Okay so yes, good job on uninstall Avast!
Code:
aswRvrt.sys Thu May 9 14:47:02 2013 (518B6286)
aswVmm.sys Thu May 9 14:47:06 2013 (518B628A)
aswFsBlk.SYS Thu May 9 14:47:16 2013 (518B6294)
aswMonFlt.sys Thu May 9 14:47:23 2013 (518B629B)
aswTdi.SYS Thu May 9 14:47:32 2013 (518B62A4)
aswrdr2.sys Thu May 9 14:47:41 2013 (518B62AD)
aswSP.SYS Thu May 9 14:48:25 2013 (518B62D9)
aswSnx.SYS Thu May 9 14:48:30 2013 (518B62DE)
Please uninstall GIGABYTE On/Off Charge software. Use Revo Uninstaller to uninstall it.
Revo Uninstaller
Download and install Revo Uninstaller free from here: Download Revo Uninstaller Freeware - Free and Full Download - Uninstall software, remove programs, solve uninstall problems
Opt for "Advanced Mode" and uninstall the software (also delete the leftover registry entries).
AppleCharger.sys Thu Oct 25 06:51:02 2012 (50888CF6)
GIGABYTE On/Off Charge driver. See here for details - GIGABYTE ON/OFF Charge [br] May cause BSOD on Win7/8 systems - uninstall to test
Good luck.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {fffffa80f2f6f0a8, 2, 1, fffff800033c2147}
*** WARNING: Unable to verify timestamp for arusb_win7x.sys
*** ERROR: Module load completed but symbols could not be loaded for arusb_win7x.sys
Probably caused by : arusb_win7x.sys ( arusb_win7x+cccf )
Followup: MachineOwner
---------
0: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: fffffa80f2f6f0a8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff800033c2147, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExAllocatePoolWithTag+537
fffff800`033c2147 48895808 mov qword ptr [rax+8],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: svchost.exe
TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0
TRAP_FRAME: fffff80000ba2260 -- (.trap 0xfffff80000ba2260)
.trap 0xfffff80000ba2260
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80f2f6f0a0 rbx=0000000000000000 rcx=fffffa8006f6c0a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033c2147 rsp=fffff80000ba23f0 rbp=0000000000001000
r8=0000000000000000 r9=fffff8000341e620 r10=fffff8000341d588
r11=fffffa80082121a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExAllocatePoolWithTag+0x537:
fffff800`033c2147 48895808 mov qword ptr [rax+8],rbx ds:fffffa80`f2f6f0a8=????????????????
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000328d1a9 to fffff8000328dc00
STACK_TEXT:
fffff800`00ba2118 fffff800`0328d1a9 : 00000000`0000000a fffffa80`f2f6f0a8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba2120 fffff800`0328be20 : fffff800`00ba2290 fffff880`048cc044 00000000`00000007 fffff800`0341e620 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2260 fffff800`033c2147 : fffffa80`08212050 fffff880`044f49b9 fffffa80`08212d28 fffff880`044e75c2 : nt!KiPageFault+0x260
fffff800`00ba23f0 fffff880`044e6045 : fffffa80`00000000 fffff800`00ba2540 fffffa80`06affa00 fffffa80`00000000 : nt!ExAllocatePoolWithTag+0x537
fffff800`00ba24e0 fffff880`044f72fd : 00000000`00000003 fffffa80`0b1b9548 00000000`00000002 fffffa80`08213168 : USBPORT!UsbAllocPool_Z+0x3d
fffff800`00ba2510 fffff880`045072b8 : fffffa80`08212050 fffffa80`000003b0 fffffa80`06813010 fffffa80`096f3c60 : USBPORT!USBPORT_Core_AllocTransferEx+0x17d
