BSOD wind 7 while gaming


  1. Posts : 2
    Windows 7 Ultimate 32 bits
       #1

    BSOD wind 7 while gaming


    Hello, I have a laptop HP Pavilion 1428xd, 4g RAM, Graphic card ATI Radeon HD 3200 and SO Wind 7 Ultimate 32 bits

    The thing is that when I am playing video games, The BSOD shows up, I have the minidumps attached. Please help, I think that maybe is something to do with the drivers of the video card. I recently reinstalled Wind 7.

    Thanks,
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    Jose12345 said:
    Hello, I have a laptop HP Pavilion 1428xd, 4g RAM, Graphic card ATI Radeon HD 3200 and SO Wind 7 Ultimate 32 bits

    The thing is that when I am playing video games, The BSOD shows up, I have the minidumps attached. Please help, I think that maybe is something to do with the drivers of the video card. I recently reinstalled Wind 7.

    Thanks,

    Lets see 3+ year old AVira, 2 year old video drivers, 2 year old network driver.


    That might have something to do with it, you think?



    1-remove AVG and install MSE

    AV Uninstallers



    2-re-install current video driver

    When upgrading your graphic driver you MUST remove all traces of the current driver. In order to do that we recommend using Guru3D - Driver Sweeper

    When it is removed then download and install the fresh copy.

    3-update all your drivers


    How To Find Drivers:
    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
    - - The most common drivers are listed on this page: Driver Reference
    - - Driver manufacturer links are on this page: Drivers and Downloads





    edit It is avira NOT AVG!!
    Last edited by zigzag3143; 14 Oct 2010 at 03:10.
      My Computer


  3. Posts : 670
    Windows 7 x64
       #3

    101310-21933-01.dmp
    IRQL_NOT_LESS_OR_EQUAL (a)
    Probably caused by : hardware

    101210-27346-01.dmp
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    Probably caused by : bcmwl6.sys

    100710-21824-01.dmp
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    Probably caused by : atikmdag.sys

    101310-24226-01.dmp
    KMODE_EXCEPTION_NOT_HANDLED (1e) (Arg1: c0000005)
    Probably caused by : tcpip.sys




    1. Remove Avira, especially that one of its drivers is so outdated 2007. Install MSE to replace:

    avipbb.sys Tue Mar 24 17:47:23 2009
    avgio.sys Thu Feb 22 16:57:32 2007

    How To Get Remove Avira | Avira AntiVir Removal Tool for Windows reviews and free downloads

    http://www.microsoft.com/security_essentials/


    2. Uninstall Malware bytes, and then install its latest version:

    mbam.sys Wed May 13 18:20:33 2009

    Malwarebytes' Anti-Malware: Malwarebytes


    3. Update drivers - remove old, reboot, install new:

    bcmwl6.sys Fri Mar 27 02:58:48 2009
    Broadcom 802.11 Network Adapter wireless

    AtiPcie.sys Tue May 05 18:00:16 2009
    ATI PCIE Driver for ATI PCIE chipset

    atikmdag.sys Wed Aug 05 07:12:22 2009
    ATI Radeon Kernel Mode Driver

    enecir.sys Wed May 20 09:08:38 2009
    ENE Consumer IR Driver for eHome

    Apfiltr.sys Tue May 12 12:35:38 2009
    Alps Touch Pad

    HpqKbFiltr.sys Wed Apr 29 16:46:51 2009
    HP Quick Launch Buttons

    Rt86win7.sys Thu Feb 26 11:04:22 2009
    Realtek 8101E/8168/8169

    AGRSM.sys Mon Nov 10 16:56:37 2008
    Agere Soft Modem - update it or disable in device manager if not using it


    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101310-21933-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a4f000 PsLoadedModuleList = 0x82b97810
    Debug session time: Wed Oct 13 22:02:26.869 2010 (GMT-5)
    System Uptime: 0 days 1:40:05.914
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 1, 82ab6964}
    
