Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Help! Random shutdown/reboot with and without BSOD!


12 Oct 2010   #1

Windows 7 Home Premium 64bit
 
 
Help! Random shutdown/reboot with and without BSOD!

My computer has been crashing and its getting to a point where its more than bearable. The system has recorded 40+ critical errors in the past week alone. Sometimes there are bluescreens but more often then not, it just reboots without an error message. The crashes are particularly pronounced during sessions of video intensive use - watching movies and playing games. However, I have also had it reboot on me without an error in Word. Below are some information on the system:

CPU: Intel i5
RAM: 8 GIGS
VIDEO: Geforece GT 220
OS: Windows Home Premium 64bit
Age: 6 months

Hardware came back within normal parameters in stress tests and drivers seem to be updated. I am at my wits end and would really appreciate it if someone could help me identify the culprit. Thanks!

My System SpecsSystem Spec
.

12 Oct 2010   #2

Windows 7 x64
 
 

1. Replace AVG with MSE:

AVG Worldwide - Download tools

http://www.microsoft.com/security_essentials/



2. Update:


ElRawDsk.sys Sat Jul 26 20:59:09 2008
RawDisk EldoS Corporation

speedfan.sys Sun Sep 24 16:26:48 2006
Speedfan

k57nd60a.sys Thu Aug 06 14:44:32 2009
Broadcom NetLink (TM) Gigabit Ethernet

RTKVHD64.sys Tue Aug 18 12:29:10 2009
Realtek High Definition Audio

athrx.sys Sat Oct 24 04:49:44 2009
Atheros CB42/CB43/MB42/MB43 Wireless LAN

HECIx64.sys Thu Sep 17 22:54:16 2009
Intel Management Engine



3. If crashes persist, attach the latest .dmp's and also do the memory test:

RAM - Test with Memtest86+




Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101010-20139-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034a2e50
Debug session time: Sun Oct 10 13:09:12.319 2010 (GMT-5)
System Uptime: 0 days 1:49:06.880
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff800032d36d0}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800032d36d0

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  war3.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88008b6bed0 -- (.trap 0xfffff88008b6bed0)
Unable to read trap frame at fffff880`08b6bed0

LAST_CONTROL_TRANSFER:  from fffff800032d4ca9 to fffff800032d5740

STACK_TEXT:  
fffff880`02f6ace8 fffff800`032d4ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02f6acf0 fffff800`032d3172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f6ae30 fffff800`032d36d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`08b6bed0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`032d3172 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-23696-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0324e000 PsLoadedModuleList = 0xfffff800`0348be50
Debug session time: Tue Oct 12 03:06:18.145 2010 (GMT-5)
System Uptime: 0 days 0:19:44.706
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff800032ffa93, 0, ffffffffffffffff}

Probably caused by : memory_corruption ( nt!MiGetProtoPteAddressExtended+17 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800032ffa93, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiGetProtoPteAddressExtended+17
fffff800`032ffa93 4d8b4808        mov     r9,qword ptr [r8+8]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034f60e0
 ffffffffffffffff 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  war3.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88007834828 -- (.exr 0xfffff88007834828)
ExceptionAddress: fffff800032ffa93 (nt!MiGetProtoPteAddressExtended+0x0000000000000017)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff880078348d0 -- (.trap 0xfffff880078348d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007304290
rdx=000000000001140f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032ffa93 rsp=fffff88007834a60 rbp=fffff88007834b40
 r8=41d98b48c9334500  r9=ab4217058b4820ec r10=fffffa8007304290
r11=ff04000a00000017 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiGetProtoPteAddressExtended+0x17:
fffff800`032ffa93 4d8b4808        mov     r9,qword ptr [r8+8] ds:dc30:41d98b48`c9334508=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032f8a39 to fffff800032be740

STACK_TEXT:  
fffff880`07834058 fffff800`032f8a39 : 00000000`0000001e ffffffff`c0000005 fffff800`032ffa93 00000000`00000000 : nt!KeBugCheckEx
fffff880`07834060 fffff800`032bdd82 : fffff880`07834828 fffffa80`07304290 fffff880`078348d0 fffff880`07834bb8 : nt!KiDispatchException+0x1b9
fffff880`078346f0 fffff800`032bc68a : 3e80fffc`3f007ffe 3ebf0004`3f007ffe 45680000`c5f00000 c5f00000`44a00000 : nt!KiExceptionDispatch+0xc2
fffff880`078348d0 fffff800`032ffa93 : fffff900`000000a6 fffff960`001b9893 fffff900`c073dc30 fffff800`033fcdd0 : nt!KiGeneralProtectionFault+0x10a
fffff880`07834a60 fffff800`032db291 : fffffa80`07304290 fffffa80`06fffb60 00000000`1140ffc0 00000000`00000000 : nt!MiGetProtoPteAddressExtended+0x17
fffff880`07834a90 fffff800`032d9094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000000a6 : nt!MiCheckVirtualAddress+0x231
fffff880`07834ac0 fffff800`032bc82e : 00000000`00000000 00000000`1140ffc0 00000000`00000001 fffffa80`073e01b0 : nt!MmAccessFault+0xc94
fffff880`07834c20 00000000`6f531056 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0018f97c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6f531056


