Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD while playing game

28 Mar 2011   #1

Windows 7 Home Premium 64bit
 
 
BSOD while playing game

please help....documents attached....thanks a lot

My System SpecsSystem Spec
.

28 Mar 2011   #2

Windows 7 x64
 
 

0x1E_c0000005_nt!KiSwapContext
0x7E_dxgmms1!VidSchiReadCommandFromContextQueue




1. Unistall Avast


2. Install MSE http://www.microsoft.com/security_essentials/


3. Uninstall Daemon Tools DuplexSecure - FAQ


4. Update drivers:

ATI
atikmdag.sys Tue Nov 24 22:44:50 2009

Atheros
athrx.sys Mon Oct 05 12:33:57 2009

Intel Management Engine
HECIx64.sys Thu Sep 17 15:54:16 2009

Intel Matrix Storage
iaStor.sys Tue Oct 13 14:15:56 2009
Intel® Driver Update Utility


HP Buttons
HpqKbFiltr.sys Wed Apr 29 09:48:30 2009






CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\122410-18392-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0325f000 PsLoadedModuleList = 0xfffff800`0349ce50
Debug session time: Fri Dec 24 17:54:31.681 2010 (UTC - 4:00)
System Uptime: 1 days 10:46:11.273
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff8800516a622, fffff8800959b948, fffff8800959b1b0}

Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiReadCommandFromContextQueue+62 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800516a622, The address that the exception occurred at
Arg3: fffff8800959b948, Exception Record Address
Arg4: fffff8800959b1b0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgmms1!VidSchiReadCommandFromContextQueue+62
fffff880`0516a622 488b5720        mov     rdx,qword ptr [rdi+20h]

EXCEPTION_RECORD:  fffff8800959b948 -- (.exr 0xfffff8800959b948)
ExceptionAddress: fffff8800516a622 (dxgmms1!VidSchiReadCommandFromContextQueue+0x0000000000000062)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800959b1b0 -- (.cxr 0xfffff8800959b1b0)
rax=00000000ffffffff rbx=fffffa8006cbd9b0 rcx=fffffa8006cbd9b0
rdx=0000000000000001 rsi=fffffa8006794010 rdi=00fffa8006dc0ec0
rip=fffff8800516a622 rsp=fffff8800959bb80 rbp=0000000000000001
 r8=000000000000000f  r9=0000000000000000 r10=fffff8800516b2b4
r11=fffff8800959bb70 r12=fffffa8006802000 r13=fffff88005196dc0
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl nz ac po cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010217
dxgmms1!VidSchiReadCommandFromContextQueue+0x62:
fffff880`0516a622 488b5720        mov     rdx,qword ptr [rdi+20h] ds:002b:00fffa80`06dc0ee0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035070e0
 ffffffffffffffff 

FOLLOWUP_IP: 
dxgmms1!VidSchiReadCommandFromContextQueue+62
fffff880`0516a622 488b5720        mov     rdx,qword ptr [rdi+20h]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff8800516a255 to fffff8800516a622

STACK_TEXT:  
fffff880`0959bb80 fffff880`0516a255 : fffffa80`06794010 fffffa80`06cbd9b0 00000000`00000000 00000000`00000001 : dxgmms1!VidSchiReadCommandFromContextQueue+0x62
fffff880`0959bbf0 fffff880`05196e7a : 00000000`00000000 fffffa80`06cbd9b0 00000000`00000080 fffffa80`06794010 : dxgmms1!VidSchiScheduleCommandToRun+0x169
fffff880`0959bd00 fffff800`03573c06 : 00000000`02613244 fffffa80`067cc060 fffffa80`03b52b30 fffffa80`067cc060 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`0959bd40 fffff800`032adc26 : fffff880`009ea180 fffffa80`067cc060 fffff880`009f4fc0 fffff880`0143b534 : nt!PspSystemThreadStartup+0x5a
fffff880`0959bd80 00000000`00000000 : fffff880`0959c000 fffff880`09596000 fffff880`0959b690 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VidSchiReadCommandFromContextQueue+62

