Help! Random shutdown/reboot with and without BSOD!


  1. Posts : 2
    Windows 7 Home Premium 64bit
       #1

    Help! Random shutdown/reboot with and without BSOD!


    My computer has been crashing and its getting to a point where its more than bearable. The system has recorded 40+ critical errors in the past week alone. Sometimes there are bluescreens but more often then not, it just reboots without an error message. The crashes are particularly pronounced during sessions of video intensive use - watching movies and playing games. However, I have also had it reboot on me without an error in Word. Below are some information on the system:

    CPU: Intel i5
    RAM: 8 GIGS
    VIDEO: Geforece GT 220
    OS: Windows Home Premium 64bit
    Age: 6 months

    Hardware came back within normal parameters in stress tests and drivers seem to be updated. I am at my wits end and would really appreciate it if someone could help me identify the culprit. Thanks!
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    1. Replace AVG with MSE:

    AVG Worldwide - Download tools

    http://www.microsoft.com/security_essentials/



    2. Update:


    ElRawDsk.sys Sat Jul 26 20:59:09 2008
    RawDisk EldoS Corporation

    speedfan.sys Sun Sep 24 16:26:48 2006
    Speedfan

    k57nd60a.sys Thu Aug 06 14:44:32 2009
    Broadcom NetLink (TM) Gigabit Ethernet

    RTKVHD64.sys Tue Aug 18 12:29:10 2009
    Realtek High Definition Audio

    athrx.sys Sat Oct 24 04:49:44 2009
    Atheros CB42/CB43/MB42/MB43 Wireless LAN

    HECIx64.sys Thu Sep 17 22:54:16 2009
    Intel Management Engine



    3. If crashes persist, attach the latest .dmp's and also do the memory test:

    RAM - Test with Memtest86+




    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101010-20139-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034a2e50
    Debug session time: Sun Oct 10 13:09:12.319 2010 (GMT-5)
    System Uptime: 0 days 1:49:06.880
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff800032d36d0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff800032d36d0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  war3.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88008b6bed0 -- (.trap 0xfffff88008b6bed0)
    Unable to read trap frame at fffff880`08b6bed0
    
    LAST_CONTROL_TRANSFER:  from fffff800032d4ca9 to fffff800032d5740
    
    STACK_TEXT:  
    fffff880`02f6ace8 fffff800`032d4ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02f6acf0 fffff800`032d3172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02f6ae30 fffff800`032d36d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`08b6bed0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`032d3172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-23696-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`0324e000 PsLoadedModuleList = 0xfffff800`0348be50
    Debug session time: Tue Oct 12 03:06:18.145 2010 (GMT-5)
    System Uptime: 0 days 0:19:44.706
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff800032ffa93, 0, ffffffffffffffff}
    
    Probably caused by : memory_corruption ( nt!MiGetProtoPteAddressExtended+17 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff800032ffa93, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!MiGetProtoPteAddressExtended+17
    fffff800`032ffa93 4d8b4808        mov     r9,qword ptr [r8+8]
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034f60e0
     ffffffffffffffff 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  war3.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88007834828 -- (.exr 0xfffff88007834828)
    ExceptionAddress: fffff800032ffa93 (nt!MiGetProtoPteAddressExtended+0x0000000000000017)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff880078348d0 -- (.trap 0xfffff880078348d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007304290
    rdx=000000000001140f rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032ffa93 rsp=fffff88007834a60 rbp=fffff88007834b40
     r8=41d98b48c9334500  r9=ab4217058b4820ec r10=fffffa8007304290
    r11=ff04000a00000017 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!MiGetProtoPteAddressExtended+0x17:
    fffff800`032ffa93 4d8b4808        mov     r9,qword ptr [r8+8] ds:dc30:41d98b48`c9334508=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032f8a39 to fffff800032be740
    