fffff800`00ba25a0 fffff880`0450fe74 : fffffa80`096f3c60 fffffa80`08240009 fffffa80`096f3c60 fffffa80`0b1b9548 : USBPORT!USBPORT_ProcessURB+0x944
fffff800`00ba2650 fffff880`044e9af4 : 00000000`00000000 fffffa80`0824f050 fffffa80`08f71750 fffffa80`096f3c60 : USBPORT!USBPORT_PdoInternalDeviceControlIrp+0x138
fffff800`00ba2690 fffff880`00f647a7 : fffffa80`096f3c60 fffffa80`081e9bc0 fffffa80`096f3c60 fffffa80`096f3c60 : USBPORT!USBPORT_Dispatch+0x1dc
fffff800`00ba26d0 fffff880`00f6c789 : fffff880`00f8ab50 fffffa80`07182b40 fffffa80`096f3f28 fffffa80`096f3f28 : ACPI!ACPIDispatchForwardIrp+0x37
fffff800`00ba2700 fffff880`00f64a3f : fffff880`00f8ab50 fffffa80`07070d50 fffffa80`096f3c60 fffffa80`08905050 : ACPI!ACPIIrpDispatchDeviceControl+0x75
fffff800`00ba2730 fffff880`04331566 : 00000000`00001200 00000000`00000004 fffffa80`08905050 fffffa80`089f3060 : ACPI!ACPIDispatchIrp+0x12b
fffff800`00ba27b0 fffff880`04361d8f : 00000000`00000000 00000000`00000000 fffffa80`089f3060 fffffa80`08f15301 : usbhub!UsbhFdoUrbPdoFilter+0xde
fffff800`00ba27e0 fffff880`0432ffb7 : fffffa80`096f3c60 fffffa80`088eca00 fffffa80`096f3c60 fffffa80`096f3c60 : usbhub!UsbhPdoInternalDeviceControl+0x373
fffff800`00ba2830 fffff880`00f647a7 : fffffa80`096f3c60 fffffa80`08f15330 fffffa80`069b8701 00000000`00000001 : usbhub!UsbhGenDispatch+0x57
fffff800`00ba2860 fffff880`00f6c789 : fffff880`00f8ab50 fffff880`00ee54f3 00000000`00000000 fffffa80`096f3f28 : ACPI!ACPIDispatchForwardIrp+0x37
fffff800`00ba2890 fffff880`00f64a3f : fffff880`00f8ab50 fffffa80`070707d0 fffffa80`096f3c60 00000000`00000005 : ACPI!ACPIIrpDispatchDeviceControl+0x75
fffff800`00ba28c0 fffff880`00e8ff47 : 00000000`00000000 fffffa80`06c0a830 00000000`00000005 fffff800`00ba2990 : ACPI!ACPIDispatchIrp+0x12b
fffff800`00ba2940 fffff880`0be5fccf : fffffa80`069b88b0 fffffa80`06c0a830 fffffa80`08f15330 fffffa80`08f15330 : Wdf01000!imp_WdfRequestSend+0x4b3
fffff800`00ba29d0 fffffa80`069b88b0 : fffffa80`06c0a830 fffffa80`08f15330 fffffa80`08f15330 00000000`0000e000 : arusb_win7x+0xcccf
fffff800`00ba29d8 fffffa80`06c0a830 : fffffa80`08f15330 fffffa80`08f15330 00000000`0000e000 fffff880`0be63025 : 0xfffffa80`069b88b0
fffff800`00ba29e0 fffffa80`08f15330 : fffffa80`08f15330 00000000`0000e000 fffff880`0be63025 0000057f`f93f57c8 : 0xfffffa80`06c0a830
fffff800`00ba29e8 fffffa80`08f15330 : 00000000`0000e000 fffff880`0be63025 0000057f`f93f57c8 0000057f`f70eacc8 : 0xfffffa80`08f15330
fffff800`00ba29f0 00000000`0000e000 : fffff880`0be63025 0000057f`f93f57c8 0000057f`f70eacc8 00000000`00000000 : 0xfffffa80`08f15330
fffff800`00ba29f8 fffff880`0be63025 : 0000057f`f93f57c8 0000057f`f70eacc8 00000000`00000000 fffff800`00ba2a20 : 0xe000
fffff800`00ba2a00 0000057f`f93f57c8 : 0000057f`f70eacc8 00000000`00000000 fffff800`00ba2a20 00000000`00000000 : arusb_win7x+0x10025
fffff800`00ba2a08 0000057f`f70eacc8 : 00000000`00000000 fffff800`00ba2a20 00000000`00000000 00000000`0000206c : 0x0000057f`f93f57c8
fffff800`00ba2a10 00000000`00000000 : fffff800`00ba2a20 00000000`00000000 00000000`0000206c 0000057f`f70eacc8 : 0x0000057f`f70eacc8
STACK_COMMAND: kb
FOLLOWUP_IP:
arusb_win7x+cccf
fffff880`0be5fccf ?? ???
