Welcome to the forum, Mat. Sorry you are having problems. Hopefully, we can turn that around.
I looked at the tree most recent dumps. All are error code 7F, UNEXPECTED_KERNEL_MODE_TRAP. Usual causes are memory corruption, Hardware (memory in particular), Installing a faulty or mismatched hardware (especially memory) or a failure after installing it, 3rd party firewall, Device drivers, SCSI/network/BIOS updates needed, Improperly seated cards, Incompatible storage devices, Overclocking, Virus scanner, Backup tool, Bad motherboard, Missing Service Pack.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp2_Documents.zip\Windows_NT6_BSOD_jcgriff2\083010-17609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50
Debug session time: Mon Aug 30 16:19:08.909 2010 (GMT-4)
System Uptime: 0 days 0:04:31.049
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 6f8, fffff80002c3dec8}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002c3dec8
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c74ca9 to fffff80002c75740
STACK_TEXT:
fffff880`009b8de8 fffff800`02c74ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009b8df0 fffff800`02c73172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009b8f30 fffff800`02c3dec8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0785af90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02c73172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp2_Documents.zip\Windows_NT6_BSOD_jcgriff2\082910-20328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c62000 PsLoadedModuleList = 0xfffff800`02e9fe50
Debug session time: Sun Aug 29 10:53:05.175 2010 (GMT-4)
System Uptime: 0 days 1:20:46.813
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 6f8, fffff80002c9aec8}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002c9aec8
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cd1ca9 to fffff80002cd2740
STACK_TEXT:
fffff880`02f6ade8 fffff800`02cd1ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02f6adf0 fffff800`02cd0172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f6af30 fffff800`02c9aec8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0384c000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02cd0172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp2_Documents.zip\Windows_NT6_BSOD_jcgriff2\082810-21234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c51000 PsLoadedModuleList = 0xfffff800`02e8ee50
Debug session time: Sat Aug 28 09:20:54.033 2010 (GMT-4)
System Uptime: 0 days 3:26:11.173
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 6f8, fffff80002c9cb9f}
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002c9cb9f
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cc0ca9 to fffff80002cc1740
STACK_TEXT:
fffff800`00ba4d28 fffff800`02cc0ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02cbf172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02c9cb9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0a344ff0 fffff800`02c89dc4 : fffff880`0a3450d0 fffffa80`065f07c8 ff000000`ff000000 ff000000`ff000000 : nt!RtlSidHashInitialize+0x2f
fffff880`0a345020 fffff800`02c89f07 : fffffa80`065f07c8 00000000`00000001 ff000000`ff000000 ff000000`ff000000 : nt!SepTokenFromAccessInformation+0xbc
fffff880`0a345050 fffff880`01606c5a : ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 : nt!SeAccessCheckFromState+0x9f
fffff880`0a345740 fffff880`0160494f : ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0a3457b0 fffff880`016069b5 : ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 : NETIO!MatchValues+0xef
fffff880`0a345800 fffff880`01606845 : fffffa80`0829a150 fffffa80`08a9a510 fffff880`0a345a28 fffff880`0a346160 : NETIO!FilterMatch+0x95
fffff880`0a345850 fffff880`01607ccb : 00000000`00000000 00000000`00000000 fffff880`0a346160 fffff880`0a345a10 : NETIO!IndexListClassify+0x69
fffff880`0a3458d0 fffff880`01840417 : fffff880`0a345da8 fffff880`0a345da8 fffff880`0a346ae0 fffffa80`05fac030 : NETIO!KfdClassify+0xa4e
fffff880`0a345c40 fffff880`0183983e : fffff880`01948690 00000000`00000000 fffffa80`0828bbf0 00000000`00000000 : tcpip!WfpAleClassify+0x57
fffff880`0a345c80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01606c5a 448b442470 mov r8d,dword ptr [rsp+70h]
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: NETIO!CompareSecurityContexts+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f
FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a
BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a
Followup: MachineOwner
---------
0: kd> lmtsmn
start end module name
fffff880`04386000 fffff880`043c4000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`0119e000 fffff880`011f5000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02d4e000 fffff880`02dd8000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043dd000 fffff880`043f3000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`08fb9000 fffff880`08fc4000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00ff0000 fffff880`00ff9000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00810000 fffff960`00871000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`04289000 fffff880`042d0000 avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
fffff880`0403e000 fffff880`04045080 avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
fffff880`02cb8000 fffff880`02d09000 avgtdia avgtdia.sys Thu Jun 03 17:09:57 2010 (4C081A25)
fffff880`0423f000 fffff880`04284000 azgduico azgduico.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`016f8000 fffff880`016ff000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0402d000 fffff880`0403e000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02800000 fffff880`0281e000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007c0000 fffff960`007e7000 cdd cdd.dll unavailable (00000000)
fffff880`00dca000 fffff880`00df4000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d0a000 fffff880`00dca000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cac000 fffff880`00d0a000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014d3000 fffff880`01546000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043cd000 fffff880`043dd000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02885000 fffff880`02893000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0400f000 fffff880`0402d000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04000000 fffff880`0400f000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`048ac000 fffff880`048ce000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0289f000 fffff880`028a8000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02893000 fffff880`0289f000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`028a8000 fffff880`028bb000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05e00000 fffff880`05e0c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10aee000 fffff880`10be2000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0fe00000 fffff880`0fe46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00e35000 fffff880`00e49000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c00000 fffff880`00c4c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01557000 fffff880`01561000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0168b000 fffff880`016d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c08000 fffff800`02c51000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04362000 fffff880`04386000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`049e6000 fffff880`049ff000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`041f3000 fffff880`041fb080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`048dc000 fffff880`048ea000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0292c000 fffff880`029f4000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`016ef000 fffff880`016f8000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`042f6000 fffff880`0430c000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00fb6000 fffff880`00fd6000 jraid jraid.sys Thu Oct 29 04:14:20 2009 (4AE94EDC)
