Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD when exiting programs/games sometimes

18 Dec 2010   #1
ezekiel87

Windows 7 Professional, 32bit
 
 
BSOD when exiting programs/games sometimes

ok, i wrote this in a similar thread started by someone else, but got no answer for the last two days, so i'm making a new thread.

I'm getting BSODs on windows 7 - for about 10 months now (i'm serious!)

I've been using Windows 7 Professional 64bit from february till july 2010, and Windows 7 Professional 32bit from july until two weeks ago. BSODs appeared on both versions, when exiting a game but not always (Counter-strike, half-life2 deathmatch, even quake live etc).

Searched a bit on the net, found similar topics even on this forum, but no real solution.

so i'm attaching the content from the minidump folder. it's only from my win 7 32bit, i have no files left from my win 7 64bit installation (prior to july).
i find the issues quite similar to alexseven's description, i've seen BSODs more often when exiting Counter-Strike (maybe because it's my most played game). About 1 of 10 times when pressing quit in the game, would result in a BSOD - saying something about cdd.dll, sometimes win32k.sys, sometimes no file was specified. While the BSOD was on my screen, a buzzing noise could be heared from my speakers (I've disabled the automatic restart, so i can get to read the messages in the BSOD - i even took pictures of them, and could hear the noise untill i would reset my PC manually).
I got BSODs not only in games, but also when exiting Steam, and sometimes Yahoo messenger (v 10).
I don't know if it matters, but i use iTunes quite often so it was running most of the time on my computer.

I was suspecting the video card to be faulty (which i purchased just before i've migrated to windows 7 - thanks to MS Academic Alliance for the free license, btw ). Unfortunately, the video card seems to be working properly, since i'm running windows XP again for about two weeks now, and there's no sign of any BSOD on windows XP (and i'm spending more time in games - mainly Counter-strike - than i was spending in the last weeks or so, on windows 7).

forgot to mention: during the months spent running windows 7 (either 32 or 64bit version) i've tried several versions of display driver, some from the asus site, others directly from amd/ati site. got BSODs on all, don't remember if there was a differrence in the frequency of BSODs between each driver version.


My System SpecsSystem Spec
.
18 Dec 2010   #2
cybercore

Windows 7 x64
 
 

1. Remove Avira and install MSE as the replacement:

avgntflt.sys Thu Nov 11 10:54:47 2010

http://www.microsoft.com/security_essentials/



2. Update :

AmdLLD.sys Fri Jun 29 15:47:32 2007
AMD Low Level Device Driver

atipmdag.sys Fri Dec 11 15:31:46 2009
ATI video card

EIO1.sys Wed Aug 08 03:15:17 2007
ASUS Kernel Mode Driver

Visit both ASUS and NVIDIA support sites to check for nForce (motherboard) updates:
nvmf6232.sys Thu Jul 30 19:47:55 2009






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110610-20389-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e39000 PsLoadedModuleList = 0x82f81810
Debug session time: Sat Nov  6 06:23:21.913 2010 (UTC - 5:00)
System Uptime: 0 days 3:14:42.880
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 82ec3f21, 8ce13a94, 0}

Probably caused by : cdd.dll ( cdd!CGuardMutex::Enter+d )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ec3f21, The address that the exception occurred at
Arg3: 8ce13a94, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+1a
82ec3f21 f00fba3000      lock btr dword ptr [eax],0

TRAP_FRAME:  8ce13a94 -- (.trap 0xffffffff8ce13a94)
ErrCode = 00000002
eax=00000000 ebx=8922207e ecx=00000000 edx=00000001 esi=00000000 edi=8560ea38
eip=82ec3f21 esp=8ce13b08 ebp=8ce13b28 iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x1a:
82ec3f21 f00fba3000      lock btr dword ptr [eax],0   ds:0023:00000000=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 963572c9 to 82ec3f21