    STACK_TEXT:  
    fffff880`07834058 fffff800`032f8a39 : 00000000`0000001e ffffffff`c0000005 fffff800`032ffa93 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07834060 fffff800`032bdd82 : fffff880`07834828 fffffa80`07304290 fffff880`078348d0 fffff880`07834bb8 : nt!KiDispatchException+0x1b9
    fffff880`078346f0 fffff800`032bc68a : 3e80fffc`3f007ffe 3ebf0004`3f007ffe 45680000`c5f00000 c5f00000`44a00000 : nt!KiExceptionDispatch+0xc2
    fffff880`078348d0 fffff800`032ffa93 : fffff900`000000a6 fffff960`001b9893 fffff900`c073dc30 fffff800`033fcdd0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`07834a60 fffff800`032db291 : fffffa80`07304290 fffffa80`06fffb60 00000000`1140ffc0 00000000`00000000 : nt!MiGetProtoPteAddressExtended+0x17
    fffff880`07834a90 fffff800`032d9094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000000a6 : nt!MiCheckVirtualAddress+0x231
    fffff880`07834ac0 fffff800`032bc82e : 00000000`00000000 00000000`1140ffc0 00000000`00000001 fffffa80`073e01b0 : nt!MmAccessFault+0xc94
    fffff880`07834c20 00000000`6f531056 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`0018f97c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6f531056
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiGetProtoPteAddressExtended+17
    fffff800`032ffa93 4d8b4808        mov     r9,qword ptr [r8+8]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!MiGetProtoPteAddressExtended+17
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x1E_nt!MiGetProtoPteAddressExtended+17
    
