Link to home
Start Free TrialLog in
Avatar of dan5460
dan5460

asked on

Blue screen galore, random BSOD need help

Hello experts, I have been fighting this problem now for awhile and been searching this site for informaton.  I am getting massive BSOD and it seems to be random.  I could be doing anything at all and would get it.  I ran memtest for about 15 hours and everything went well.  I ran all my antispyware programs anti virus program and came clean.  I have updated all my drivers and updated Microsoft patches.  This is a fairly new re-install of windows as of January of this year.  
I tried debugging the minidumps, but I am not sure what I am looking at.  It seems that I sometimes have a failure on my USB, Nvidia, and I get IRQ not equal to, just about everything.  I really need help to debug and find a solution to this problem  

I posted my minidump and a current profile of my system on the following url.  
http://www.dvalen.com/mini_dumps_files.htm

Any help will be much appreciated.  
Thanks again

Danny
Avatar of cpc2004
cpc2004
Flag of Hong Kong image

Debug report
Mini030406-01.dmp BugCheck 10000050, {ffbea4e8, 0, f7b5570e, 0}
8874c778: Unable to get thread contents

Mini032306-01.dmp BugCheck 100000D1, {c2e89180, 2, 0, f77efe21}
Probably caused by : usbuhci.sys ( usbuhci!UhciAllocTd+1f )

Mini032306-02.dmp BugCheck 100000EA, {887d82d8, 88b50128, f78aecb4, 1}
DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_FAULT
Probably caused by : nv4_mini.sys ( nv4_mini+53d6c )

Mini032506-01.dmp BugCheck 1000008E, {c000001d, f778f684, b6ba8410, 0}
Probably caused by : watchdog.sys ( watchdog!WdExitMonitoredSection+8 )

Mini032606-01.dmp BugCheck 100000D1, {5327e686, 2, 0, b7abed59}
Probably caused by : mrxsmb.sys ( mrxsmb!MRxSmbReadHandler_NoCopy+4a )

Mini032606-02.dmp BugCheck 100000D1, {0, 2, 0, 0}


Finding
Mini032506-01.dmp is crashed with NT status code c000001d (illegal instruction) and it is the sign of faulty ram. Mini032306-02.dmp is crashed with bugcheck code EA and it is the sign of faulty ram or video card.

The culprit is faulty ram (60%), video card (30%) and M/B (10%).

Suugestion
1 Some faulty ram can pass memtest. Reseat the memory to another slot or downclock the ram
2 Run 3DMark 2005 to test your video card
If it is an Nvidia chipset on the Mboard or video card, it MUST have RAM with true CL=2.5 and no slower.  If you have RAM that is CL3, it will pass all tests, but its refresh is TOO SLOW for Nvidia chipsets.  The symptoms you describe are exactly what you get from CL3 RAM chips.  My bet is that you do indeed have CL3 ram chips and they will have to be replaced.  The BSODs are always random with this problem.  CL is the "refresh speed" of the RAM in nanosceonds.  If too slow, Nvidia chipset freeze, cant get data fast enough.
Avatar of nobus
test your ram with memtest86+ from :   http://www.memtest.org/         ( if you did not use this one )
and do a scan disk for errors on your disk drive.
also, check the CPU temperature if it get's up tto high - check it in the bios.
since you did not post your specs, check if your system is not underppowered, calculate what you need here :

http://www.jscustompcs.com/power_supply/
Avatar of dan5460
dan5460

ASKER

Thanks for the info.  I did post my specs on my website as posted above.  My cpu temp is at 127F.  

As for the Nvidia chipset, do you think I should just get a new video card?    If I run the 3Dmark 2005, would it be able to identify if it is indeed the video card or the Ram.  It is hard to believe that it would be my Ram.  

So I am assuming that based on the comments above that it is either the Video card or my Ram.  Is this correct?

Thanks again

Danny
>>  either the Video card or my Ram.  Is this correct?   << those are the most probable.
did you check how much power you need ?
   
Avatar of dan5460

ASKER

Yes, I just check it, and it look like i need about 333 watts.  Once I get home from work, I will check to see the watt on my PSU.  The strange thing is that I did not add anything extra, so I am not sure if it the PSU.  

I am guessing that it will probably be the NVidea card, since I noticed that at one time the fan stopped working and I ended up buying a new fan for it.  maybe at one point the the card got overheated and now it is faulty.  I will check with the 3dmark app.

Thanks

Danny
you can test your video card by typing dxdiag in the run box, select display tab, and test 2D and 3D
Avatar of dan5460

ASKER

Hello,

Here is an update.  I ran the dxdiag and everything went fine.  No BSOD.  I also ran the 3dMark version 2003, which is the only one i currently have and ran every test with no incident.  Now, I am not sure what is happening.  

As far as the RAM,  scrathcyboy mentioned that I might have CL3 instead of CL2.5  How do I find out what I have?  If I do have CL3, would I have not gotten this BSOD when I first installed the RAM more then a year ago?  