    Probably caused by : hardware ( win32k!RawInputThread+486 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82ab6964, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bb7718
    Unable to read MiSystemVaType memory at 82b97160
     00000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiSwapContext+24
    82ab6964 0000            add     byte ptr [eax],al
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    TRAP_FRAME:  8bcb2a50 -- (.trap 0xffffffff8bcb2a50)
    ErrCode = 00000002
    eax=00000000 ebx=807d7000 ecx=00000000 edx=8001003b esi=86756678 edi=807dc800
    eip=82ab6964 esp=8bcb2ac4 ebp=86702388 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!KiSwapContext+0x24:
    82ab6964 0000            add     byte ptr [eax],al          ds:0023:00000000=??
    Resetting default scope
    
    MISALIGNED_IP: 
    nt!KiSwapContext+24
    82ab6964 0000            add     byte ptr [eax],al
    
    LAST_CONTROL_TRANSFER:  from 82ab6964 to 82a9582b
    
    STACK_TEXT:  
    8bcb2a50 82ab6964 badb0d00 8001003b 000000e1 nt!KiTrap0E+0x2cf
    8bcb2ad0 82abdb25 86756678 00000000 807d7120 nt!KiSwapContext+0x24
    8bcb2b08 82abc423 8673fb90 86756678 86753b14 nt!KiSwapThread+0x266
    8bcb2b30 82ab86ef 86756678 86753aa8 00000000 nt!KiCommitThreadWait+0x1df
    8bcb2ca8 820382a3 00000004 8670c5f8 00000001 nt!KeWaitForMultipleObjects+0x535
    8bcb2d04 82038586 00000004 00000002 8bcaa400 win32k!RawInputThread+0x486
    8bcb2d18 820fc340 00000004 0134fae8 8bcb2d34 win32k!xxxCreateSystemThreads+0x4a
    8bcb2d28 82a9244a 00000004 0134fb28 771064f4 win32k!NtUserCallNoParam+0x1b
    8bcb2d28 771064f4 00000004 0134fb28 771064f4 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0134fb28 00000000 00000000 00000000 00000000 0x771064f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!RawInputThread+486
    820382a3 8945f8          mov     dword ptr [ebp-8],eax
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  win32k!RawInputThread+486
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  IP_MISALIGNED
    
    BUCKET_ID:  IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101210-27346-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a04000 PsLoadedModuleList = 0x82b4c810
    Debug session time: Tue Oct 12 08:17:13.907 2010 (GMT-5)
    System Uptime: 0 days 1:13:16.951
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ......
    Unable to load image \SystemRoot\system32\DRIVERS\bcmwl6.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for bcmwl6.sys
    *** ERROR: Module load completed but symbols could not be loaded for bcmwl6.sys
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: 80000003, The exception code that was not handled
    Arg2: 8ff24770, The address that the exception occurred at
    Arg3: 82b2aa80, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - <Unable to get error code text>
    
    FAULTING_IP: 
    bcmwl6+63770
    8ff24770 cc              int     3
    
    TRAP_FRAME:  82b2aa80 -- (.trap 0xffffffff82b2aa80)
    ErrCode = 00000000
    eax=ffffff00 ebx=862a6390 ecx=82b30e02 edx=862bea50 esi=862a6438 edi=862a61d8
    eip=8ff24771 esp=82b2aaf4 ebp=82b2ab08 iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00000202
    bcmwl6+0x63771:
    8ff24771 cc              int     3
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 8aa04774 to 8ff24771
    
    STACK_TEXT:  
    WARNING: Stack unwind information not available. Following frames may be wrong.
    82b2ab08 8aa04774 00000000 862a6438 00000000 bcmwl6+0x63771
    82b2ab38 82a6e04d 862bea78 002bea40 bad6c4d8 ndis!ndisMTimerObjectDpc+0xbc
    82b2ab7c 82a6dff1 82b2dd20 82b2aca8 00000001 nt!KiProcessTimerDpcTable+0x50
    82b2ac68 82a6deae 82b2dd20 82b2aca8 00000000 nt!KiProcessExpiredTimerList+0x101
    82b2acdc 82a6c20e 00044cfe 85622488 82b37280 nt!KiTimerExpiration+0x25c
    82b2ad20 82a6c038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
    82b2ad24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
    
    
    STACK_COMMAND:  .bugcheck ; kb
    
    FOLLOWUP_IP: 
    bcmwl6+63770
    8ff24770 cc              int     3
    
    SYMBOL_NAME:  bcmwl6+63770
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: bcmwl6
    