    BUCKET_ID:  X64_0x1E_nt!MiGetProtoPteAddressExtended+17
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101210-22791-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50
    Debug session time: Tue Oct 12 09:30:01.979 2010 (GMT-5)
    System Uptime: 0 days 1:30:39.540
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80003286e7f}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80003286e7f
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  war3.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80003288ca9 to fffff80003289740
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`03288ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`03287172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff800`03286e7f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`077fefe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0xbf
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`03287172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtn
    start             end                 module name
    fffff800`00bad000 fffff800`00bb7000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
    fffff800`03219000 fffff800`037f5000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
    fffff800`037f5000 fffff800`0383e000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
    fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00c1a000 fffff880`00c23000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`00c23000 fffff880`00c4d000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
    fffff880`00c4d000 fffff880`00c58000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
    fffff880`00c72000 fffff880`00cb6000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
    fffff880`00cb6000 fffff880`00cca000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
    fffff880`00cca000 fffff880`00d28000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00d28000 fffff880`00de8000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
    fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
    fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
    fffff880`00e78000 fffff880`00e88000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`00e8b000 fffff880`00f2f000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
    fffff880`00f2f000 fffff880`00f3e000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00f3e000 fffff880`00f95000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
    fffff880`00f95000 fffff880`00f9e000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00f9e000 fffff880`00fa8000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
    fffff880`00fa8000 fffff880`00fdb000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00fdb000 fffff880`00fe8000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
    fffff880`00fe8000 fffff880`00ffd000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
    fffff880`0103a000 fffff880`01074000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
    fffff880`01074000 fffff880`010c0000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
    fffff880`010c0000 fffff880`010d4000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
    fffff880`010d4000 fffff880`01132000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
    fffff880`01132000 fffff880`011a5000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
    fffff880`011a5000 fffff880`011f1000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
    fffff880`0121b000 fffff880`01231000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`01239000 fffff880`013dc000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
    fffff880`013dc000 fffff880`013f6000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
    fffff880`014d5000 fffff880`014dd000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
    fffff880`014dd000 fffff880`014e4000   speedfan speedfan.sys Sun Sep 24 16:26:48 2006 (45168798)
    fffff880`014e4000 fffff880`014ed000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
    fffff880`014f4000 fffff880`015e6000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`015e6000 fffff880`015f8000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
    fffff880`01800000 fffff880`01809000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`01809000 fffff880`01812000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`01812000 fffff880`0181b000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
    fffff880`0181b000 fffff880`01826000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`01826000 fffff880`01837000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`01837000 fffff880`01855000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
    fffff880`01855000 fffff880`01862000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
    fffff880`01862000 fffff880`018c3000   avgtdia  avgtdia.sys  Tue Sep 07 03:52:11 2010 (4C858CBB)
    fffff880`018c3000 fffff880`018e1000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
    fffff880`018f5000 fffff880`01925000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`01925000 fffff880`0192f000   avgrkx64 avgrkx64.sys Tue Sep 07 03:49:37 2010 (4C858C21)
    fffff880`0192f000 fffff880`01939000   AVGIDSEH AVGIDSEH.Sys Tue Sep 14 01:46:38 2010 (4C8EA9CE)
    fffff880`01939000 fffff880`01956000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
    fffff880`01956000 fffff880`01969000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    fffff880`0196f000 fffff880`01999000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`01999000 fffff880`019a8000   avgmfx64 avgmfx64.sys Tue Sep 07 03:49:14 2010 (4C858C0A)
    fffff880`019a8000 fffff880`019b1000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
    fffff880`019b1000 fffff880`019b8000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
    fffff880`019b8000 fffff880`019c6000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
    fffff880`019c6000 fffff880`019eb000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
    fffff880`019eb000 fffff880`019fb000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
    fffff880`02800000 fffff880`028a6000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
    fffff880`028b5000 fffff880`028d8000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
    fffff880`028d8000 fffff880`028f9000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
    fffff880`028f9000 fffff880`0290e000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`0290e000 fffff880`02961000   nwifi    nwifi.sys    Tue Jul 14 03:07:23 2009 (4A5BCC3B)
    fffff880`02961000 fffff880`02974000   ndisuio  ndisuio.sys  Tue Jul 14 03:09:25 2009 (4A5BCCB5)
    fffff880`02974000 fffff880`0298c000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`0298c000 fffff880`029b9000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
    fffff880`029b9000 fffff880`029ed000   AVGIDSDriver AVGIDSDriver.Sys Wed Aug 04 01:24:45 2010 (4C58972D)
    fffff880`02c00000 fffff880`02c0c000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`02c0c000 fffff880`02c1a000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
    fffff880`02c1c000 fffff880`02c61000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
    fffff880`02c61000 fffff880`02ceb000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`02ceb000 fffff880`02cf4000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02cf4000 fffff880`02d1a000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