Still not sure what to do.

Thanks

>>   How do I find out what I have   << note the product code on the ram, and google for it, or check it at www.kingston.com
Avatar of dan5460

ASKER

Hello,

I checked the ram last night and they are all CL2.5.  I noticed that on my motherboard, it has a chip or something that indicates MSI AGP/8x.  Should i look into getting a MSI video board instead of Nvidia or ATI?  

Thanks
Danny
you can identify your hardware with Everest :   http://www.majorgeeks.com/downloads9.html      
Avatar of dan5460

ASKER

Hello experts,
Ok, I took out my video card and installed an old one that I had about 3 months ago.  It is an NVidia GeForce FX 5200.  Today, I opened a project that I have in an application called Proshow that creates DVD out of pictures, anyway, left it running and when I got back, I got the BSOD.  

I got the minidump and still can't figure it out.  I ran Dr.Watson and this is the output I got.  Hope it helps.  Any suggestions?

 
Application exception occurred:
        App: C:\WINDOWS\explorer.exe (pid=120044)
        When: 1/14/2006 @ 22:02:19.100
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: SKULL
        User Name: Danny V
        Terminal Session Id: 0
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 8 Stepping 1
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Uniprocessor Free
        Registered Organization:
        Registered Owner: Danny

*----> Task List <----*
   0 System Process
   4 System
 640 smss.exe
 712 csrss.exe
 740 winlogon.exe
 784 services.exe
 804 lsass.exe
 984 svchost.exe
1068 svchost.exe
1212 svchost.exe
1240 StyleXPService.exe
1372 svchost.exe
1488 SDMCP.exe
1496 svchost.exe
1724 spoolsv.exe
1992 avgamsvr.exe
2028 avgupsvc.exe
2044 avgemc.exe
 172 Error 0xD0000022
 188 CTsvcCDA.exe
 220 nvsvc32.exe
 300 ScsiAccess.exe
 688 svchost.exe
 916 WRSSSDK.exe
1356 avgcc.exe
1364 CTSysVol.exe
1368 CTDVDDET.EXE
1396 CTHELPER.EXE
1416 tfswctrl.exe
1484 gcasServ.exe
1532 RUNDLL32.EXE
1564 SpySweeper.exe
1596 Error 0xD0000022
1616 wdfmgr.exe
1784 Error 0xD0000022
1856 ctfmon.exe
2068 MsPMSPSv.exe
2308 MemTurbo.exe
2348 YahooWidgetEngine.exe
2520 YahooWidgetEngine.exe
2660 gcasDtServ.exe
3088 alg.exe
3732 YahooWidgetEngine.exe
3876 YahooWidgetEngine.exe
3932 YahooWidgetEngine.exe
4052 YahooWidgetEngine.exe
1160 YahooWidgetEngine.exe
1592 YahooWidgetEngine.exe
2120 YahooWidgetEngine.exe
2476 YahooWidgetEngine.exe
1204 svchost.exe
3484 DOpus.exe
67336 MontageProSH.exe
67340 Thumbs.exe
70764 iexplore.exe
117644 launcher.exe
120044 explorer.exe
119036 hpgs2wnf.exe
119460 NOTEPAD.EXE
118820 setup2.0.exe
118272 INS4F.tmp
120456 drwtsn32.exe

*----> Module List <----*
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(0000000001630000 - 00000000018f6000: C:\WINDOWS\system32\msi.dll
(0000000001cc0000 - 0000000001cd0000: C:\WINDOWS\system32\ctagent.dll
(00000000021b0000 - 00000000022b6000: F:\Apps\TrueLaunchBar\tlb.dll
(0000000010000000 - 0000000010016000: C:\PROGRA~1\COMMON~1\stardock\MCPCore.dll
(0000000010040000 - 00000000100b5000: F:\Apps\Directory Opus\dopuslib.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTTP.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeui.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\system32\msxml3.dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webcheck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778ce000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll

*----> State Dump for Thread Id 0x1d4d4 <----*

eax=00000009 ebx=00000003 ecx=0000012e edx=0000029a esi=00133120 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr  Args to Child              
0007ff08 7ca0be38 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00133120 7ffde000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002066e explorer+0x16e95
0007ffc0 7c816d4f 001587e8 0006e890 7ffde000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000007fef0  18 94 d4 77 a2 3b a2 7c - ac 92 80 7c 20 31 13 00  ...w.;.|...| 1..
000000000007ff00  20 31 13 00 14 ff 07 00 - 14 ff 07 00 38 be a0 7c   1..........8..|
000000000007ff10  00 00 00 00 5c ff 07 00 - 95 6e 01 01 20 31 13 00  ....\....n.. 1..
000000000007ff20  00 e0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00  ............$...
000000000007ff30  50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c  P.......'..|...|
000000000007ff40  ff ff ff ff 0c 00 00 00 - 00 00 00 00 e5 97 32 05  ..............2.
000000000007ff50  a8 00 00 00 01 00 00 00 - 20 31 13 00 c0 ff 07 00  ........ 1......
000000000007ff60  b6 e2 01 01 00 00 00 00 - 00 00 00 00 6e 06 02 00  ............n...
000000000007ff70  05 00 00 00 e8 87 15 00 - 90 e8 06 00 44 00 00 00  ............D...
000000000007ff80  c0 06 02 00 a0 06 02 00 - 70 06 02 00 00 00 00 00  ........p.......
000000000007ff90  00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00  ................
000000000007ffa0  00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00  ....:...........
000000000007ffb0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000007ffc0  f0 ff 07 00 4f 6d 81 7c - e8 87 15 00 90 e8 06 00  ....Om.|........
000000000007ffd0  00 e0 fd 7f 38 a9 54 80 - c8 ff 07 00 18 b7 af 85  ....8.T.........
000000000007ffe0  ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00  .......|Xm.|....
000000000007fff0  00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00  ........N.......
0000000000080000  41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00  Actx ........$..
0000000000080010  c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00  ........ .......
0000000000080020  14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00  ............4...

*----> State Dump for Thread Id 0x1d508 <----*

eax=01916d9c ebx=00000000 ecx=01916d9c edx=000a5b7c esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=00e3fe1c ebp=00e3ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00e3ff80 77e76c22 00e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
00e3ff88 77e76a3b 000d0dc0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5ea
00e3ffa8 77e76c0a 000d0c78 00e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
00e3ffb4 7c80b50b 000e0978 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5d2
00e3ffec 00000000 77e76bf0 000e0978 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000e3fe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 00  ...|.g.w....p...
0000000000e3fe2c  00 00 00 00 a0 2f 0e 00 - 4c ff e3 00 04 00 00 00  ...../..L.......
0000000000e3fe3c  f8 fd 3f 01 00 00 00 00 - a8 da 38 e2 80 e5 ab 89  ..?.......8.....
0000000000e3fe4c  48 2d da b5 00 00 00 00 - f8 fd 3f 01 00 00 00 00  H-........?.....
0000000000e3fe5c  98 e5 ab 89 80 e5 ab 89 - 48 2d da b5 fd bc 56 80  ........H-....V.
0000000000e3fe6c  64 2d da b5 cc fd 3f 01 - 34 bc 56 80 00 00 00 00  d-....?.4.V.....
0000000000e3fe7c  00 00 00 00 00 00 00 00 - a8 da 38 e2 98 cb 01 00  ..........8.....
0000000000e3fe8c  01 6a 56 80 00 00 00 00 - 20 2c da b5 00 00 00 00  .jV..... ,......
0000000000e3fe9c  00 00 00 00 d8 fd 3f 01 - 9c cb 01 00 00 00 00 00  ......?.........
0000000000e3feac  c0 da 38 e2 38 e7 18 e1 - 29 c9 33 e4 b8 2b da b5  ..8.8...).3..+..
0000000000e3febc  07 00 00 00 b8 03 d0 89 - 18 2c da b5 18 00 00 00  .........,......
0000000000e3fecc  d0 a5 bd e2 01 fd 3f 01 - 18 00 00 00 d0 a5 bd e2  ......?.........
0000000000e3fedc  01 fd 3f 01 8d 3c 56 80 - f8 2c da b5 00 00 00 00  ..?..<V..,......
0000000000e3feec  d8 fd 3f 01 f8 2c da b5 - 18 2c da b5 f8 2c da b5  ..?..,...,...,..
0000000000e3fefc  18 2c da b5 d8 fd 3f 01 - d0 a5 bd e2 b8 a5 bd e2  .,....?.........
0000000000e3ff0c  d8 a2 ad 85 14 2c da b5 - 54 8a ad 85 24 2c da b5  .....,..T...$,..
0000000000e3ff1c  b2 c2 4d 80 ba c2 4d 80 - 24 8a ad 85 b8 88 ad 85  ..M...M.$.......
0000000000e3ff2c  ec 88 ad 85 80 ff e3 00 - 99 66 e7 77 4c ff e3 00  .........f.wL...
0000000000e3ff3c  a9 66 e7 77 ed 10 90 7c - 00 f7 0d 00 78 09 0e 00  .f.w...|....x...
0000000000e3ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x1d50c <----*