SYMBOL_STACK_INDEX: 13
SYMBOL_NAME: arusb_win7x+cccf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: arusb_win7x
IMAGE_NAME: arusb_win7x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b0e4275
FAILURE_BUCKET_ID: X64_0xC5_2_arusb_win7x+cccf
BUCKET_ID: X64_0xC5_2_arusb_win7x+cccf
Followup: MachineOwner
---------
CPUID: "Intel(R) Core(TM) i5-3330 CPU @ 3.00GHz"
MaxSpeed: 3000
CurrentSpeed: 2993
=============================================================
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, 0, fffff8800baaaa00, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
0: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff8800baaaa00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+0
00000000`00000000 ?? ???
CONTEXT: fffff8800baaaa00 -- (.cxr 0xfffff8800baaaa00)
.cxr 0xfffff8800baaaa00
rax=fffffa8006f6ee38 rbx=fffffa8006f6edf3 rcx=0000000000000000
rdx=fffffa8006f6e810 rsi=0000000000000000 rdi=fffffa8006f6e810
rip=0000000000000000 rsp=fffff8800baab3e8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffa80072a83c0
r11=fffff8800baab4d8 r12=fffffa80072a3500 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
00000000`00000000 ?? ???
.cxr
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000000000000
STACK_TEXT:
fffff880`0baaa138 fffff800`032841a9 : 00000000`0000003b 00000000`c0000005 00000000`00000000 fffff880`0baaaa00 : nt!KeBugCheckEx
fffff880`0baaa140 fffff800`03283afc : fffff880`0baab1a8 fffff880`0baaaa00 00000000`00000000 fffff800`032afc50 : nt!KiBugCheckDispatch+0x69
fffff880`0baaa280 fffff800`032af75d : fffff800`034a6e14 fffff800`033cbbf0 fffff800`0320f000 fffff880`0baab1a8 : nt!KiSystemServiceHandler+0x7c
fffff880`0baaa2c0 fffff800`032ae535 : fffff800`033d46c4 fffff880`0baaa338 fffff880`0baab1a8 fffff800`0320f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0baaa2f0 fffff800`032bf4d1 : fffff880`0baab1a8 fffff880`0baaaa00 fffff880`00000000 fffffa80`06f6e810 : nt!RtlDispatchException+0x415
fffff880`0baaa9d0 fffff800`03284282 : fffff880`0baab1a8 fffffa80`06f6edf3 fffff880`0baab250 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`0baab070 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`03283afc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
CPUID: "Intel(R) Core(TM) i5-3330 CPU @ 3.00GHz"
MaxSpeed: 3000
CurrentSpeed: 2993
====================================================
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {3f, 2, 0, fffff8000324f8b5}
*** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys
*** ERROR: Module load completed but symbols could not be loaded for afd.sys
*** ERROR: Module load completed but symbols could not be loaded for tdx.sys
*** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
Probably caused by : tdx.sys ( tdx+1325 )
Followup: MachineOwner
---------
2: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000003f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000324f8b5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034c6100
GetUlongFromAddress: unable to read from fffff800034c61c0
000000000000003f Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!IoIs32bitProcess+5
fffff800`0324f8b5 80794001 cmp byte ptr [rcx+40h],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002e28570 -- (.trap 0xfffff88002e28570)
.trap 0xfffff88002e28570
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007f6d680 rbx=0000000000000000 rcx=ffffffffffffffff
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000324f8b5 rsp=fffff88002e28708 rbp=0000000000000001
r8=fffffa8006f6d738 r9=0000000000000000 r10=fffffa8006f815b0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!IoIs32bitProcess+0x5:
fffff800`0324f8b5 80794001 cmp byte ptr [rcx+40h],1 ds:00000000`0000003f=??