    IMAGE_NAME:  bcmwl6.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  49cc24c8
    
    FAILURE_BUCKET_ID:  0x8E_bcmwl6+63770
    
    BUCKET_ID:  0x8E_bcmwl6+63770
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmvm bcmwl6
    start    end        module name
    8fec1000 8ffd9000   bcmwl6   T (no symbols)           
        Loaded symbol image file: bcmwl6.sys
        Image path: \SystemRoot\system32\DRIVERS\bcmwl6.sys
        Image name: bcmwl6.sys
        Timestamp:        Fri Mar 27 02:58:48 2009 (49CC24C8)
        CheckSum:         0011A306
        ImageSize:        00118000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100710-21824-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82843000 PsLoadedModuleList = 0x8298b810
    Debug session time: Fri Oct  8 07:06:23.011 2010 (GMT-5)
    System Uptime: 0 days 0:14:21.056
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {d, 0, 0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for atikmdag.sys
    *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
    Probably caused by : atikmdag.sys ( atikmdag+2d70c0 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000d, EXCEPTION_GP_FAULT
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_d
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 9010d0c0 to 82889f6b
    
    STACK_TEXT:  
    93fd7c14 9010d0c0 badb0d00 902bdce8 865ffe08 nt!KiSystemFatalException+0xf
    WARNING: Stack unwind information not available. Following frames may be wrong.
    93fd7c84 93fd7d20 00000020 00000000 902bdce8 atikmdag+0x2d70c0
    93fd7ca0 8ff7bfec 00000003 93fd7d20 00000000 0x93fd7d20
    93fd7d50 82a516d3 902bdc90 beba27e8 00000000 atikmdag+0x145fec
    93fd7d90 829030f9 8ff7be30 902bdc90 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    atikmdag+2d70c0
    9010d0c0 ??              ???
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  atikmdag+2d70c0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: atikmdag
    
    IMAGE_NAME:  atikmdag.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a8a1a1e
    
    FAILURE_BUCKET_ID:  0x7f_d_atikmdag+2d70c0
    
    BUCKET_ID:  0x7f_d_atikmdag+2d70c0
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101310-24226-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a47000 PsLoadedModuleList = 0x82b8f810
    Debug session time: Thu Oct 14 05:23:59.190 2010 (GMT-5)
    System Uptime: 0 days 1:21:09.234
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ......
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 95126340, The address that the exception occurred at
    Arg3: 00000000, Parameter 0 of the exception
    Arg4: 00000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    +0
    95126340 5c              pop     esp
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  00000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82baf718
    Unable to read MiSystemVaType memory at 82b8f160
     00000000 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  Skype.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82b233b1 to 82b23d10
    
    STACK_TEXT:  
    951262f4 82b233b1 0000001e c0000005 95126340 nt!KeBugCheckEx+0x1e
    95126310 82ad6fba 0000001e 82ab1494 00000001 nt!KipFatalFilter+0x16
    95126990 8ac9c210 8ac9c407 951269b8 00000000 nt!KeExpandKernelStackAndCalloutEx+0x142
    951269d0 8e819783 8557de30 95126a04 85fcbf80 tcpip!UdpTlProviderSendMessages+0x67
    951269e8 8e83972f 853e1838 95126a04 853e1838 afd!AfdTLSendMessages+0x27
    95126a40 8e839398 853e1838 85fcbf80 1b90e9e0 afd!AfdTLFastDgramSend+0x7d
    95126ab0 8e8293e1 853e1838 95126b6c 00000043 afd!AfdFastDatagramSend+0x5d3
    95126c28 82ca1985 85c69301 00000001 0e15e99c afd!AfdFastIoDeviceControl+0x3dc
    95126cd0 82ca453a 86122600 00000b34 00000000 nt!IopXxxControlFile+0x2d0
    95126d04 82a8a448 00000758 00000b34 00000000 nt!NtDeviceIoControlFile+0x2a
    95126d04 772b64f4 00000758 00000b34 00000000 nt!KiFastCallEntry+0x128
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0e15ea58 00000000 00000000 00000000 00000000 0x772b64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tcpip!UdpTlProviderSendMessages+67
    8ac9c210 33c9            xor     ecx,ecx
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  tcpip!UdpTlProviderSendMessages+67
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c15a3db
    