eax=774fe429 ebx=00007530 ecx=7ffde000 edx=00000000 esi=000001c0 edi=00000000
eip=7c90eb94 esp=00e8ff28 ebp=00e8ff8c iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00e8ff8c 774fe407 000001c0 00007530 00000000 ntdll!KiFastSystemCallRet
00e8ffb4 7c80b50b 000e30d0 7c910945 7c91094e ole32!StringFromGUID2+0x605
00e8ffec 00000000 774fe429 000e30d0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000e8ff28  c0 e9 90 7c db 25 80 7c - c0 01 00 00 00 00 00 00  ...|.%.|........
0000000000e8ff38  5c ff e8 00 50 25 80 7c - d0 30 0e 00 30 75 00 00  \...P%.|.0..0u..
0000000000e8ff48  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e8ff58  10 00 00 00 00 5d 1e ee - ff ff ff ff 00 e0 fd 7f  .....]..........
0000000000e8ff68  00 b0 fd 7f 5c ff e8 00 - 58 24 80 7c 3c ff e8 00  ....\...X$.|<...
0000000000e8ff78  0f 24 80 7c dc ff e8 00 - f3 99 83 7c 08 26 80 7c  .$.|.......|.&.|
0000000000e8ff88  00 00 00 00 b4 ff e8 00 - 07 e4 4f 77 c0 01 00 00  ..........Ow....
0000000000e8ff98  30 75 00 00 00 00 00 00 - 45 09 91 7c d0 30 0e 00  0u......E..|.0..
0000000000e8ffa8  00 00 4e 77 44 e4 4f 77 - 4e 09 91 7c ec ff e8 00  ..NwD.OwN..|....
0000000000e8ffb8  0b b5 80 7c d0 30 0e 00 - 45 09 91 7c 4e 09 91 7c  ...|.0..E..|N..|
0000000000e8ffc8  d0 30 0e 00 00 b0 fd 7f - 00 26 eb 89 c0 ff e8 00  .0.......&......
0000000000e8ffd8  10 55 0d 88 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  .U.........|...|
0000000000e8ffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77  ............).Ow
0000000000e8fff8  d0 30 0e 00 00 00 00 00 - 00 00 00 00 00 00 00 00  .0..............
0000000000e90008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90018  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90028  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90038  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90048  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90058  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x1d510 <----*

eax=022ddfa8 ebx=0000001c ecx=0000c055 edx=7c90eb94 esi=022ddfa8 edi=000905dc
eip=021f6eb2 esp=00ecfd60 ebp=0001caa8 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

*** WARNING: Unable to verify checksum for F:\Apps\TrueLaunchBar\tlb.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for F:\Apps\TrueLaunchBar\tlb.dll -
function: tlb
        021f6e97 6c               insb
        021f6e98 2428             and     al,0x28
        021f6e9a 8b5c2420         mov     ebx,[esp+0x20]
        021f6e9e 7419             jz      tlb+0x46eb9 (021f6eb9)
        021f6ea0 68a0832502       push    0x22583a0
        021f6ea5 57               push    edi
        021f6ea6 ff15f4262702     call    dword ptr [tlb+0xc26f4 (022726f4)]
        021f6eac 8bf0             mov     esi,eax
        021f6eae 85f6             test    esi,esi
        021f6eb0 7407             jz      tlb+0x46eb9 (021f6eb9)
FAULT ->021f6eb2 397e10           cmp     [esi+0x10],edi    ds:0023:022ddfb8=????????
        021f6eb5 7407             jz      tlb+0x46ebe (021f6ebe)
        021f6eb7 33f6             xor     esi,esi
        021f6eb9 83fb01           cmp     ebx,0x1
        021f6ebc 754a             jnz     tlb+0x46f08 (021f6f08)
        021f6ebe 81fb13010000     cmp     ebx,0x113
        021f6ec4 0f87b3000000     jnbe    tlb+0x46f7d (021f6f7d)
        021f6eca 0f8495000000     je      tlb+0x46f65 (021f6f65)
        021f6ed0 8d43ff           lea     eax,[ebx-0x1]
        021f6ed3 83f820           cmp     eax,0x20
        021f6ed6 7730             ja      tlb+0x46f08 (021f6f08)

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0001caa8 00000000 00000000 00000000 00000000 tlb+0x46eb2

