Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Random BSODs


23 Jun 2010   #1

Windows 7 64-bit
 
 
Random BSODs

For awhile now I've been getting BSODs from things from Ntkrnlmp.exe to netr28ux.sys to random stops with nothing to point fingers at. (Oh, and some hardware stops as well.)
I have found and eliminated/updated most of the 3rd party drivers from the system causing some of the crashes but not really getting at the core problem.
I'm leaving the last 3 crashes, I got 12 others just chillin' on my HD.

Halp

My System SpecsSystem Spec
.

23 Jun 2010   #2

Microsoft Window 7 Professional 32 bit
 
 

Hi and welcome to SF

please remove any virtual CD program such as Deamon tool or Alcohol 120%, eventhough they are not pointed as the causes in those minidump files, however, they are well-known for causing BSODs.
Code:
sptd     sptd.sys     Mon Oct 12 03:55:14 2009 (4AD24632)
After that, please use this tool to un-install sptd.sys, which is component of many virtual CD program
DuplexSecure - Downloads

Also, please update these drivers:
Code:
SiRemFil SiRemFil.sys Thu Jun 21 02:42:10 2007 (46798312)
SiWinAcc SiWinAcc.sys Fri Jun 15 07:02:02 2007 (4671D6FA)
They are Silicon Image drivers

Hope it's help

BUGCHECK
Code:
BugCheck A, {7a0000000048, 2, 1, fffff80002c81237}
Probably caused by : ntkrnlmp.exe ( nt!ExTryAcquireSpinLockExclusiveAtDpcLevel+2f )
Followup: MachineOwner
---------
BugCheck 50, {ffffe0a0009bad40, 0, fffff8800144f39d, 7}
 
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+bd )
Followup: MachineOwner
---------
BugCheck D1, {0, 2, 0, fffff88002e5ceba}
Probably caused by : hardware ( afd!AfdFastConnectionReceive+8a )
Followup: MachineOwner
---------
Regard

Tuan
My System SpecsSystem Spec
23 Jun 2010   #3

Windows 7 Professional x64
 
 

Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads

Update this:
Code:
SiWinAcc.sys   Silicon Image driver - comes with package for the SIxxxx drivers Silicon Image - Support
Test your hard drive: http://www.carrona.org/hddiag.html

Open a command prompt and enter chdsk /r.

Code:

BugCheck A, {7a0000000048, 2, 1, fffff80002c81237}
Probably caused by : ntkrnlmp.exe ( nt!ExTryAcquireSpinLockExclusiveAtDpcLevel+2f )
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
BugCheck 50, {ffffe0a0009bad40, 0, fffff8800144f39d, 7}
Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+bd )
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
BugCheck D1, {0, 2, 0, fffff88002e5ceba}
Probably caused by : hardware ( afd!AfdFastConnectionReceive+8a )
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
My System SpecsSystem Spec
.


23 Jun 2010   #4

Windows 7 64-bit
 
 

Quote   Quote: Originally Posted by ttran View Post
please update these drivers:
Code:
SiRemFil SiRemFil.sys Thu Jun 21 02:42:10 2007 (46798312)
SiWinAcc SiWinAcc.sys Fri Jun 15 07:02:02 2007 (4671D6FA)
They are Silicon Image drivers



Tuan
Found updated drivers (The most recent I could find for both of them are 2008.) But totally unsure how to apply the sys file...

Removed the sptd file.
My System SpecsSystem Spec
23 Jun 2010   #5

Microsoft Window 7 Professional 32 bit
 
 

Ok, you good, let's wait until next BSODs ok?
~Tuan
My System SpecsSystem Spec
23 Jun 2010   #6

Windows 7 64-bit
 
 

Another BSOD, not sure if I was able to install SiRemFil.sys & SiWinAcc.sys but heres the dump. I can tell the system's health is much better, it took me more than 11 hours to BSOD than 15 mins. lol Thanks for the help guys.
My System SpecsSystem Spec
23 Jun 2010   #7

Windows 7 64-bit
 
 

Second quick BSOD nwifi.sys crash
My System SpecsSystem Spec
23 Jun 2010   #8

Win 8 Release candidate 8400
 
 

Quote   Quote: Originally Posted by vteckickedinyo View Post
Second quick BSOD nwifi.sys crash

This one was indeed caused by nwifi.sys as you suggested. I would download a fresh copy of the driver and re-install it