    FAILURE_BUCKET_ID:  0x1E_tcpip!UdpTlProviderSendMessages+67
    
    BUCKET_ID:  0x1E_tcpip!UdpTlProviderSendMessages+67
    
    Followup: MachineOwner
    80bc8000 80bd0000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
    822d0000 8251a000   win32k   win32k.sys   Sat Jun 19 07:06:50 2010 (4C1C425A)
    82530000 82539000   TSDDD    TSDDD.dll    unavailable (00000000)
    82560000 8257e000   cdd      cdd.dll      Tue Jul 14 04:04:18 2009 (4A5BD992)
    82a10000 82a47000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
    82a47000 82e57000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
    8a400000 8a41c000   avipbb   avipbb.sys   Tue Mar 24 17:47:23 2009 (49C9008B)
    8a434000 8a43f000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
    8a43f000 8a450000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
    8a450000 8a458000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
    8a458000 8a49a000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    8a49a000 8a545000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
    8a545000 8a5b6000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
    8a5b6000 8a5c4000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    8a5c4000 8a5cf000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
    8a5cf000 8a5dd000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
    8a5dd000 8a5f4000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
    8a5f4000 8a5ff000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
    8a603000 8a64b000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
    8a64b000 8a654000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
    8a654000 8a65c000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
    8a65c000 8a686000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
    8a686000 8a691000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
    8a691000 8a6a2000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
    8a6a2000 8a6aa000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    8a6aa000 8a6b5000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
    8a6b5000 8a6c5000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    8a6c5000 8a710000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
    8a710000 8a717000   pciide   pciide.sys   Tue Jul 14 02:11:19 2009 (4A5BBF17)
    8a717000 8a725000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
    8a725000 8a73b000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
    8a73b000 8a744000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
    8a744000 8a767000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
    8a767000 8a771000   msahci   msahci.sys   Tue Jul 14 02:45:50 2009 (4A5BC72E)
    8a771000 8a77a000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
    8a77a000 8a7ae000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
    8a7ae000 8a7bf000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    8a7bf000 8a7de000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
    8a7de000 8a7ff000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
    8a800000 8a80e000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    8a80e000 8a817000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
    8a817000 8a824000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
    8a824000 8a82c000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
    8a82c000 8a834000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
    8a835000 8a964000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
    8a964000 8a98f000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
    8a98f000 8a9a2000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
    8a9a2000 8a9ff000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
    8aa00000 8aa0c000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
    8aa0c000 8aa14000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    8aa15000 8aacc000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
    8aacc000 8ab0a000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
    8ab0a000 8ab2f000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
    8ab2f000 8ab5c000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
    8ab5c000 8ab8e000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
    8ab8e000 8ab9f000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
    8ab9f000 8abc4000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
    8abf7000 8abfe000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
    8ac00000 8ac10000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
    8ac10000 8ac18000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
    8ac18000 8ac21000   hpdskflt hpdskflt.sys Fri Jul 16 18:02:49 2010 (4C407499)
    8ac21000 8ac28000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
    8ac28000 8ad71000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
    8ad71000 8ada2000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
    8ada2000 8adaa380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
    8adab000 8adea000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
    8adea000 8adf2000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
    8adf2000 8adfa000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:16 2009 (4A005480)
    8e817000 8e871000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
    8e871000 8e8a3000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
    8e8a3000 8e8aa000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
    8e8aa000 8e8c9000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
    8e8c9000 8e8da000   vwififlt vwififlt.sys Tue Jul 14 02:52:03 2009 (4A5BC8A3)
    8e8da000 8e8e8000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
    8e8e8000 8e8fb000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
    8e8fb000 8e90b000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
    8e90b000 8e910a00   ssmdrv   ssmdrv.sys   Tue May 05 13:05:18 2009 (4A000F5E)
    8e911000 8e952000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
    8e952000 8e95c000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
    8e95c000 8e966000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    8e966000 8e972000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
    8e972000 8e9d6000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