*----> Raw Stack Dump <----*
0000000000ecfd60  dc fd ec 00 80 6e 1f 02 - a0 fd ec 00 00 00 00 00  .....n..........
0000000000ecfd70  83 d1 00 00 a0 fd ec 00 - 34 87 d4 77 dc 05 09 00  ........4..w....
0000000000ecfd80  1c 00 00 00 00 00 00 00 - a8 ca 01 00 80 6e 1f 02  .............n..
0000000000ecfd90  cd ab ba dc 00 00 00 00 - dc fd ec 00 80 6e 1f 02  .............n..
0000000000ecfda0  08 fe ec 00 16 88 d4 77 - 80 6e 1f 02 dc 05 09 00  .......w.n......
0000000000ecfdb0  1c 00 00 00 00 00 00 00 - a8 ca 01 00 28 2e 0f 00  ............(...
0000000000ecfdc0  dc 05 09 00 02 01 00 00 - 14 00 00 00 01 00 00 00  ................
0000000000ecfdd0  00 00 00 00 28 2e 0f 00 - 00 00 00 00 00 00 00 00  ....(...........
0000000000ecfde0  ff ff ff ff 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfdf0  bc fd ec 00 84 f9 ec 00 - 4c fe ec 00 67 04 d7 77  ........L...g..w
0000000000ecfe00  30 88 d4 77 00 00 00 00 - 5c fe ec 00 c0 b4 d4 77  0..w....\......w
0000000000ecfe10  28 2e 0f 00 80 6e 1f 02 - dc 05 09 00 1c 00 00 00  (....n..........
0000000000ecfe20  00 00 00 00 a8 ca 01 00 - cc ee 62 00 01 00 00 00  ..........b.....
0000000000ecfe30  00 00 00 00 28 ff ec 00 - 02 01 00 00 d9 8b d4 77  ....(..........w
0000000000ecfe40  00 00 00 00 30 fe ec 00 - 84 f9 ec 00 dc ff ec 00  ....0...........
0000000000ecfe50  67 04 d7 77 d0 b4 d4 77 - ff ff ff ff 84 fe ec 00  g..w...w........
0000000000ecfe60  0c b5 d4 77 b8 ee 62 00 - 1c 00 00 00 00 00 00 00  ...w..b.........
0000000000ecfe70  a8 ca 01 00 80 6e 1f 02 - 00 00 00 00 00 00 00 00  .....n..........
0000000000ecfe80  00 00 00 00 d4 fe ec 00 - e3 ea 90 7c 94 fe ec 00  ...........|....
0000000000ecfe90  18 00 00 00 b8 ee 62 00 - 1c 00 00 00 00 00 00 00  ......b.........

*----> State Dump for Thread Id 0x1d514 <----*

eax=7c92798d ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=00f0ff9c ebp=00f0ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00f0ffb4 7c80b50b 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
00f0ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f0ff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff f0 00  \..|.y.|........
0000000000f0ffac  00 00 00 00 00 00 00 80 - ec ff f0 00 0b b5 80 7c  ...............|
0000000000f0ffbc  00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00  ....x..|........
0000000000f0ffcc  00 90 fd 7f 00 26 eb 89 - c0 ff f0 00 78 fb e4 87  .....&......x...
0000000000f0ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000000f0ffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
0000000000f0fffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x1d518 <----*

eax=000d9b48 ebx=00000000 ecx=64710003 edx=64700002 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=00f4ff70 ebp=00f4ffb4 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00f4ffb4 7c80b50b 00000000 00ecfce4 00ecfce8 ntdll!KiFastSystemCallRet
00f4ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f4ff70  1b e3 90 7c 9d 07 91 7c - ec 01 00 00 ac ff f4 00  ...|...|........
0000000000f4ff80  b0 ff f4 00 98 ff f4 00 - a0 ff f4 00 e4 fc ec 00  ................
0000000000f4ff90  e8 fc ec 00 00 00 00 00 - 00 00 00 00 b0 c0 92 01  ................
0000000000f4ffa0  00 7c 28 e8 ff ff ff ff - 35 5c 70 80 69 75 92 7c  .|(.....5\p.iu.|
0000000000f4ffb0  70 39 13 00 ec ff f4 00 - 0b b5 80 7c 00 00 00 00  p9.........|....
0000000000f4ffc0  e4 fc ec 00 e8 fc ec 00 - 00 00 00 00 00 80 fd 7f  ................
0000000000f4ffd0  00 26 eb 89 c0 ff f4 00 - 78 fb e4 87 ff ff ff ff  .&......x.......
0000000000f4ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000000f4fff0  00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00  ....`..|........
0000000000f50000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50060  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f50090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f500a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x1d51c <----*

eax=000000c0 ebx=00000000 ecx=00ecfb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00f8fcec ebp=00f8ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00f8ffb4 7c80b50b 00000000 00000020 00ecfce4 ntdll!KiFastSystemCallRet
00f8ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f8fcec  ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd f8 00  ...|...|....0...
0000000000f8fcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00  ............ ...
0000000000f8fd0c  e4 fc ec 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
0000000000f8fd1c  f4 01 00 00 1c d5 01 00 - 03 00 00 00 03 00 00 00  ................
0000000000f8fd2c  02 00 00 00 f0 01 00 00 - d8 01 00 00 b0 04 00 00  ................
0000000000f8fd3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x1d524 <----*