Ken


Code:
Built by: 7600.20655.amd64fre.win7_ldr.100226-1909
Debug session time: Wed Jun 23 23:32:47.434 2010 (GMT-4)
System Uptime: 0 days 0:11:51.260
BugCheck 3B, {c0000005, fffff88001e1ffbc, fffff880082f4820, 0}
Probably caused by : nwifi.sys ( nwifi!Dot11PacketConverterReceivePacket+128 )
BUGCHECK_STR:  0x3B
PROCESS_NAME:  firefox.exe
My System SpecsSystem Spec
24 Jun 2010   #9

Windows 7 64-bit
 
 

2 more BSODs
Just trying to iron out everything.
My System SpecsSystem Spec
25 Jun 2010   #10

Windows 7 Professional x64
 
 

Still pointing to network adapter drivers. Did you uninstall and install a fresh copy?

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Jonathan\Desktop\062410-51558-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.20655.amd64fre.win7_ldr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02c07000 PsLoadedModuleList = 0xfffff800`02e3fe50
Debug session time: Thu Jun 24 10:34:49.679 2010 (UTC - 4:00)
System Uptime: 0 days 0:04:40.489
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 0, fffff88001f8966c}

Unable to load image \SystemRoot\system32\DRIVERS\netr28ux.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netr28ux.sys
*** ERROR: Module load completed but symbols could not be loaded for netr28ux.sys
Probably caused by : netr28ux.sys ( netr28ux+8b66c )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001f8966c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaa0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
netr28ux+8b66c
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  uTorrent.exe

TRAP_FRAME:  fffff88005315800 -- (.trap 0xfffff88005315800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
 r8=fffff88005315aa0  r9=0000000000000000 r10=fffffa800626af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
netr28ux+0x8b66c:
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c6ee69 to fffff80002c6f900

STACK_TEXT:  
fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
netr28ux+8b66c
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  netr28ux+8b66c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28ux

IMAGE_NAME:  netr28ux.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a799052

FAILURE_BUCKET_ID:  X64_0xD1_netr28ux+8b66c

BUCKET_ID:  X64_0xD1_netr28ux+8b66c

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001f8966c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
netr28ux+8b66c
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  uTorrent.exe

TRAP_FRAME:  fffff88005315800 -- (.trap 0xfffff88005315800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
 r8=fffff88005315aa0  r9=0000000000000000 r10=fffffa800626af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
netr28ux+0x8b66c:
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c6ee69 to fffff80002c6f900

STACK_TEXT:  
fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
netr28ux+8b66c
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  netr28ux+8b66c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28ux

IMAGE_NAME:  netr28ux.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a799052

FAILURE_BUCKET_ID:  X64_0xD1_netr28ux+8b66c

BUCKET_ID:  X64_0xD1_netr28ux+8b66c

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001f8966c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
netr28ux+8b66c
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  uTorrent.exe

TRAP_FRAME:  fffff88005315800 -- (.trap 0xfffff88005315800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
 r8=fffff88005315aa0  r9=0000000000000000 r10=fffffa800626af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
netr28ux+0x8b66c:
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c6ee69 to fffff80002c6f900

STACK_TEXT:  
fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
netr28ux+8b66c
fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  netr28ux+8b66c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28ux

IMAGE_NAME:  netr28ux.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a799052

