff880`0414d000 fffff880`04154000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`045cf000 fffff880`045e0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07122000 fffff880`07140000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00620000 fffff960`00647000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`040e9000 fffff880`04113000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eb3000 fffff880`00f73000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01416000 fffff880`01446000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cfa000 fffff880`00d58000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014a7000 fffff880`0151a000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04a64000 fffff880`04a74000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`08964000 fffff880`08972000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`045b1000 fffff880`045cf000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`045a2000 fffff880`045b1000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04fca000 fffff880`04fec000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04ef5000 fffff880`04f38000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`0897c000 fffff880`0898f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`08761000 fffff880`087ed000   dump_mv91xx dump_mv91xx.sys Fri Dec 25 01:45:39 2009 (4B345F93)
fffff880`040ce000 fffff880`040d6000   dump_mvxxmm dump_mvxxmm.sys Fri Dec 25 01:45:15 2009 (4B345F7B)
fffff880`08972000 fffff880`0897c000   dump_scsiport dump_scsiport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`0898f000 fffff880`0899b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10a7a000 fffff880`10b6e000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`10b6e000 fffff880`10bb4000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`086fb000 fffff880`08731000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01154000 fffff880`01168000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`086b1000 fffff880`086cc380   fireface_64 fireface_64.sys Fri Mar 18 08:47:34 2011 (4D835466)
fffff880`01108000 fffff880`01154000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0152b000 fffff880`01535000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015bb000 fffff880`015f5000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`017a2000 fffff880`017ec000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`04a39000 fffff880`04a46000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03206000 fffff800`0324f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10bb4000 fffff880`10bd8000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`08655000 fffff880`086b1000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`0873f000 fffff880`08758000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`08758000 fffff880`08760080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`08731000 fffff880`0873f000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0705a000 fffff880`07122000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0169d000 fffff880`016a6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04a0c000 fffff880`04a2a000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04426000 fffff880`0443c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c17000 fffff880`00c37000   jraid    jraid.sys    Mon May 31 01:44:28 2010 (4C034CBC)
fffff880`04a2a000 fffff880`04a39000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`08f70000 fffff880`08f77000   KernExplorer64 KernExplorer64.sys Thu Feb 03 09:28:26 2011 (4D4ABB8A)
fffff880`04a7c000 fffff880`04abf000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d9000 fffff880`013f3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04abf000 fffff880`04ac4200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`01168000 fffff880`0117d000   Lbd      Lbd.sys      Thu Feb 03 09:23:53 2011 (4D4ABA79)
fffff880`08800000 fffff880`08815000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`089a9000 fffff880`089cc000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ca2000 fffff880`00ce6000   mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0899b000 fffff880`089a9000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04ae7000 fffff880`04af6000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08957000 fffff880`08964000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c70000 fffff880`00c8a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04113000 fffff880`04144000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`07140000 fffff880`07158000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07158000 fffff880`07185000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07185000 fffff880`071d3000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`071d3000 fffff880`071f6000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`041b2000 fffff880`041bd000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fd3000 fffff880`00fdd000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0117d000 fffff880`011db000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04597000 fffff880`045a2000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0168b000 fffff880`0169d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`00c66000 fffff880`00c70000   mv91cons mv91cons.sys Tue Sep 22 17:36:37 2009 (4AB94365)
fffff880`01069000 fffff880`010f5000   mv91xx   mv91xx.sys   Fri Dec 25 01:45:39 2009 (4B345F93)
fffff880`010f5000 fffff880`010fd000   mvxxmm   mvxxmm.sys   Fri Dec 25 01:45:15 2009 (4B345F7B)
fffff880`016b0000 fffff880`017a2000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04adb000 fffff880`04ae7000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`08868000 fffff880`0887b000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`043be000 fffff880`043ed000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04e5a000 fffff880`04e6f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04320000 fffff880`0432f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`01454000 fffff880`01499000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`08f5b000 fffff880`08f70000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`041bd000 fffff880`041ce000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0458b000 fffff880`04597000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0324f000 fffff800`0382c000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01236000 fffff880`013d9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04144000 fffff880`0414d000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04fb2000 fffff880`04fca000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`0443c000 fffff880`0446c000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`10a78000 fffff880`10a79180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`04e6f000 fffff880`04e98000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`0fe1d000 fffff880`10a77d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`086e8000 fffff880`086fb000   nvnusbaudio nvnusbaudio.sys Thu Oct 28 10:27:00 2010 (4CC98834)