fffff880`04971000 fffff880`04980000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02de5000 fffff880`02df3000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb6000 fffff800`00bc0000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04991000 fffff880`049d4000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`014b9000 fffff880`014d3000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05ff3000 fffff880`05ff8200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`028ff000 fffff880`02914000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`028bb000 fffff880`028de000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c54000 fffff880`00c98000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`048ce000 fffff880`048dc000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04980000 fffff880`0498f000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02dd8000 fffff880`02de5000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd6000 fffff880`00ff0000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`015e7000 fffff880`015ff000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07c26000 fffff880`07c53000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07c53000 fffff880`07ca1000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07ca1000 fffff880`07cc4000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02c71000 fffff880`02c7c000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011f5000 fffff880`011ff000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0145b000 fffff880`014b9000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`041e8000 fffff880`041f3000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`016dd000 fffff880`016ef000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016ff000 fffff880`017f1000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043f3000 fffff880`043ff000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`048ec000 fffff880`0491b000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0485a000 fffff880`0486f000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04130000 fffff880`0413f000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d09000 fffff880`02d4e000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`02c7c000 fffff880`02c8d000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`041dc000 fffff880`041e8000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c51000 fffff800`0322d000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01254000 fffff880`013f7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01450000 fffff880`01459000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10aec000 fffff880`10aed180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe5a000 fffff880`10aebe00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`0410a000 fffff880`04130000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f19000 fffff880`00f2e000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`0100d000 fffff880`01040000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f9f000 fffff880`00fa6000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fa6000 fffff880`00fb6000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01546000 fffff880`01557000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`07cc4000 fffff880`07d6a000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0486f000 fffff880`048ac000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c98000 fffff880`00cac000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00e49000 fffff880`00e54e00 PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`04046000 fffff880`0406a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0491b000 fffff880`04936000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04936000 fffff880`04957000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04957000 fffff880`04971000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0418b000 fffff880`041dc000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02c56000 fffff880`02c5f000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c5f000 fffff880`02c68000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c68000 fffff880`02c71000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015ad000 fffff880`015e7000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02914000 fffff880`0292c000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04200000 fffff880`0423f000 Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`05e10000 fffff880`05ff2900 RTKVHD64 RTKVHD64.sys Tue Aug 18 05:29:10 2009 (4A8A7466)
fffff880`0116f000 fffff880`0119e000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`07d6a000 fffff880`07d75000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`10bf3000 fffff880`10bff000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0413f000 fffff880`0415c000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`016d5000 fffff880`016dd000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01040000 fffff880`01166000 sptd sptd.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`08eb2000 fffff880`08f48000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`08e4a000 fffff880`08eb2000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`07d75000 fffff880`07da2000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`0498f000 fffff880`04990480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`07da2000 fffff880`07db4000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02cab000 fffff880`02cb8000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c8d000 fffff880`02cab000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`04177000 fffff880`0418b000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004b0000 fffff960`004ba000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`042d0000 fffff880`042f6000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`02831000 fffff880`02885000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`049d4000 fffff880`049e6000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`02c00000 fffff880`02c1d000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05e0c000 fffff880`05e0df00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`10be2000 fffff880`10bf3000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04800000 fffff880`0485a000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0430c000 fffff880`04362000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0fe46000 fffff880`0fe53000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01000000 fffff880`0100d000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01243000 fffff880`01251000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02c21000 fffff880`02c46000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f2e000 fffff880`00f43000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f43000 fffff880`00f9f000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01561000 fffff880`015ad000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0406c000 fffff880`04101000 vsdatant vsdatant.sys Sun May 09 12:28:58 2010 (4BE6E2CA)
fffff880`0415c000 fffff880`04177000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c46000 fffff880`02c56000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e66000 fffff880`00f0a000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f0a000 fffff880`00f19000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04101000 fffff880`0410a000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`0039f000 win32k win32k.sys unavailable (00000000)
fffff880`043c4000 fffff880`043cd000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`01166000 fffff880`0116f000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`028de000 fffff880`028ff000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`08f48000 fffff880`08fb9000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`017f1000 fffff880`017ff000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`015e7000 fffff880`015f3000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`015f3000 fffff880`015fc000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01230000 fffff880`01243000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
The first dump blames netio.sys which is likely not the real cause. It is a Microsoft systm driver. The other two dumps blame Microsoft core system drivers, also very unlikely to be cause.
Let start the trouble shooting by uninstalling Zone Alarm. ZA is a know cause of BSOD's on many Win 7 systems. Use this uninstall tool: http://download.zonealarm.com/bin/fr...cpes_clean.exe Turn on Windows Firewall in its place.
I also suggest you uninstall AVG antivirus, which is also know to cause BSOD's on some Win 7 systems. Download and install Microsoft Security Essentials in its place. You will note in the usual causes, antivirus scanner is mentioned.
I found an older driver on your system. Older drivers can cause conflicts and crashes with Win7.
PxHlpa64.sys Tue Jun 23 19:16:35 2009 - Sonic CD/DVD driver (used by many different CD/DVD programs). There may not be an update for this driver. Go to C:\Windows\System32\drivers and rename PxHlpa64.sys to PxHlpa64.BAK
This will break your CD/DVD program, but can easily be renamed after we've finished trouble shooting. Or you can uninstall the software.
Reboot after you have uninstalled ZA and AVG, and taken care of the driver. Let you system run and see what happens. If you get another BSOD, upload it. If not let us know after two or three days. Good luck!