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff8800959b1b0 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiReadCommandFromContextQueue+62

BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiReadCommandFromContextQueue+62

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\122610-16692-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50
Debug session time: Sun Dec 26 14:11:33.409 2010 (UTC - 4:00)
System Uptime: 0 days 3:46:57.352
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff8000328f639, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!KiSwapContext+d9 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000328f639, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiSwapContext+d9
fffff800`0328f639 c3              ret

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034c10e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88003717738 -- (.exr 0xfffff88003717738)
ExceptionAddress: fffff8000328f639 (nt!KiSwapContext+0x00000000000000d9)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff880037177e0 -- (.trap 0xfffff880037177e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003717940
rdx=0000000000187000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328f639 rsp=fffff88003717978 rbp=fffffa80049bc470
 r8=fffffa8003b52bb8  r9=0000000000000000 r10=fffffffffffffffd
r11=000000008000e5c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSwapContext+0xd9:
fffff800`0328f639 c3              ret
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032c3a39 to fffff80003289740

STACK_TEXT:  
fffff880`03716f68 fffff800`032c3a39 : 00000000`0000001e ffffffff`c0000005 fffff800`0328f639 00000000`00000000 : nt!KeBugCheckEx
fffff880`03716f70 fffff800`03288d82 : fffff880`03717738 fffffa80`049bc470 fffff880`037177e0 fffffa80`049bc530 : nt!KiDispatchException+0x1b9
fffff880`03717600 fffff800`0328768a : fffffa80`04a1aad0 fffffa80`04a1df88 00000000`00000014 fffff800`0328f9a2 : nt!KiExceptionDispatch+0xc2
fffff880`037177e0 fffff800`0328f639 : 00fff800`03290992 00000000`00000000 fffffa80`049bc470 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`03717978 00fff800`03290992 : 00000000`00000000 fffffa80`049bc470 00000000`00000000 00000000`00000006 : nt!KiSwapContext+0xd9
fffff880`03717980 00000000`00000000 : fffffa80`049bc470 00000000`00000000 00000000`00000006 00000000`00000000 : 0xfff800`03290992


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSwapContext+d9
fffff800`0328f639 c3              ret

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiSwapContext+d9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiSwapContext+d9