eax=00fe0010 ebx=001077d0 ecx=00001000 edx=7c90eb94 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=015efd30 ebp=015efdcc iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
015efdcc 77d495f9 00000009 015efdf4 00000000 ntdll!KiFastSystemCallRet
015efe28 7c9f4e37 00000008 015efe50 ffffffff USER32!GetLastInputInfo+0x105
015eff4c 7ca0a334 77f74292 00000000 7c809988 SHELL32!Ordinal646+0x21e2
015effb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133
015effec 00000000 77f74223 00ecf4d4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000015efd30  ab e9 90 7c f2 94 80 7c - 09 00 00 00 d0 77 10 00  ...|...|.....w..
00000000015efd40  01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000015efd50  09 00 00 00 02 00 00 00 - 18 bd 5a 00 14 00 00 00  ..........Z.....
00000000015efd60  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
00000000015efd70  00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00  ....0...........
00000000015efd80  60 d1 0e 00 00 00 00 00 - 00 00 00 00 ec fd 5e 01  `.............^.
00000000015efd90  67 04 d7 77 30 88 d4 77 - 00 e0 fd 7f 00 60 fd 7f  g..w0..w.....`..
00000000015efda0  00 60 fd 7f 00 00 00 00 - d0 77 10 00 e2 00 06 00  .`.......w......
00000000015efdb0  09 00 00 00 4c fd 5e 01 - 00 00 00 00 dc ff 5e 01  ....L.^.......^.
00000000015efdc0  f3 99 83 7c 90 95 80 7c - 00 00 00 00 28 fe 5e 01  ...|...|....(.^.
00000000015efdd0  f9 95 d4 77 09 00 00 00 - f4 fd 5e 01 00 00 00 00  ...w......^.....
00000000015efde0  ff ff ff ff 01 00 00 00 - 80 b5 11 00 08 00 00 00  ................
00000000015efdf0  00 00 00 00 bc 04 00 00 - 5c 04 00 00 0c 03 00 00  ........\.......
00000000015efe00  e0 02 00 00 e4 02 00 00 - 38 02 00 00 40 02 00 00  ........8...@...
00000000015efe10  44 02 00 00 14 02 00 00 - 00 00 00 00 01 00 00 00  D...............
00000000015efe20  00 60 fd 7f 14 02 00 00 - 4c ff 5e 01 37 4e 9f 7c  .`......L.^.7N.|
00000000015efe30  08 00 00 00 50 fe 5e 01 - ff ff ff ff ff 04 00 00  ....P.^.........
00000000015efe40  f4 fd 5e 01 00 00 00 00 - 00 00 00 00 00 00 00 00  ..^.............
00000000015efe50  bc 04 00 00 5c 04 00 00 - 0c 03 00 00 e0 02 00 00  ....\...........
00000000015efe60  e4 02 00 00 38 02 00 00 - 40 02 00 00 44 02 00 00  ....8...@...D...

*----> State Dump for Thread Id 0x1d580 <----*

eax=7751a2bf ebx=00000000 ecx=00000000 edx=00000008 esi=01b8ff98 edi=00000000
eip=7c90eb94 esp=01b8ff58 ebp=01b8ff74 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\NETSHELL.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01b8ff74 764434cb 01b8ff98 00000000 00000000 ntdll!KiFastSystemCallRet
01b8ffb4 7c80b50b 76476328 00000000 7c900000 NETSHELL!NetSetupSetProgressCallback+0x19160
01b8ffec 00000000 7644348c 76476328 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001b8ff58  be 91 d4 77 f1 91 d4 77 - 98 ff b8 01 00 00 00 00  ...w...w........
0000000001b8ff68  00 00 00 00 00 00 00 00 - c6 91 d4 77 b4 ff b8 01  ...........w....
0000000001b8ff78  cb 34 44 76 98 ff b8 01 - 00 00 00 00 00 00 00 00  .4Dv............
0000000001b8ff88  00 00 00 00 00 00 90 7c - 00 00 00 00 28 63 47 76  .......|....(cGv
0000000001b8ff98  00 00 00 00 00 00 00 00 - 81 a8 4f 80 9c 4c 50 b8  ..........O..LP.
0000000001b8ffa8  35 5c 70 80 00 00 00 00 - dc e2 90 7c ec ff b8 01  5\p........|....
0000000001b8ffb8  0b b5 80 7c 28 63 47 76 - 00 00 00 00 00 00 90 7c  ...|(cGv.......|
0000000001b8ffc8  28 63 47 76 00 d0 fa 7f - 00 26 eb 89 c0 ff b8 01  (cGv.....&......
0000000001b8ffd8  a8 fe d5 89 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  ...........|...|
0000000001b8ffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 8c 34 44 76  .............4Dv
0000000001b8fff8  28 63 47 76 00 00 00 00 - c8 00 00 00 6b 01 00 00  (cGv........k...
0000000001b90008  ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00  ................
0000000001b90018  00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00  ..... ....... ..
0000000001b90028  e8 01 00 00 ff ef fd 7f - 0c 00 08 06 00 00 00 00  ................
0000000001b90038  00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 b9 01  ................
0000000001b90048  0f 00 00 00 f8 ff ff ff - 50 00 b9 01 50 00 b9 01  ........P...P...
0000000001b90058  40 06 b9 01 00 00 00 00 - 00 00 00 00 00 00 00 00  @...............
0000000001b90068  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001b90078  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001b90088  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x1d590 <----*