    8e9d6000 8e9ee000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
    8e9ee000 8e9fc000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
    8e9fc000 8e9fd800   avgio    avgio.sys    Thu Feb 22 16:57:32 2007 (45DDAF5C)
    8fe00000 8fe0e000   circlass circlass.sys Tue Jul 14 02:51:17 2009 (4A5BC875)
    8fe0e000 8fe1c000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
    8fe3c000 8fe5d000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
    8fe5d000 8fe6e000   amdppm   amdppm.sys   Tue Jul 14 02:11:03 2009 (4A5BBF07)
    8fe6e000 8ff25000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
    8ff25000 8ff37000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
    8ff37000 8ff4f000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
    8ff4f000 8ff71000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
    8ff71000 8ff89000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
    8ff89000 8ffa0000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
    8ffa0000 8ffb7000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
    8ffb7000 8ffc1000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
    8ffc1000 8fff5000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
    90000000 90019000   enecir   enecir.sys   Wed May 20 09:08:38 2009 (4A139E66)
    90019000 90022000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
    90022000 9002f000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
    90037000 9054c000   atikmdag atikmdag.sys Wed Aug 05 07:12:22 2009 (4A7906A6)
    9054c000 90585000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
    90585000 905a4000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
    905a4000 905bd000   sdbus    sdbus.sys    Tue Jul 14 02:19:26 2009 (4A5BC0FE)
    905bd000 905f3000   Apfiltr  Apfiltr.sys  Tue May 12 12:35:38 2009 (4A0942EA)
    905f3000 905fe000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
    90600000 90618000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
    90618000 90621000   HpqKbFiltr HpqKbFiltr.sys Wed Apr 29 16:46:51 2009 (49F85A4B)
    90621000 9062e000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    9062e000 9063b000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    9063d000 90755000   bcmwl6   bcmwl6.sys   Fri Mar 27 02:58:48 2009 (49CC24C8)
    90755000 9075f000   vwifibus vwifibus.sys Tue Jul 14 02:52:02 2009 (4A5BC8A2)
    9075f000 90784000   Rt86win7 Rt86win7.sys Thu Feb 26 11:04:22 2009 (49A65B16)
    90784000 9078e000   usbohci  usbohci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    9078e000 907d9000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
    907d9000 907de080   usbfilter usbfilter.sys Fri Apr 03 14:39:45 2009 (49D5F581)
    907df000 907ee000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    907ee000 907f1700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    907f2000 907fe000   Accelerometer Accelerometer.sys Fri Jul 16 18:02:49 2010 (4C407499)
    907fe000 907ff380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    94a07000 94a4b000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
    94a4b000 94a5c000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
    94a5c000 94a79000   AtiHdmi  AtiHdmi.sys  Fri Jul 24 09:32:52 2009 (4A695594)
    94a79000 94aa8000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
    94aa8000 94ac1000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
    94ac1000 94b11000   HdAudio  HdAudio.sys  Tue Jul 14 02:51:46 2009 (4A5BC892)
    94b11000 94b25000   avgntflt avgntflt.sys Thu Nov 19 13:44:09 2009 (4B052F89)
    94b25000 94b3f000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
    94b3f000 94b4f000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
    94b4f000 94b95000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
    94b95000 94ba5000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
    94ba5000 94bb8000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
    95a01000 95b07000   AGRSM    AGRSM.sys    Mon Nov 10 16:56:37 2008 (49184BA5)
    95b07000 95b08700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
    95b09000 95b16000   modem    modem.sys    Tue Jul 14 02:55:24 2009 (4A5BC96C)
    95b16000 95b25000   hidir    hidir.sys    Tue Jul 14 02:51:04 2009 (4A5BC868)
    95b25000 95b38000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
    95b38000 95b3e480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
    95b3f000 95b4b000   kbdhid   kbdhid.sys   Tue Jul 14 02:45:09 2009 (4A5BC705)
    95b4b000 95b56000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    95b56000 95b60000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
    95b60000 95b6d000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    95b6d000 95b78000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
    95b78000 95b82000   dump_msahci dump_msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    95b82000 95b93000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
    95b93000 95b9e000   hidusb   hidusb.sys   Tue Jul 14 02:51:04 2009 (4A5BC868)
    95b9e000 95bb5000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
    95bb5000 95bd8b80   usbvideo usbvideo.sys Thu Mar 04 06:04:40 2010 (4B8F3158)
    95bd9000 95be4000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
    95be4000 95bff000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
    97200000 97221000   srvnet   srvnet.sys   Tue Jun 22 05:47:09 2010 (4C20242D)
    97229000 972ae000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
    972ae000 972c7000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
    972c7000 972d9000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
    972d9000 972fc000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
    972fc000 97337000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
    97337000 97352000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
    97352000 973e9000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
    973e9000 973f3000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
    973f3000 97400000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
    9847e000 984cd000   srv2     srv2.sys     Tue Jun 22 05:47:19 2010 (4C202437)
    984cd000 9851e000   srv      srv.sys      Tue Jun 22 05:47:32 2010 (4C202444)
    9851e000 98521080   mbam     mbam.sys     Wed May 13 18:20:33 2009 (4A0AE541)
    