BUCKET_ID:  X64_0x1E_c0000005_nt!KiSwapContext+d9

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`0435b000 fffff880`043a0000   a1ze1fo3 a1ze1fo3.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03c5c000 fffff880`03ce6000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043c6000 fffff880`043dc000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`013b5000 fffff880`013c0000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0583a000 fffff880`05843000   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D)
fffff880`05800000 fffff880`0583a000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
fffff880`03ce6000 fffff880`03cf0000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
fffff880`01200000 fffff880`01223000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
fffff880`01430000 fffff880`01440000   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:27 2010 (4C8651AB)
fffff880`01367000 fffff880`01370000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01370000 fffff880`0139a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0446e000 fffff880`045eb000   athrx    athrx.sys    Mon Oct 05 12:33:57 2009 (4ACA1FF5)
fffff880`0531a000 fffff880`0533a000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`04a8c000 fffff880`050c2000   atikmdag atikmdag.sys Tue Nov 24 22:44:50 2009 (4B0CA832)
fffff960`008d0000 fffff960`00931000   ATMFD    ATMFD.DLL    unavailable (00000000)
fffff880`0109d000 fffff880`010a9000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`02f96000 fffff880`02f9d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`013d4000 fffff880`013e5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0556e000 fffff880`0558c000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00610000 fffff960`00637000   cdd      cdd.dll      unavailable (00000000)
fffff880`015e8000 fffff880`015f5000   cdrblock cdrblock.sys Fri May 30 01:12:23 2008 (483F8CB7)
fffff880`02f63000 fffff880`02f8d000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf2000 fffff880`00db2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01400000 fffff880`01430000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c94000 fffff880`00cf2000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03c51000 fffff880`03c55500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01753000 fffff880`017c6000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`011ef000 fffff880`011f8000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`043b6000 fffff880`043c6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05afe000 fffff880`05b0c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03dde000 fffff880`03dfc000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03dcf000 fffff880`03dde000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`016c0000 fffff880`016d6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05377000 fffff880`05399000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05b0c000 fffff880`05b1f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02e29000 fffff880`02f45000   dump_iaStor dump_iaStor.sys Tue Oct 13 14:15:56 2009 (4AD4C3DC)
fffff880`05b1f000 fffff880`05b2b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`050c2000 fffff880`051b6000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`051b6000 fffff880`051fc000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00c00000 fffff880`00c36000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`013c0000 fffff880`013d4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00e00000 fffff880`00e4c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`017d7000 fffff880`017e1000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01686000 fffff880`016c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0188b000 fffff880`018d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`037f5000 fffff800`0383e000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04a00000 fffff880`04a24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04a24000 fffff880`04a35000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`05b84000 fffff880`05b9d000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05b9d000 fffff880`05ba5080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05b76000 fffff880`05b84000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`04456000 fffff880`04462000   HpqKbFiltr HpqKbFiltr.sys Wed Apr 29 09:48:30 2009 (49F85AAE)
fffff880`054a6000 fffff880`0556e000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`019e2000 fffff880`019eb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`042cc000 fffff880`042ea000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0124b000 fffff880`01367000   iaStor   iaStor.sys   Tue Oct 13 14:15:56 2009 (4AD4C3DC)
fffff880`043a0000 fffff880`043b6000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`042ea000 fffff880`042f9000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b98000 fffff800`00ba2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`00db2000 fffff880`00df5000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01739000 fffff880`01753000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01860000 fffff880`0188b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05399000 fffff880`0539e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05864000 fffff880`05879000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05bc1000 fffff880`05be4000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c3c000 fffff880`00c80000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05bb3000 fffff880`05bc1000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0434c000 fffff880`0435b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05ba6000 fffff880`05bb3000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fba000 fffff880`00fd4000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0558c000 fffff880`055a4000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`055a4000 fffff880`055d1000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05400000 fffff880`0544e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0544e000 fffff880`05471000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0139a000 fffff880`013a5000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02e00000 fffff880`02e0b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`016db000 fffff880`01739000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03dc4000 fffff880`03dcf000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`018dd000 fffff880`018ef000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`018f0000 fffff880`019e2000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04200000 fffff880`0420c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05879000 fffff880`0588c000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0420c000 fffff880`0423b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05305000 fffff880`0531a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d7a000 fffff880`03d89000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03cf0000 fffff880`03d35000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01800000 fffff880`01860000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02e0b000 fffff880`02e1c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03db8000 fffff880`03dc4000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03219000 fffff800`037f5000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01445000 fffff880`015e8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02f8d000 fffff880`02f96000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0539f000 fffff880`053f2000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03d3e000 fffff880`03d64000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`011da000 fffff880`011ef000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f16000 fffff880`00f49000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`013a5000 fffff880`013b5000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`017c6000 fffff880`017d7000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05200000 fffff880`052a6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0533a000 fffff880`05377000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c80000 fffff880`00c94000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`043dc000 fffff880`04400000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0423b000 fffff880`04256000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04a46000 fffff880`04a67000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04256000 fffff880`04270000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c00000 fffff880`03c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02fe0000 fffff880`02fe9000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02fe9000 fffff880`02ff2000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ff2000 fffff880`02ffb000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0164c000 fffff880`01686000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0588c000 fffff880`058a4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04400000 fffff880`04456000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`058b7000 fffff880`05afde00   RTKVHD64 RTKVHD64.sys Tue Jun 08 05:08:08 2010 (4C0E0878)
fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`05471000 fffff880`0547c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`018d5000 fffff880`018dd000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`010ab000 fffff880`011d1000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`05f48000 fffff880`05fde000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05ee1000 fffff880`05f48000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`055d1000 fffff880`055fe000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`045f8000 fffff880`045f9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`042f9000 fffff880`0434c000   SynTP    SynTP.sys    Thu May 27 17:41:36 2010 (4BFEE710)
fffff880`01a03000 fffff880`01c00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0547c000 fffff880`0548e000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02e1c000 fffff880`02e29000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`017e1000 fffff880`017ff000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03da4000 fffff880`03db8000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00470000 fffff960`0047a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`05e00000 fffff880`05e55000   udfs     udfs.sys     Tue Oct 06 22:34:35 2009 (4ACBFE3B)
fffff880`04a67000 fffff880`04a79000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05b2b000 fffff880`05b48000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04462000 fffff880`04463f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04a35000 fffff880`04a46000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`052ab000 fffff880`05305000   usbhub   usbhub.sys   Fri Sep 04 23:24:43 2009 (4AA1D9FB)
fffff880`04276000 fffff880`042cc000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05b48000 fffff880`05b75200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02f9d000 fffff880`02fab000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02fab000 fffff880`02fd0000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f49000 fffff880`00f5e000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f5e000 fffff880`00fba000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01600000 fffff880`0164c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`045eb000 fffff880`045f8000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`03d64000 fffff880`03d7a000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03d89000 fffff880`03da4000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02fd0000 fffff880`02fe0000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e63000 fffff880`00f07000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f07000 fffff880`00f16000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d35000 fffff880`03d3e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d0000   win32k   win32k.sys   unavailable (00000000)
fffff880`04464000 fffff880`0446d000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`011d1000 fffff880`011da000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05843000 fffff880`05864000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`05e55000 fffff880`05e86000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`05ec6000 fffff880`05ee1000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`05e55000 fffff880`05ec6000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019eb000 fffff880`019f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`02e34000 fffff880`02f50000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0011C000
fffff880`02f50000 fffff880`02f63000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`01223000 fffff880`01249000   tunnel.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00026000
My System SpecsSystem Spec
28 Mar 2011   #3