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiGetProtoPteAddressExtended+17
fffff800`032ffa93 4d8b4808        mov     r9,qword ptr [r8+8]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!MiGetProtoPteAddressExtended+17

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1E_nt!MiGetProtoPteAddressExtended+17

BUCKET_ID:  X64_0x1E_nt!MiGetProtoPteAddressExtended+17

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101210-22791-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50
Debug session time: Tue Oct 12 09:30:01.979 2010 (GMT-5)
System Uptime: 0 days 1:30:39.540
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff80003286e7f}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80003286e7f

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  war3.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80003288ca9 to fffff80003289740

STACK_TEXT:  
fffff800`00ba4d28 fffff800`03288ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`03287172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`03286e7f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`077fefe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0xbf


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`03287172 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------

0: kd> lmtn
start             end                 module name
fffff800`00bad000 fffff800`00bb7000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`03219000 fffff800`037f5000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`037f5000 fffff800`0383e000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00c1a000 fffff880`00c23000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00c23000 fffff880`00c4d000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00c4d000 fffff880`00c58000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00c72000 fffff880`00cb6000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00cb6000 fffff880`00cca000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cca000 fffff880`00d28000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d28000 fffff880`00de8000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e78000 fffff880`00e88000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00e8b000 fffff880`00f2f000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f2f000 fffff880`00f3e000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f3e000 fffff880`00f95000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f95000 fffff880`00f9e000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f9e000 fffff880`00fa8000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fa8000 fffff880`00fdb000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fdb000 fffff880`00fe8000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00fe8000 fffff880`00ffd000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`0103a000 fffff880`01074000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01074000 fffff880`010c0000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`010c0000 fffff880`010d4000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010d4000 fffff880`01132000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01132000 fffff880`011a5000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`011a5000 fffff880`011f1000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`0121b000 fffff880`01231000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01239000 fffff880`013dc000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013dc000 fffff880`013f6000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`014d5000 fffff880`014dd000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`014dd000 fffff880`014e4000   speedfan speedfan.sys Sun Sep 24 16:26:48 2006 (45168798)
fffff880`014e4000 fffff880`014ed000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`014f4000 fffff880`015e6000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`015e6000 fffff880`015f8000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`01809000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01809000 fffff880`01812000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01812000 fffff880`0181b000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0181b000 fffff880`01826000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01826000 fffff880`01837000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01837000 fffff880`01855000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`01855000 fffff880`01862000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01862000 fffff880`018c3000   avgtdia  avgtdia.sys  Tue Sep 07 03:52:11 2010 (4C858CBB)
fffff880`018c3000 fffff880`018e1000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`018f5000 fffff880`01925000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01925000 fffff880`0192f000   avgrkx64 avgrkx64.sys Tue Sep 07 03:49:37 2010 (4C858C21)
fffff880`0192f000 fffff880`01939000   AVGIDSEH AVGIDSEH.Sys Tue Sep 14 01:46:38 2010 (4C8EA9CE)
fffff880`01939000 fffff880`01956000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`01956000 fffff880`01969000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`0196f000 fffff880`01999000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`01999000 fffff880`019a8000   avgmfx64 avgmfx64.sys Tue Sep 07 03:49:14 2010 (4C858C0A)
fffff880`019a8000 fffff880`019b1000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`019b1000 fffff880`019b8000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`019b8000 fffff880`019c6000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`019c6000 fffff880`019eb000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`019eb000 fffff880`019fb000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02800000 fffff880`028a6000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`028b5000 fffff880`028d8000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`028d8000 fffff880`028f9000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`028f9000 fffff880`0290e000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0290e000 fffff880`02961000   nwifi    nwifi.sys    Tue Jul 14 03:07:23 2009 (4A5BCC3B)
fffff880`02961000 fffff880`02974000   ndisuio  ndisuio.sys  Tue Jul 14 03:09:25 2009 (4A5BCCB5)
fffff880`02974000 fffff880`0298c000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0298c000 fffff880`029b9000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`029b9000 fffff880`029ed000   AVGIDSDriver AVGIDSDriver.Sys Wed Aug 04 01:24:45 2010 (4C58972D)
fffff880`02c00000 fffff880`02c0c000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02c0c000 fffff880`02c1a000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`02c1c000 fffff880`02c61000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02c61000 fffff880`02ceb000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02ceb000 fffff880`02cf4000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02cf4000 fffff880`02d1a000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02d1a000 fffff880`02d30000   vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