FAILURE_BUCKET_ID:  X64_0xD1_netr28ux+8b66c

BUCKET_ID:  X64_0xD1_netr28ux+8b66c

Followup: MachineOwner
---------

2: kd> lmsmn
start             end                 module name
fffff880`03f3a000 fffff880`03f78000   1394ohci 1394ohci.sys
fffff880`00f83000 fffff880`00fda000   ACPI     ACPI.sys    
fffff880`02cea000 fffff880`02d74000   afd      afd.sys     
fffff880`03fc1000 fffff880`03fd7000   AgileVpn AgileVpn.sys
fffff880`03791000 fffff880`037a6000   amdppm   amdppm.sys  
fffff880`010c2000 fffff880`010cd000   amdxata  amdxata.sys 
fffff880`0108f000 fffff880`01098000   atapi    atapi.sys   
fffff880`01098000 fffff880`010c2000   ataport  ataport.SYS 
fffff880`00e51000 fffff880`00e5d000   BATTC    BATTC.SYS   
fffff880`01809000 fffff880`01810000   Beep     Beep.SYS    
fffff880`0375a000 fffff880`0376b000   blbdrive blbdrive.sys
fffff880`06750000 fffff880`0676e000   bowser   bowser.sys  
fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll     
fffff880`019cf000 fffff880`019f9000   cdrom    cdrom.sys   
fffff880`00d08000 fffff880`00dc8000   CI       CI.dll      
fffff880`0105f000 fffff880`0108f000   CLASSPNP CLASSPNP.SYS
fffff880`00caa000 fffff880`00d08000   CLFS     CLFS.SYS    
fffff880`01464000 fffff880`014d7000   cng      cng.sys     
fffff880`00e48000 fffff880`00e51000   compbatt compbatt.sys
fffff880`03fb1000 fffff880`03fc1000   CompositeBus CompositeBus.sys
fffff880`06671000 fffff880`0667a000   cpuz133_x64 cpuz133_x64.sys
fffff880`01e0e000 fffff880`01e1c000   crashdmp crashdmp.sys
fffff880`036b9000 fffff880`0373c000   csc      csc.sys     
fffff880`0373c000 fffff880`0375a000   dfsc     dfsc.sys    
fffff880`036aa000 fffff880`036b9000   discache discache.sys
fffff880`01983000 fffff880`01999000   disk     disk.sys    
fffff880`04389000 fffff880`043ab000   drmk     drmk.sys    
fffff880`01e28000 fffff880`01e31000   dump_atapi dump_atapi.sys
fffff880`01e1c000 fffff880`01e28000   dump_dumpata dump_dumpata.sys
fffff880`01e31000 fffff880`01e44000   dump_dumpfve dump_dumpfve.sys
fffff880`043e1000 fffff880`043ed000   Dxapi    Dxapi.sys   
fffff880`14aa6000 fffff880`14b9a000   dxgkrnl  dxgkrnl.sys 
fffff880`14b9a000 fffff880`14be0000   dxgmms1  dxgmms1.sys 
fffff880`036a1000 fffff880`036aa000   EIO64    EIO64.sys   
fffff880`011a5000 fffff880`011b9000   fileinfo fileinfo.sys
fffff880`01159000 fffff880`011a5000   fltmgr   fltmgr.sys  
fffff880`014e8000 fffff880`014f2000   Fs_Rec   Fs_Rec.sys  
fffff880`01949000 fffff880`01983000   fvevol   fvevol.sys  
fffff880`01835000 fffff880`0187f000   fwpkclnt fwpkclnt.sys
fffff800`031de000 fffff800`03227000   hal      hal.dll     
fffff880`03f16000 fffff880`03f3a000   HDAudBus HDAudBus.sys
fffff880`042f0000 fffff880`0434c000   HdAudio  HdAudio.sys 
fffff880`043bf000 fffff880`043d8000   HIDCLASS HIDCLASS.SYS
fffff880`043d8000 fffff880`043e0080   HIDPARSE HIDPARSE.SYS
fffff880`043b1000 fffff880`043bf000   hidusb   hidusb.sys  
fffff880`06688000 fffff880`06750000   HTTP     HTTP.sys    
fffff880`01940000 fffff880`01949000   hwpolicy hwpolicy.sys
fffff880`03f84000 fffff880`03fa2000   i8042prt i8042prt.sys
fffff880`00ddf000 fffff880`00dff000   jraid    jraid.sys   
fffff880`03fa2000 fffff880`03fb1000   kbdclass kbdclass.sys
fffff800`00bb3000 fffff800`00bbd000   kdcom    kdcom.dll   
fffff880`037af000 fffff880`037f2000   ks       ks.sys      
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys  
fffff880`0121a000 fffff880`01245000   ksecpkg  ksecpkg.sys 
fffff880`043ab000 fffff880`043b0200   ksthunk  ksthunk.sys 
fffff880`01e88000 fffff880`01e9d000   lltdio   lltdio.sys  
fffff880`01e44000 fffff880`01e67000   luafv    luafv.sys   