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000328e1a9 to fffff8000328ec00
STACK_TEXT:
fffff880`02e28428 fffff800`0328e1a9 : 00000000`0000000a 00000000`0000003f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02e28430 fffff800`0328ce20 : fffffa80`06f39cf0 00000000`00000002 fffffa80`0000000a ffffffff`ffffffff : nt!KiBugCheckDispatch+0x69
fffff880`02e28570 fffff800`0324f8b5 : fffff880`01853925 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02e28708 fffff880`01853925 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IoIs32bitProcess+0x5
fffff880`02e28710 fffff880`01841426 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffffa80`06f6d738 : afd+0x53925
fffff880`02e28740 fffff880`01802724 : fffffa80`06f6d738 00000000`00000000 fffffa80`08f16052 fffffa80`06d033b0 : afd+0x41426
fffff880`02e28790 fffff880`018661f4 : 00000000`00000000 fffff880`02e28988 fffffa80`08f16052 00000000`00000091 : afd+0x2724
fffff880`02e28830 fffff880`02c48325 : fffffa80`0a9291e0 fffff880`01647b51 fffff880`02e28b88 fffffa80`06f80740 : afd+0x661f4
fffff880`02e28920 fffff880`01682ed5 : fffffa80`06f80740 fffffa80`080ab500 fffffa80`06f80740 fffffa80`06f80740 : tdx+0x1325
fffff880`02e28b10 fffff880`0167d12d : fffffa80`00000018 fffffa80`06f80740 fffffa80`00000000 fffffa80`08f1604a : tcpip+0x82ed5
fffff880`02e28ca0 fffff880`0165b5a7 : fffffa80`0757bc70 fffffa80`0757bb01 fffffa80`00000002 00000000`0000d1c0 : tcpip+0x7d12d
fffff880`02e28db0 fffff880`0165b0ba : 00000000`00000000 fffff880`0176e9a0 fffff880`02e28f70 fffffa80`098a2110 : tcpip+0x5b5a7
fffff880`02e28e70 fffff880`0165a6b9 : fffff880`0176e9a0 fffffa80`098a2530 00000000`00000011 fffff880`02e28f60 : tcpip+0x5b0ba
fffff880`02e28f10 fffff880`0165835f : fffffa80`08a44a00 fffffa80`076a0000 fffff880`0176e9a0 00000000`095cc501 : tcpip+0x5a6b9
fffff880`02e28ff0 fffff880`01657952 : fffffa80`095b4ae0 00000000`00000000 fffffa80`095cc501 fffffa80`00000001 : tcpip+0x5835f
fffff880`02e291f0 fffff880`01656dea : fffffa80`095cc5f0 fffff880`02e29320 fffffa80`095cc5f0 fffffa80`098a0000 : tcpip+0x57952
fffff880`02e292d0 fffff800`0329a878 : fffffa80`098a2110 00000000`00004800 fffffa80`08a4cb50 00000000`00000000 : tcpip+0x56dea
fffff880`02e29320 fffff880`016574b2 : fffff880`01656d10 fffff880`01f50001 fffffa80`0a729002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`02e29400 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x574b2
STACK_COMMAND: kb
FOLLOWUP_IP:
tdx+1325
fffff880`02c48325 3d160000c0 cmp eax,0C0000016h
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: tdx+1325
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tdx
IMAGE_NAME: tdx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79332
FAILURE_BUCKET_ID: X64_0xA_tdx+1325
BUCKET_ID: X64_0xA_tdx+1325
Followup: MachineOwner
---------
CPUID: "Intel(R) Core(TM) i5-3330 CPU @ 3.00GHz"
MaxSpeed: 3000
CurrentSpeed: 2993