BSoD during heavy system load


  1. Posts : 4
    Windows 7 Home Premium x64
       #1

    BSoD during heavy system load


    Is Windows 7 . . .

    - x86 (32-bit) or x64 ?
    x64
    - the original installed OS on the system?
    Win 7
    - an OEM or full retail version?
    OEM
    - What is the age of system (hardware)?
    2 months old (parts bought separately)
    - What is the age of OS installation (have you re-installed the OS?)
    2 months old, no re-install


    The BSoD appears every now and then after a while of playing games or watching high quality movies and streams. So far it has only happend when im playing online. For example: off-line Starcraft 2 is no problem, but when in online multiplayer it crashes about every second time. Heavy youtube watching also seems to cause it.
    The first time it happend was august 19th. Before this there was no problems, except an harddisk error report on the day of system install.

    Thanks in advance
    MAT
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Welcome to the forum, Mat. Sorry you are having problems. Hopefully, we can turn that around.

    I looked at the tree most recent dumps. All are error code 7F, UNEXPECTED_KERNEL_MODE_TRAP. Usual causes are memory corruption, Hardware (memory in particular), Installing a faulty or mismatched hardware (especially memory) or a failure after installing it, 3rd party firewall, Device drivers, SCSI/network/BIOS updates needed, Improperly seated cards, Incompatible storage devices, Overclocking, Virus scanner, Backup tool, Bad motherboard, Missing Service Pack.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp2_Documents.zip\Windows_NT6_BSOD_jcgriff2\083010-17609-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c05000 PsLoadedModuleList = 0xfffff800`02e42e50
    Debug session time: Mon Aug 30 16:19:08.909 2010 (GMT-4)
    System Uptime: 0 days 0:04:31.049
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002c3dec8}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002c3dec8
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002c74ca9 to fffff80002c75740
    
    STACK_TEXT:  
    fffff880`009b8de8 fffff800`02c74ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`009b8df0 fffff800`02c73172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009b8f30 fffff800`02c3dec8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0785af90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02c73172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp2_Documents.zip\Windows_NT6_BSOD_jcgriff2\082910-20328-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c62000 PsLoadedModuleList = 0xfffff800`02e9fe50
    Debug session time: Sun Aug 29 10:53:05.175 2010 (GMT-4)
    System Uptime: 0 days 1:20:46.813
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002c9aec8}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002c9aec8
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002cd1ca9 to fffff80002cd2740
    
    STACK_TEXT:  
    fffff880`02f6ade8 fffff800`02cd1ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02f6adf0 fffff800`02cd0172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02f6af30 fffff800`02c9aec8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0384c000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02cd0172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp2_Documents.zip\Windows_NT6_BSOD_jcgriff2\082810-21234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c51000 PsLoadedModuleList = 0xfffff800`02e8ee50
    Debug session time: Sat Aug 28 09:20:54.033 2010 (GMT-4)
    System Uptime: 0 days 3:26:11.173
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002c9cb9f}
    
    Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002c9cb9f
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002cc0ca9 to fffff80002cc1740
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02cc0ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02cbf172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff800`02c9cb9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0a344ff0 fffff800`02c89dc4 : fffff880`0a3450d0 fffffa80`065f07c8 ff000000`ff000000 ff000000`ff000000 : nt!RtlSidHashInitialize+0x2f
    fffff880`0a345020 fffff800`02c89f07 : fffffa80`065f07c8 00000000`00000001 ff000000`ff000000 ff000000`ff000000 : nt!SepTokenFromAccessInformation+0xbc
    fffff880`0a345050 fffff880`01606c5a : ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 : nt!SeAccessCheckFromState+0x9f
    fffff880`0a345740 fffff880`0160494f : ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 : NETIO!CompareSecurityContexts+0x6a
    fffff880`0a3457b0 fffff880`016069b5 : ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 ff000000`ff000000 : NETIO!MatchValues+0xef
    fffff880`0a345800 fffff880`01606845 : fffffa80`0829a150 fffffa80`08a9a510 fffff880`0a345a28 fffff880`0a346160 : NETIO!FilterMatch+0x95
    fffff880`0a345850 fffff880`01607ccb : 00000000`00000000 00000000`00000000 fffff880`0a346160 fffff880`0a345a10 : NETIO!IndexListClassify+0x69
    fffff880`0a3458d0 fffff880`01840417 : fffff880`0a345da8 fffff880`0a345da8 fffff880`0a346ae0 fffffa80`05fac030 : NETIO!KfdClassify+0xa4e
    fffff880`0a345c40 fffff880`0183983e : fffff880`01948690 00000000`00000000 fffffa80`0828bbf0 00000000`00000000 : tcpip!WfpAleClassify+0x57
    fffff880`0a345c80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!CompareSecurityContexts+6a
    fffff880`01606c5a 448b442470      mov     r8d,dword ptr [rsp+70h]
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
    
    BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start             end                 module name
    fffff880`04386000 fffff880`043c4000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`0119e000 fffff880`011f5000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02d4e000 fffff880`02dd8000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`043dd000 fffff880`043f3000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`08fb9000 fffff880`08fc4000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00ff0000 fffff880`00ff9000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00810000 fffff960`00871000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`04289000 fffff880`042d0000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
    fffff880`0403e000 fffff880`04045080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
    fffff880`02cb8000 fffff880`02d09000   avgtdia  avgtdia.sys  Thu Jun 03 17:09:57 2010 (4C081A25)
    fffff880`0423f000 fffff880`04284000   azgduico azgduico.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
    fffff880`016f8000 fffff880`016ff000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0402d000 fffff880`0403e000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02800000 fffff880`0281e000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`007c0000 fffff960`007e7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`00dca000 fffff880`00df4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d0a000 fffff880`00dca000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cac000 fffff880`00d0a000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`014d3000 fffff880`01546000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`043cd000 fffff880`043dd000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02885000 fffff880`02893000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0400f000 fffff880`0402d000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`04000000 fffff880`0400f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`048ac000 fffff880`048ce000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0289f000 fffff880`028a8000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`02893000 fffff880`0289f000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`028a8000 fffff880`028bb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05e00000 fffff880`05e0c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`10aee000 fffff880`10be2000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`0fe00000 fffff880`0fe46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`00e35000 fffff880`00e49000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00c00000 fffff880`00c4c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01557000 fffff880`01561000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02c08000 fffff800`02c51000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04362000 fffff880`04386000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`049e6000 fffff880`049ff000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`041f3000 fffff880`041fb080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`048dc000 fffff880`048ea000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0292c000 fffff880`029f4000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`016ef000 fffff880`016f8000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`042f6000 fffff880`0430c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00fb6000 fffff880`00fd6000   jraid    jraid.sys    Thu Oct 29 04:14:20 2009 (4AE94EDC)
    fffff880`04971000 fffff880`04980000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02de5000 fffff880`02df3000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bb6000 fffff800`00bc0000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04991000 fffff880`049d4000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`014b9000 fffff880`014d3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05ff3000 fffff880`05ff8200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`028ff000 fffff880`02914000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`028bb000 fffff880`028de000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c54000 fffff880`00c98000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`048ce000 fffff880`048dc000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04980000 fffff880`0498f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02dd8000 fffff880`02de5000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fd6000 fffff880`00ff0000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`015e7000 fffff880`015ff000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`07c26000 fffff880`07c53000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`07c53000 fffff880`07ca1000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`07ca1000 fffff880`07cc4000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`02c71000 fffff880`02c7c000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`011f5000 fffff880`011ff000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0145b000 fffff880`014b9000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`041e8000 fffff880`041f3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`016dd000 fffff880`016ef000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`016ff000 fffff880`017f1000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`043f3000 fffff880`043ff000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`048ec000 fffff880`0491b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0485a000 fffff880`0486f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`04130000 fffff880`0413f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d09000 fffff880`02d4e000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`02c7c000 fffff880`02c8d000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`041dc000 fffff880`041e8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c51000 fffff800`0322d000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01254000 fffff880`013f7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01450000 fffff880`01459000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`10aec000 fffff880`10aed180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
    fffff880`0fe5a000 fffff880`10aebe00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
    fffff880`0410a000 fffff880`04130000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f19000 fffff880`00f2e000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`0100d000 fffff880`01040000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00f9f000 fffff880`00fa6000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fa6000 fffff880`00fb6000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01546000 fffff880`01557000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`07cc4000 fffff880`07d6a000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0486f000 fffff880`048ac000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c98000 fffff880`00cac000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`00e49000 fffff880`00e54e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
    fffff880`04046000 fffff880`0406a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0491b000 fffff880`04936000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04936000 fffff880`04957000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04957000 fffff880`04971000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0418b000 fffff880`041dc000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02c56000 fffff880`02c5f000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02c5f000 fffff880`02c68000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02c68000 fffff880`02c71000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015ad000 fffff880`015e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02914000 fffff880`0292c000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04200000 fffff880`0423f000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
    fffff880`05e10000 fffff880`05ff2900   RTKVHD64 RTKVHD64.sys Tue Aug 18 05:29:10 2009 (4A8A7466)
    fffff880`0116f000 fffff880`0119e000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`07d6a000 fffff880`07d75000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`10bf3000 fffff880`10bff000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0413f000 fffff880`0415c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`016d5000 fffff880`016dd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01040000 fffff880`01166000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
    fffff880`08eb2000 fffff880`08f48000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`08e4a000 fffff880`08eb2000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`07d75000 fffff880`07da2000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`0498f000 fffff880`04990480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`07da2000 fffff880`07db4000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`02cab000 fffff880`02cb8000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`02c8d000 fffff880`02cab000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`04177000 fffff880`0418b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`042d0000 fffff880`042f6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`02831000 fffff880`02885000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`049d4000 fffff880`049e6000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`02c00000 fffff880`02c1d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05e0c000 fffff880`05e0df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`10be2000 fffff880`10bf3000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04800000 fffff880`0485a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`0430c000 fffff880`04362000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0fe46000 fffff880`0fe53000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`01000000 fffff880`0100d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01243000 fffff880`01251000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`02c21000 fffff880`02c46000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00f2e000 fffff880`00f43000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f43000 fffff880`00f9f000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01561000 fffff880`015ad000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0406c000 fffff880`04101000   vsdatant vsdatant.sys Sun May 09 12:28:58 2010 (4BE6E2CA)
    fffff880`0415c000 fffff880`04177000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`02c46000 fffff880`02c56000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e66000 fffff880`00f0a000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f0a000 fffff880`00f19000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04101000 fffff880`0410a000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`0039f000   win32k   win32k.sys   unavailable (00000000)
    fffff880`043c4000 fffff880`043cd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`01166000 fffff880`0116f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`028de000 fffff880`028ff000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`08f48000 fffff880`08fb9000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`017f1000 fffff880`017ff000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`015e7000 fffff880`015f3000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`015f3000 fffff880`015fc000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01230000 fffff880`01243000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    The first dump blames netio.sys which is likely not the real cause. It is a Microsoft systm driver. The other two dumps blame Microsoft core system drivers, also very unlikely to be cause.