fffff880`00c89000 fffff880`00c96000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll
fffff880`01e00000 fffff880`01e0e000   monitor  monitor.sys 
fffff880`03e9c000 fffff880`03eab000   mouclass mouclass.sys
fffff880`043ed000 fffff880`043fa000   mouhid   mouhid.sys  
fffff880`00c2f000 fffff880`00c49000   mountmgr mountmgr.sys
fffff880`0676e000 fffff880`06786000   mpsdrv   mpsdrv.sys  
fffff880`06786000 fffff880`067ae000   mrxdav   mrxdav.sys  
fffff880`067ae000 fffff880`067db000   mrxsmb   mrxsmb.sys  
fffff880`06600000 fffff880`0664e000   mrxsmb10 mrxsmb10.sys
fffff880`0664e000 fffff880`06671000   mrxsmb20 mrxsmb20.sys
fffff880`013e8000 fffff880`013f3000   Msfs     Msfs.SYS    
fffff880`00fe3000 fffff880`00fed000   msisadrv msisadrv.sys
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys   
fffff880`03696000 fffff880`036a1000   mssmbios mssmbios.sys
fffff880`01925000 fffff880`01937000   mup      mup.sys     
fffff880`014f2000 fffff880`015e4000   ndis     ndis.sys    
fffff880`03e00000 fffff880`03e0c000   ndistapi ndistapi.sys
fffff880`04200000 fffff880`04213000   ndisuio  ndisuio.sys 
fffff880`03e0c000 fffff880`03e3b000   ndiswan  ndiswan.sys 
fffff880`042db000 fffff880`042f0000   NDProxy  NDProxy.SYS 
fffff880`02c16000 fffff880`02c25000   netbios  netbios.sys 
fffff880`02d74000 fffff880`02db9000   netbt    netbt.sys   
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS   
fffff880`01efe000 fffff880`01ff8000   netr28ux netr28ux.sys
fffff880`00c72000 fffff880`00c83000   Npfs     Npfs.SYS    
fffff880`0368a000 fffff880`03696000   nsiproxy nsiproxy.sys
fffff800`02c07000 fffff800`031de000   nt       ntkrnlmp.exe
fffff880`01245000 fffff880`013e8000   Ntfs     Ntfs.sys    
fffff880`01800000 fffff880`01809000   Null     Null.SYS    
fffff880`14aa4000 fffff880`14aa5180   nvBridge nvBridge.kmd
fffff880`13e36000 fffff880`14aa3c80   nvlddmkm nvlddmkm.sys
fffff880`00c49000 fffff880`00c72000   nvraid   nvraid.sys  
fffff880`01e9d000 fffff880`01ef0000   nwifi    nwifi.sys   
fffff880`02dc2000 fffff880`02de8000   pacer    pacer.sys   
fffff880`00e33000 fffff880`00e48000   partmgr  partmgr.sys 
fffff880`06e9c000 fffff880`06ea3000   pbfilter pbfilter.sys
fffff880`00e00000 fffff880`00e33000   pci      pci.sys     
fffff880`00dc8000 fffff880`00dcf000   pciide   pciide.sys  
fffff880`00dcf000 fffff880`00ddf000   PCIIDEX  PCIIDEX.SYS 
fffff880`014d7000 fffff880`014e8000   pcw      pcw.sys     
fffff880`06aad000 fffff880`06b53000   peauth   peauth.sys  
fffff880`0434c000 fffff880`04389000   portcls  portcls.sys 
fffff880`00c96000 fffff880`00caa000   PSHED    PSHED.dll   
fffff880`03fd7000 fffff880`03ffb000   rasl2tp  rasl2tp.sys 
fffff880`03e3b000 fffff880`03e56000   raspppoe raspppoe.sys
fffff880`03e56000 fffff880`03e77000   raspptp  raspptp.sys 
fffff880`03e77000 fffff880`03e91000   rassstp  rassstp.sys 
fffff880`03639000 fffff880`0368a000   rdbss    rdbss.sys   
fffff880`03e91000 fffff880`03e9c000   rdpbus   rdpbus.sys  
fffff880`015e4000 fffff880`015ed000   RDPCDD   RDPCDD.sys  
fffff880`015ed000 fffff880`015f6000   rdpencdd rdpencdd.sys
fffff880`015f6000 fffff880`015ff000   rdprefmp rdprefmp.sys
fffff880`018e3000 fffff880`0191d000   rdyboost rdyboost.sys
fffff880`04213000 fffff880`0422b000   rspndr   rspndr.sys  
fffff880`00c00000 fffff880`00c2f000   SCSIPORT SCSIPORT.SYS
fffff880`06b53000 fffff880`06b5e000   secdrv   secdrv.SYS  
fffff880`03f78000 fffff880`03f84000   serenum  serenum.sys 
fffff880`02c25000 fffff880`02c42000   serial   serial.sys  
fffff880`0191d000 fffff880`01925000   SiRemFil SiRemFil.sys