fffff880`08815000 fffff880`08868000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`042d0000 fffff880`042f6000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fea000 fffff880`00fff000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d58000 fffff880`00d8b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00c00000 fffff880`00c07000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c07000 fffff880`00c17000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0151a000 fffff880`0152b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04025000 fffff880`040cb000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0887b000 fffff880`08887000   pnarp    pnarp.sys    Sat Jun 06 02:06:44 2009 (4A2A0774)
fffff880`04e98000 fffff880`04ed5000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ce6000 fffff880`00cfa000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`089ed000 fffff880`089f9000   purendis purendis.sys Sat Jun 06 00:32:06 2009 (4A29F146)
fffff880`0446e000 fffff880`04492000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`10be5000 fffff880`10c00000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04200000 fffff880`04221000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0fe00000 fffff880`0fe1a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0453a000 fffff880`0458b000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04197000 fffff880`041a0000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`041a0000 fffff880`041a9000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`041a9000 fffff880`041b2000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`08f23000 fffff880`08f5b000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`01581000 fffff880`015bb000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`08600000 fffff880`08618000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04b5d000 fffff880`04bb4000   Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`08887000 fffff880`0894a000   RTL8192su RTL8192su.sys Thu Nov 25 01:13:42 2010 (4CEDFE96)
fffff880`00c37000 fffff880`00c66000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`07000000 fffff880`0700b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04a00000 fffff880`04a0c000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0432f000 fffff880`0434c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017ec000 fffff880`017f4000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`08e73000 fffff880`08f09000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08e0c000 fffff880`08e73000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0700b000 fffff880`07038000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04bfa000 fffff880`04bfb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`07038000 fffff880`0704a000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`041ec000 fffff880`041f9000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`08f09000 fffff880`08f14000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`041ce000 fffff880`041ec000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`04526000 fffff880`0453a000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`08f14000 fffff880`08f23000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`04400000 fffff880`04426000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04f38000 fffff880`04f4a000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0446c000 fffff880`0446df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04b4c000 fffff880`04b5d000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04e00000 fffff880`04e5a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04af6000 fffff880`04b4c000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04f67000 fffff880`04f76000   usbrpm   usbrpm.sys   Mon Jul 13 20:35:14 2009 (4A5BD2C2)
fffff880`086cd000 fffff880`086e8000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`10bd8000 fffff880`10be5000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`044f0000 fffff880`04525a80   VBoxDrv  VBoxDrv.sys  Thu Feb 17 11:21:07 2011 (4D5D4AF3)
fffff880`04000000 fffff880`04024080   VBoxNetAdp VBoxNetAdp.sys Thu Feb 17 11:21:07 2011 (4D5D4AF3)
fffff880`01200000 fffff880`01228d00   VBoxNetFlt VBoxNetFlt.sys Thu Feb 17 11:21:06 2011 (4D5D4AF2)
fffff880`044e4000 fffff880`044efc40   VBoxUSBMon VBoxUSBMon.sys Thu Feb 17 11:21:07 2011 (4D5D4AF3)
fffff880`00fdd000 fffff880`00fea000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`04154000 fffff880`04162000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04162000 fffff880`04187000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`04497000 fffff880`044e4000   vmm      vmm.sys      Tue Apr 07 09:25:54 2009 (49DB5462)
fffff880`04a4f000 fffff880`04a64000   VMNetSrv VMNetSrv.sys Wed Jan 16 06:52:01 2008 (478DEFE1)
fffff880`00d8b000 fffff880`00da0000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00da0000 fffff880`00dfc000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01535000 fffff880`01581000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04f76000 fffff880`04fb2000   vpchbus  vpchbus.sys  Tue Sep 22 21:32:32 2009 (4AB97AB0)
fffff880`0430c000 fffff880`04320000   vpcnfltr vpcnfltr.sys Tue Sep 22 21:32:30 2009 (4AB97AAE)
fffff880`04f4a000 fffff880`04f67000   vpcusb   vpcusb.sys   Tue Sep 22 21:32:39 2009 (4AB97AB7)
fffff880`04367000 fffff880`043bd180   vpcvmm   vpcvmm.sys   Tue Sep 22 21:32:38 2009 (4AB97AB6)
fffff880`0894a000 fffff880`08957000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`042f6000 fffff880`0430c000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`08ff3000 fffff880`08ffd000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`0434c000 fffff880`04367000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`04187000 fffff880`04197000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`042c7000 fffff880`042d0000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00030000 fffff960`00340000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`04a46000 fffff880`04a4f000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fca000 fffff880`00fd3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`089cc000 fffff880`089ed000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08f77000 fffff880`08fe8000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`08618000 fffff880`08622000   vwifimp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`071f6000 fffff880`071ff000   cpuz135_x64.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`08f77000 fffff880`08fe8000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01446000 fffff880`01454000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`016a6000 fffff880`016b0000   dump_scsipor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`04042000 fffff880`040ce000   dump_mv91xx.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0008C000
fffff880`040d6000 fffff880`040e9000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Mar 16, 2011
Messages
12
Reaction score
0
im running memtest as i post this with the second test done and no errors, so im hoping that the memory is good.

the QVL has the 1600 OCZG ram in there but not the 2000, could this cause problems??


cheers
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top