eax=77e76bf0 ebx=00000000 ecx=0000000c edx=003c3750 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01cafe1c ebp=01caff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01caff80 77e76c22 01caffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01caff88 77e76a3b 000d0dc0 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5ea
01caffa8 77e76c0a 000d0c78 01caffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
01caffb4 7c80b50b 0190e658 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5d2
01caffec 00000000 77e76bf0 0190e658 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001cafe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff ca 01  ...|.g.w....p...
0000000001cafe2c  00 00 00 00 10 5a 90 01 - 4c ff ca 01 00 00 00 00  .....Z..L.......
0000000001cafe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe4c  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe6c  ea 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe8c  00 00 00 00 00 00 00 00 - d4 3b eb b5 40 19 56 80  .........;..@.V.
0000000001cafe9c  e1 a9 54 80 00 00 00 00 - f8 e9 c7 89 80 d8 c7 89  ..T.............
0000000001cafeac  00 00 00 00 00 00 00 00 - 00 00 00 00 e4 93 49 f7  ..............I.
0000000001cafebc  18 1e e3 89 02 00 00 00 - a8 1d e3 89 a8 1d e3 89  ................
0000000001cafecc  c0 3b eb b5 1f 41 4e 80 - c8 e9 bb 89 98 ed 3e 88  .;...AN.......>.
0000000001cafedc  06 02 00 00 9d b7 4d 80 - 02 00 00 00 52 41 4e 80  ......M.....RAN.
0000000001cafeec  98 ed 3e 88 00 00 00 00 - f4 3b eb b5 5b 89 4a f7  ..>......;..[.J.
0000000001cafefc  dc 93 49 f7 a0 ed 3e 88 - f8 e9 c7 89 80 d8 c7 89  ..I...>.........
0000000001caff0c  78 5a 97 b9 7a 89 4a f7 - bc 31 b7 85 24 3c eb b5  xZ..z.J..1..$<..
0000000001caff1c  b2 c2 4d 80 ba c2 4d 80 - 8c 31 b7 85 20 30 b7 85  ..M...M..1.. 0..
0000000001caff2c  54 30 b7 85 80 ff ca 01 - 99 66 e7 77 4c ff ca 01  T0.......f.wL...
0000000001caff3c  a9 66 e7 77 ed 10 90 7c - f0 23 90 01 58 e6 90 01  .f.w...|.#..X...
0000000001caff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x1d634 <----*

eax=77e76bf0 ebx=00000000 ecx=00090178 edx=00090000 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01e3fe1c ebp=01e3ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01e3ff80 77e76c22 01e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01e3ff88 77e76a3b 000d0dc0 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5ea
01e3ffa8 77e76c0a 000d0c78 01e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
01e3ffb4 7c80b50b 001313c8 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5d2
01e3ffec 00000000 77e76bf0 001313c8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001e3fe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 01  ...|.g.w....p...
0000000001e3fe2c  00 00 00 00 c8 00 92 01 - 54 ff e3 01 00 00 00 00  ........T.......
0000000001e3fe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3feac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3febc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fecc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3feec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fefc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 01  ................
0000000001e3ff0c  00 00 00 01 00 00 00 01 - bc 51 b0 85 24 dc ff b7  .........Q..$...
0000000001e3ff1c  b2 c2 4d 80 ba c2 4d 80 - 8c 51 b0 85 20 50 b0 85  ..M...M..Q.. P..
0000000001e3ff2c  54 50 b0 85 80 ff e3 01 - 99 66 e7 77 4c ff e3 01  TP.......f.wL...
0000000001e3ff3c  a9 66 e7 77 ed 10 90 7c - f0 04 13 00 c8 13 13 00  .f.w...|........
0000000001e3ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x1d684 <----*