Windows 7 Home Premium 64bit
 
 

i don't have avast or deamon tools...i have MSE and magicdisc....and the drivers i'm updating but what can i do with that programs??
My System SpecsSystem Spec
.


28 Mar 2011   #4

Windows 7 Home Premium 64bit
 
 

and i haven't found newer driver for matrix storage that i already have
My System SpecsSystem Spec
29 Mar 2011   #5

Windows 7 x64
 
 

Quote   Quote: Originally Posted by jezpe View Post
i don't have avast or deamon tools...i have MSE and magicdisc....and the drivers i'm updating but what can i do with that programs??

Yes you do, otherwise you wouldn't have so many Avast drivers:

Code:
fffff880`0583a000 fffff880`05843000   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:09 2010 (4C86506D)
fffff880`05800000 fffff880`0583a000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
fffff880`03ce6000 fffff880`03cf0000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
fffff880`01200000 fffff880`01223000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
fffff880`01430000 fffff880`01440000   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:27 2010 (4C8651AB)



Uninstall Avast using the official uninstaller:

avast! Uninstall Utility




And this is Daemon Tools/Alcohol 120 driver that you should also uninstall:

DuplexSecure - FAQ




To update Intel drivers, use Intel® Driver Update Utility. If your motherboard is not outdated, the utility will find the updates for sure. Use it in IE, click to confirm its installation.
My System SpecsSystem Spec
29 Mar 2011   #6

Windows 7 Home Premium 64bit
 
 

the sptd driver is not in my computer....i have downloaded the unistaller and it didn't found any sptd on my computer...what now??
My System SpecsSystem Spec
Reply

 BSOD while playing game




Thread Tools



Similar help and support threads for2: BSOD while playing game
Thread Forum
BSOD while playing any game BSOD Help and Support
BSOD playing too long, watching a video and playing a game or gmod BSOD Help and Support
Solved BSOD Whilst playing Browsing and Playing game's BSOD Help and Support
BSOD playing any game BSOD Help and Support
Getting BSOD from playing game BSOD Help and Support
BSOD after playing the game BSOD Help and Support
BSOD while playing game! Please Help! BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 11:17 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33