fffff880`02d30000 fffff880`02d3f000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d3f000 fffff880`02d5a000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02d5a000 fffff880`02d6e000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`02d6e000 fffff880`02dbf000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`02dbf000 fffff880`02dcb000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`02dcb000 fffff880`02dd6000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`02dd6000 fffff880`02de0000   ElRawDsk ElRawDsk.sys Sat Jul 26 20:59:09 2008 (488B65ED)
fffff880`02de0000 fffff880`02def000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`02def000 fffff880`02e00000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03a00000 fffff880`03a22000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`03a22000 fffff880`03a7e000   HdAudio  HdAudio.sys  Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`03a7e000 fffff880`03a97000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`03a97000 fffff880`03ab2000   USBSTOR  USBSTOR.SYS  Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`03ab2000 fffff880`03abf000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`03abf000 fffff880`03acb000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`03acb000 fffff880`03ad9000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`03adb000 fffff880`03b2a000   avgldx64 avgldx64.sys Tue Sep 07 03:49:29 2010 (4C858C19)
fffff880`03b2a000 fffff880`03b50000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03b50000 fffff880`03b66000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03b66000 fffff880`03bc0000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`03bc0000 fffff880`03bfd000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`03c00000 fffff880`03c11000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`03c11000 fffff880`03c67000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`03c67000 fffff880`03c82000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`03c82000 fffff880`03c90000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`03c90000 fffff880`03d84000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`03d84000 fffff880`03dca000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`03dca000 fffff880`03dee000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`03dee000 fffff880`03dff000   HECIx64  HECIx64.sys  Thu Sep 17 22:54:16 2009 (4AB293E8)
fffff880`03e00000 fffff880`03e24000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03e24000 fffff880`03e30000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`03e30000 fffff880`03e31480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`03e32000 fffff880`03e37200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`03e39000 fffff880`03fb6000   athrx    athrx.sys    Sat Oct 24 04:49:44 2009 (4AE25D38)
fffff880`03fb6000 fffff880`03fc3000   vwifibus vwifibus.sys Tue Jul 14 03:07:21 2009 (4A5BCC39)
fffff880`03fc3000 fffff880`03fd0000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`03fd0000 fffff880`03fe0000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`03fe0000 fffff880`03ff6000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`03ff6000 fffff880`03fff000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04a00000 fffff880`04a0e000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`04a0e000 fffff880`04a16080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04a17000 fffff880`04a18f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04a1c000 fffff880`04bfe900   RTKVHD64 RTKVHD64.sys Tue Aug 18 12:29:10 2009 (4A8A7466)
fffff880`04e27000 fffff880`04eef000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`04eef000 fffff880`04f0d000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`04f0d000 fffff880`04f25000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`04f25000 fffff880`04f52000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`04f52000 fffff880`04fa0000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`04fa0000 fffff880`04fc3000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`04fc3000 fffff880`04fcf000   AVGIDSFilter AVGIDSFilter.Sys Wed Aug 04 01:23:21 2010 (4C5896D9)
fffff880`04fcf000 fffff880`04fda000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`04fda000 fffff880`04fec000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0540c000 fffff880`05474000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`05474000 fffff880`0550a000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`0550a000 fffff880`0553b000   WUDFRd   WUDFRd.sys   Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff880`0553b000 fffff880`05571000   fastfat  fastfat.SYS  Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`0fe00000 fffff880`0fe0f000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0fe0f000 fffff880`0fe52000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`0fe52000 fffff880`0fe64000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`0fe64000 fffff880`0fe79000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0fe79000 fffff880`0fe9c000   nvhda64v nvhda64v.sys Tue Jun 22 01:07:25 2010 (4C1FE29D)
fffff880`0fea2000 fffff880`10b33e00   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`10b34000 fffff880`10b35180   nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`10b36000 fffff880`10b87000   k57nd60a k57nd60a.sys Thu Aug 06 14:44:32 2009 (4A7AC220)
fffff880`10b87000 fffff880`10bb6000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`10bb6000 fffff880`10bd7000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`10bd7000 fffff880`10bf1000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`10bf1000 fffff880`10c00000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff960`000d0000 fffff960`003df000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00760000 fffff960`00787000   cdd      cdd.dll      Wed May 19 22:48:26 2010 (4BF4408A)

Unloaded modules:
fffff880`05571000 fffff880`055e2000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01939000 fffff880`01947000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01947000 fffff880`01953000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01953000 fffff880`0195c000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0195c000 fffff880`0196f000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
12 Oct 2010   #3

Windows 7 Home Premium 64bit
 
 

Cybercore,

Thank you for the quick response. I will go ahead and implement the above said changes then follow up. I hope this works!
My System SpecsSystem Spec
.


Reply

 Help! Random shutdown/reboot with and without BSOD!




Thread Tools



Similar help and support threads for2: Help! Random shutdown/reboot with and without BSOD!
Thread Forum
Random BSOD/reboot BSOD Help and Support
Solved BSOD, Random Reboot, ATHR.SYS BSOD Help and Support
Solved BSOD randomly during use/on shutdown/ reboot during memtest. >:( BSOD Help and Support
Shutdown, reboot, BSOD while Windows loads. Repeat. What is happening? BSOD Help and Support
Random BSOD and reboot BSOD Help and Support
Random reboot and BSOD BSOD Help and Support
Random shutdown w/ unsuccessful reboot BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 05:21 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33