    fffff880`02d1a000 fffff880`02d30000   vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
    fffff880`02d30000 fffff880`02d3f000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02d3f000 fffff880`02d5a000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
    fffff880`02d5a000 fffff880`02d6e000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
    fffff880`02d6e000 fffff880`02dbf000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
    fffff880`02dbf000 fffff880`02dcb000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
    fffff880`02dcb000 fffff880`02dd6000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
    fffff880`02dd6000 fffff880`02de0000   ElRawDsk ElRawDsk.sys Sat Jul 26 20:59:09 2008 (488B65ED)
    fffff880`02de0000 fffff880`02def000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
    fffff880`02def000 fffff880`02e00000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
    fffff880`03a00000 fffff880`03a22000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
    fffff880`03a22000 fffff880`03a7e000   HdAudio  HdAudio.sys  Tue Jul 14 03:06:59 2009 (4A5BCC23)
    fffff880`03a7e000 fffff880`03a97000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
    fffff880`03a97000 fffff880`03ab2000   USBSTOR  USBSTOR.SYS  Tue Jul 14 03:06:34 2009 (4A5BCC0A)
    fffff880`03ab2000 fffff880`03abf000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`03abf000 fffff880`03acb000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
    fffff880`03acb000 fffff880`03ad9000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
    fffff880`03adb000 fffff880`03b2a000   avgldx64 avgldx64.sys Tue Sep 07 03:49:29 2010 (4C858C19)
    fffff880`03b2a000 fffff880`03b50000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
    fffff880`03b50000 fffff880`03b66000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    fffff880`03b66000 fffff880`03bc0000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
    fffff880`03bc0000 fffff880`03bfd000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
    fffff880`03c00000 fffff880`03c11000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`03c11000 fffff880`03c67000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
    fffff880`03c67000 fffff880`03c82000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
    fffff880`03c82000 fffff880`03c90000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`03c90000 fffff880`03d84000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
    fffff880`03d84000 fffff880`03dca000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
    fffff880`03dca000 fffff880`03dee000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
    fffff880`03dee000 fffff880`03dff000   HECIx64  HECIx64.sys  Thu Sep 17 22:54:16 2009 (4AB293E8)
    fffff880`03e00000 fffff880`03e24000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`03e24000 fffff880`03e30000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
    fffff880`03e30000 fffff880`03e31480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
    fffff880`03e32000 fffff880`03e37200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
    fffff880`03e39000 fffff880`03fb6000   athrx    athrx.sys    Sat Oct 24 04:49:44 2009 (4AE25D38)
    fffff880`03fb6000 fffff880`03fc3000   vwifibus vwifibus.sys Tue Jul 14 03:07:21 2009 (4A5BCC39)
    fffff880`03fc3000 fffff880`03fd0000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
    fffff880`03fd0000 fffff880`03fe0000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`03fe0000 fffff880`03ff6000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
    fffff880`03ff6000 fffff880`03fff000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`04a00000 fffff880`04a0e000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
    fffff880`04a0e000 fffff880`04a16080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
    fffff880`04a17000 fffff880`04a18f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
    fffff880`04a1c000 fffff880`04bfe900   RTKVHD64 RTKVHD64.sys Tue Aug 18 12:29:10 2009 (4A8A7466)
    fffff880`04e27000 fffff880`04eef000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
    fffff880`04eef000 fffff880`04f0d000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
    fffff880`04f0d000 fffff880`04f25000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
    fffff880`04f25000 fffff880`04f52000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
    fffff880`04f52000 fffff880`04fa0000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
    fffff880`04fa0000 fffff880`04fc3000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
    fffff880`04fc3000 fffff880`04fcf000   AVGIDSFilter AVGIDSFilter.Sys Wed Aug 04 01:23:21 2010 (4C5896D9)
    fffff880`04fcf000 fffff880`04fda000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
    fffff880`04fda000 fffff880`04fec000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
    fffff880`0540c000 fffff880`05474000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
    fffff880`05474000 fffff880`0550a000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
    fffff880`0550a000 fffff880`0553b000   WUDFRd   WUDFRd.sys   Tue Jul 14 03:06:06 2009 (4A5BCBEE)
    fffff880`0553b000 fffff880`05571000   fastfat  fastfat.SYS  Tue Jul 14 02:23:28 2009 (4A5BC1F0)
    fffff880`0fe00000 fffff880`0fe0f000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`0fe0f000 fffff880`0fe52000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
    fffff880`0fe52000 fffff880`0fe64000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
    fffff880`0fe64000 fffff880`0fe79000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
    fffff880`0fe79000 fffff880`0fe9c000   nvhda64v nvhda64v.sys Tue Jun 22 01:07:25 2010 (4C1FE29D)
    fffff880`0fea2000 fffff880`10b33e00   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
    fffff880`10b34000 fffff880`10b35180   nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
    fffff880`10b36000 fffff880`10b87000   k57nd60a k57nd60a.sys Thu Aug 06 14:44:32 2009 (4A7AC220)
    fffff880`10b87000 fffff880`10bb6000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`10bb6000 fffff880`10bd7000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
    fffff880`10bd7000 fffff880`10bf1000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
    fffff880`10bf1000 fffff880`10c00000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff960`000d0000 fffff960`003df000   win32k   win32k.sys   Sat Jun 19 07:31:59 2010 (4C1C483F)
    fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff960`00760000 fffff960`00787000   cdd      cdd.dll      Wed May 19 22:48:26 2010 (4BF4408A)
    
    Unloaded modules:
    fffff880`05571000 fffff880`055e2000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01939000 fffff880`01947000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01947000 fffff880`01953000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01953000 fffff880`0195c000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0195c000 fffff880`0196f000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  3. Posts : 2
    Windows 7 Home Premium 64bit
    Thread Starter
       #3

    Cybercore,

    Thank you for the quick response. I will go ahead and implement the above said changes then follow up. I hope this works!
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 12:54.
Find Us