eax=00000004 ebx=000003b8 ecx=002826a0 edx=7f6f0801 esi=0000004a edi=01f6f45c
eip=7c90eb94 esp=01f6f3b8 ebp=01f6f3f4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\stobject.dll -
ChildEBP RetAddr  Args to Child              
01f6f3f4 77d4e4ab 00020078 0000004a 00120520 ntdll!KiFastSystemCallRet
01f6f41c 7ca21c37 00020078 0000004a 00120520 USER32!SendMessageTimeoutW+0x21
01f6f828 7645476d 00000001 01f6f83c 01f6fc84 SHELL32!Shell_NotifyIconW+0x12d
01f6fbf8 76454c4a 00000000 000000be 01f6fc1c NETSHELL!NetSetupSetProgressCallback+0x2a402
01f6fc08 7640f555 00120520 00000000 000000be NETSHELL!NetSetupSetProgressCallback+0x2a8df
01f6fc1c 77d48734 00120520 00000405 00000000 NETSHELL!NormalizeExtendedStatus+0x3bb6
01f6fc48 77d48816 76401b9f 00120520 00000405 USER32!GetDC+0x6d
01f6fcb0 77d489cd 00136120 76401b9f 00120520 USER32!GetDC+0x14f
01f6fd10 77d48a10 01f6fd68 00000000 01f6fd8c USER32!GetWindowLongW+0x127
01f6fd20 7628155a 01f6fd68 00000000 76280000 USER32!DispatchMessageW+0xf
01f6fd8c 76283746 76280000 00000000 00040338 stobject+0x155a
01f6ffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0x1fa4
01f6ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001f6f3b8  be 94 d4 77 73 e4 d4 77 - 78 00 02 00 4a 00 00 00  ...ws..wx...J...
0000000001f6f3c8  20 05 12 00 48 f4 f6 01 - e4 f3 f6 01 b2 02 00 00   ...H...........
0000000001f6f3d8  00 00 00 00 f4 fb f6 01 - 01 00 00 00 03 00 00 00  ................
0000000001f6f3e8  a0 0f 00 00 00 00 00 00 - 00 00 00 00 1c f4 f6 01  ................
0000000001f6f3f8  ab e4 d4 77 78 00 02 00 - 4a 00 00 00 20 05 12 00  ...wx...J... ...
0000000001f6f408  48 f4 f6 01 03 00 00 00 - a0 0f 00 00 5c f4 f6 01  H...........\...
0000000001f6f418  00 00 00 00 28 f8 f6 01 - 37 1c a2 7c 78 00 02 00  ....(...7..|x...
0000000001f6f428  4a 00 00 00 20 05 12 00 - 48 f4 f6 01 03 00 00 00  J... ...H.......
0000000001f6f438  a0 0f 00 00 5c f4 f6 01 - 9f 1b 40 76 00 00 00 00  ....\.....@v....
0000000001f6f448  01 00 00 00 c0 03 00 00 - 64 f4 f6 01 3c f8 f6 01  ........d...<...
0000000001f6f458  78 00 02 00 00 00 00 00 - 3f 00 00 00 23 34 75 34  x.......?...#4u4
0000000001f6f468  01 00 00 00 b8 03 00 00 - 20 05 12 00 00 00 00 00  ........ .......
0000000001f6f478  0a 00 00 00 00 00 00 00 - 3d 07 6a 00 00 00 00 00  ........=.j.....
0000000001f6f488  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f6f498  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f6f4a8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f6f4b8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f6f4c8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f6f4d8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f6f4e8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

DrWatson is not useful for Blue screen problem. Attach the minidump at the webspace.
Avatar of dan5460

ASKER

Thanks,

My original message indicates the location of my minidump post.  Here it is
I posted my minidump and a current profile of my system on the following url.  
http://www.dvalen.com/mini_dumps_files.htm


Thanks
Avatar of dan5460

ASKER

Hello,

I am not sure what to do at this point.  Test all RAMS both with MEMTEST, DLDiag, and 3Dmark.  Changed the video card.  I really don't want to re-install windows again.  

Any other suggestions.

THanks

Danny
Avatar of dan5460

ASKER

Hello,
Here is an update. I downloaded the latest version of memtest and ran it and got several errors, that it could not write to certain memory ranges.  
 I made some adjustment to my Bios and swtich some setting to were it indicate that it would create a more stable system.  I made some adjustment o the AGP section and DRAM section.  at this moment I forgot what I adjusted. I ran the memtest again and got no error.  I actually ran it overnight.  

So far no blue screen.  I am not sure how else to test it or re-create the BSOD and make sure I don't get it again.  when I get home later today, I am going to try google earth, because I know that last time I got the BSOD when using the app.

Let me know if you have any suggestions.

Thanks

Danny
well, if you got errors with memtest, i would test the sticks 1 at the time, and check the good (or bad ones)
i would not use a reported bad memory stick again, unless extensive tests show no problem.
You can ruin your files on disk when using bad ram.
Avatar of dan5460

ASKER

Ok, but I re-ran the test again after making some changes in my bios and did not get any error message in memtest.  What would that mean?  Why did I not get the error message again?

Thanks

Do you downclock the ram?
>>   but I re-ran the test again   << for how long? min  i should run 3 passes
Avatar of dan5460

ASKER

Hi,
I would have to check if I downclock the ram, but I really doubt it.

Nobus, - I re-ran the test for about 10 hours overnight and not a single error.  

Let me know what you think.  I would I not get the error now?

Danny
ASKER CERTIFIED SOLUTION
Avatar of nobus
nobus
Flag of Belgium image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of dan5460

ASKER

Thanks,
I applied the changes based on the manual I have, but since I am here at work, I can't remember what changes I made.  When I was making the changes, I obviously knew what changes I was making.  All I can remember right now is I disable something for the AGP.  I also now remembering that I changed the RAM to be used for AGP from 256mb to 128mb.  

Thanks
Danny
Avatar of dan5460

ASKER

I have not had a BSOD in a week.  I believe the changes that I made in the Bios helped.  I will post the changes I made when I get home

Thanks all
Danny
I am the first person to  identify the problem is related to ram (underclock the ram) or video ram. Why I don't get any points ??