    Unloaded modules:
    98414000 9847e000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    97352000 9736a000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8abc4000 8abd1000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8abd1000 8abdc000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8abdc000 8abe6000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8abe6000 8abf7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    101310-21933-01.dmp
    IRQL_NOT_LESS_OR_EQUAL (a)
    Probably caused by : hardware

    101310-24226-01.dmp
    KMODE_EXCEPTION_NOT_HANDLED (1e) (Arg1: c0000005)
    Probably caused by : tcpip.sys



    If new drivers won't fix it,

    run memtest overnight:

    RAM - Test with Memtest86+


    test the video card too:

    FurMark: VGA Stress Test, Graphics Card and GPU Stability Test, OpenGL Benchmark and GPU Temperature
      My Computer


  5. Posts : 2
    Windows 7 Ultimate 32 bits
    Thread Starter
       #5

    cybercore said:
    [COLOR="DarkBlue"]

    3. Update drivers - remove old, reboot, install new:

    bcmwl6.sys Fri Mar 27 02:58:48 2009
    Broadcom 802.11 Network Adapter wireless

    AtiPcie.sys Tue May 05 18:00:16 2009
    ATI PCIE Driver for ATI PCIE chipset

    atikmdag.sys Wed Aug 05 07:12:22 2009
    ATI Radeon Kernel Mode Driver

    enecir.sys Wed May 20 09:08:38 2009
    ENE Consumer IR Driver for eHome

    Apfiltr.sys Tue May 12 12:35:38 2009
    Alps Touch Pad

    HpqKbFiltr.sys Wed Apr 29 16:46:51 2009
    HP Quick Launch Buttons

    Rt86win7.sys Thu Feb 26 11:04:22 2009
    Realtek 8101E/8168/8169

    AGRSM.sys Mon Nov 10 16:56:37 2008
    Agere Soft Modem - update it or disable in device manager if not using it

    [/code]
    thanks for your answers guys, i ill try to do all of them.. But, can you tell me how can i do to remove those drivers, and also how to find others(with a program or just google them by the exact name?). Sorry for not knowing too about computers well...but ill do my best!

    ill let you know the results :)
    bye
      My Computer


  6. Posts : 670
    Windows 7 x64
       #6

    HP®


    bcmwl6.sys Fri Mar 27 02:58:48 2009
    Broadcom 802.11 Network Adapter wireless
    HP®
    Broadcom.com - Ethernet NIC Driver Downloads

    AtiPcie.sys Tue May 05 18:00:16 2009
    ATI PCIE Driver for ATI PCIE chipset
    atikmdag.sys Wed Aug 05 07:12:22 2009
    ATI Radeon Kernel Mode Driver
    HP®
    Graphics Drivers & Software

    enecir.sys Wed May 20 09:08:38 2009
    ENE Consumer IR Driver for eHome

    Apfiltr.sys Tue May 12 12:35:38 2009
    Alps Touch Pad
    HP®

    HpqKbFiltr.sys Wed Apr 29 16:46:51 2009
    HP Quick Launch Buttons
    HP®

    Rt86win7.sys Thu Feb 26 11:04:22 2009
    Realtek 8101E/8168/8169
    HP®
    Realtek

    AGRSM.sys Mon Nov 10 16:56:37 2008
    Agere Soft Modem - update it or disable in device manager if not using it
    HP®
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:39.
Find Us