fffff880`011b9000 fffff880`011c3000   SiWinAcc SiWinAcc.sys
fffff880`018db000 fffff880`018e3000   spldr    spldr.sys   
fffff880`06ea3000 fffff880`06f14000   spsys    spsys.sys   
fffff880`06e04000 fffff880`06e9c000   srv      srv.sys     
fffff880`06a00000 fffff880`06a69000   srv2     srv2.sys    
fffff880`06b5e000 fffff880`06b8b000   srvnet   srvnet.sys  
fffff880`010f7000 fffff880`01159000   storport storport.sys
fffff880`03eab000 fffff880`03eac480   swenum   swenum.sys  
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys   
fffff880`06b8b000 fffff880`06b9d000   tcpipreg tcpipreg.sys
fffff880`02cdd000 fffff880`02cea000   TDI      TDI.SYS     
fffff880`02cbf000 fffff880`02cdd000   tdx      tdx.sys     
fffff880`03625000 fffff880`03639000   termdd   termdd.sys  
fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll   
fffff880`0376b000 fffff880`03791000   tunnel   tunnel.sys  
fffff880`14beb000 fffff880`14bfd000   umbus    umbus.sys   
fffff880`03ead000 fffff880`03eaef00   USBD     USBD.SYS    
fffff880`03f05000 fffff880`03f16000   usbehci  usbehci.sys 
fffff880`04281000 fffff880`042db000   usbhub   usbhub.sys  
fffff880`14be0000 fffff880`14beb000   usbohci  usbohci.sys 
fffff880`03eaf000 fffff880`03f05000   USBPORT  USBPORT.SYS 
fffff880`13e1d000 fffff880`13e2c000   usbrpm   usbrpm.sys  
fffff880`00fed000 fffff880`00ffa000   vdrvroot vdrvroot.sys
fffff880`01810000 fffff880`0181e000   vga      vga.sys     
fffff880`011cd000 fffff880`011f2000   VIDEOPRT VIDEOPRT.SYS
fffff880`0187f000 fffff880`0188f000   vmstorfl vmstorfl.sys
fffff880`00e5d000 fffff880`00e72000   volmgr   volmgr.sys  
fffff880`00e72000 fffff880`00ece000   volmgrx  volmgrx.sys 
fffff880`0188f000 fffff880`018db000   volsnap  volsnap.sys 
fffff880`04245000 fffff880`04281000   vpchbus  vpchbus.sys 
fffff880`02de8000 fffff880`02dfc000   vpcnfltr vpcnfltr.sys
fffff880`13e00000 fffff880`13e1d000   vpcusb   vpcusb.sys  
fffff880`02c5d000 fffff880`02cb3180   vpcvmm   vpcvmm.sys  
fffff880`010cd000 fffff880`010f7000   vsmraid  vsmraid.sys 
fffff880`02c00000 fffff880`02c16000   vwififlt vwififlt.sys
fffff880`02c42000 fffff880`02c5d000   wanarp   wanarp.sys  
fffff880`0181e000 fffff880`0182e000   watchdog watchdog.sys
fffff880`00ed0000 fffff880`00f74000   Wdf01000 Wdf01000.sys
fffff880`00f74000 fffff880`00f83000   WDFLDR   WDFLDR.SYS  
fffff880`02db9000 fffff880`02dc2000   wfplwf   wfplwf.sys  
fffff960`000b0000 fffff960`003bf000   win32k   win32k.sys  
fffff880`037a6000 fffff880`037af000   wmiacpi  wmiacpi.sys 
fffff880`00fda000 fffff880`00fe3000   WMILIB   WMILIB.SYS  
fffff880`01e67000 fffff880`01e88000   WudfPf   WudfPf.sys  
fffff880`011c3000 fffff880`011cd000   xfiltx64 xfiltx64.sys

Unloaded modules:
fffff880`01999000 fffff880`019a7000   crashdmp.sys
fffff880`019a7000 fffff880`019b3000   dump_ataport
fffff880`019b3000 fffff880`019bc000   dump_atapi.s
fffff880`019bc000 fffff880`019cf000   dump_dumpfve
fffff880`01937000 fffff880`01940000   johci.sys
My System SpecsSystem Spec
Reply

 Random BSODs




Thread Tools



Similar help and support threads for2: Random BSODs
Thread Forum
Random BSODs Caused by Random Files with Differing Stop Codes BSOD Help and Support
Solved Random BSODs during random tasks. Latest error: 0x1000007e BSOD Help and Support
Random BSODs appearing at random BSOD Help and Support
Random BSODs; Firefox 4 random crashes BSOD Help and Support
Getting random BSODs BSOD Help and Support
Random BSODS at Random Times - Please Help BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd

All times are GMT -5. The time now is 12:57 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33