    Let start the trouble shooting by uninstalling Zone Alarm. ZA is a know cause of BSOD's on many Win 7 systems. Use this uninstall tool: http://download.zonealarm.com/bin/fr...cpes_clean.exe Turn on Windows Firewall in its place.

    I also suggest you uninstall AVG antivirus, which is also know to cause BSOD's on some Win 7 systems. Download and install Microsoft Security Essentials in its place. You will note in the usual causes, antivirus scanner is mentioned.

    I found an older driver on your system. Older drivers can cause conflicts and crashes with Win7.

    PxHlpa64.sys Tue Jun 23 19:16:35 2009 - Sonic CD/DVD driver (used by many different CD/DVD programs). There may not be an update for this driver. Go to C:\Windows\System32\drivers and rename PxHlpa64.sys to PxHlpa64.BAK
    This will break your CD/DVD program, but can easily be renamed after we've finished trouble shooting. Or you can uninstall the software.

    Reboot after you have uninstalled ZA and AVG, and taken care of the driver. Let you system run and see what happens. If you get another BSOD, upload it. If not let us know after two or three days. Good luck!
    Last edited by CarlTR6; 30 Aug 2010 at 17:33.
      My Computer


  3. Posts : 4
    Windows 7 Home Premium x64
    Thread Starter
       #3

    Thank you for a quick reply
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    You are welcome. I have updated my post. Refresh this page.
      My Computer


  5. Posts : 4
    Windows 7 Home Premium x64
    Thread Starter
       #5

    Thank you very much, i'll try it!
      My Computer


  6. Posts : 4
    Windows 7 Home Premium x64
    Thread Starter
       #6

    att: Carl S
    Hi, my comp has been running smooth for 6 days now! Thank you very much, i guess it was software related.
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #7

    That is great news! I am glad we were able to help. Thank you for reporting back and letting us know. If you have another problem, please post back. I will ask the moderators to mark this thread as solved. Happy computing.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 18:46.
Find Us