STACK_TEXT:  
8ce13b0c 963572c9 ffa0d018 9635a8d4 ffa0d018 nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x1a
8ce13b14 9635a8d4 ffa0d018 00000000 00000000 cdd!CGuardMutex::Enter+0xd
8ce13b28 9635b7c7 0043bfef ffa0d018 fe7105d0 cdd!CddBitmap::RemoveFromCddBitmapList+0x28
8ce13b5c 96351753 ffa0d018 8ce13bfc 9618d50c cdd!CddBitmapHw::Release+0x7d
8ce13b68 9618d50c ffa0d018 00000002 8ce13c20 cdd!DrvDeleteDeviceBitmapEx+0x39
8ce13bfc 9618e920 00000001 00000000 fb051d03 win32k!SURFACE::bDeleteSurface+0x235
8ce13c10 96190e1d 00000001 00000001 fe7105d0 win32k!SURFREF::bDeleteSurface+0x14
8ce13c24 961905bd 00000f34 00000001 00000f34 win32k!vCleanupSurfaces+0x43
8ce13c44 9618c25a ffa85ba8 00000000 00000000 win32k!NtGdiCloseProcess+0xc5
8ce13c64 9618eb3f ffa85ba8 00000000 86b203c8 win32k!GdiProcessCallout+0x151
8ce13c80 83081b98 84fb8110 00000000 ad1bd2d7 win32k!W32pProcessCallout+0x5d
8ce13cfc 8309adc7 00000000 ffffffff 0017f918 nt!PspExitThread+0x46d
8ce13d24 82e7c44a ffffffff 00000000 0017f924 nt!NtTerminateProcess+0x1fa
8ce13d24 776d64f4 ffffffff 00000000 0017f924 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0017f924 00000000 00000000 00000000 00000000 0x776d64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
cdd!CGuardMutex::Enter+d
963572c9 c7460401000000  mov     dword ptr [esi+4],1

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  cdd!CGuardMutex::Enter+d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: cdd

IMAGE_NAME:  cdd.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bd992

FAILURE_BUCKET_ID:  0x8E_cdd!CGuardMutex::Enter+d

BUCKET_ID:  0x8E_cdd!CGuardMutex::Enter+d

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\112610-16988-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e05000 PsLoadedModuleList = 0x82f4d810
Debug session time: Fri Nov 26 14:46:57.801 2010 (UTC - 5:00)
System Uptime: 0 days 2:02:32.768
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 961bbf11, 9a0c3b98, 0}

Probably caused by : win32k.sys ( win32k!HmgLockEx+67 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 961bbf11, The address that the exception occurred at
Arg3: 9a0c3b98, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
win32k!HmgLockEx+67
961bbf11 0fb74f08        movzx   ecx,word ptr [edi+8]

TRAP_FRAME:  9a0c3b98 -- (.trap 0xffffffff9a0c3b98)
ErrCode = 00000000
eax=84f6ac10 ebx=00000000 ecx=ffbbf000 edx=00000950 esi=ff800000 edi=00000000
eip=961bbf11 esp=9a0c3c0c ebp=9a0c3c30 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
win32k!HmgLockEx+0x67:
961bbf11 0fb74f08        movzx   ecx,word ptr [edi+8]     ds:0023:00000008=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 961bd68f to 961bbf11

STACK_TEXT:  
9a0c3c30 961bd68f 00000000 96171966 fe7aa8e8 win32k!HmgLockEx+0x67
9a0c3c38 96171966 fe7aa8e8 9a0c3c70 9616cd17 win32k!HmgLock+0x7
9a0c3c44 9616cd17 00000000 00000000 fe7aa8e8 win32k!GreReferenceObject+0x16
9a0c3c54 9616cda6 4d120ede 00000001 00000000 win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x27
9a0c3c70 961bf730 4d120ede 4d120ede fe7aa8e8 win32k!SFMLOGICALSURFACE::DeInitialize+0x21
9a0c3c88 9616d313 fe7aa8e8 00000001 00000000 win32k!bhLSurfDestroyLogicalSurfaceObject+0x31
9a0c3cac 96171d88 ffb8b748 00000000 0c3c4c8e win32k!GreSfmCloseCompositorRef+0x8b
9a0c3d1c 82e4844a 4d120ede 00000008 00000000 win32k!NtGdiHLSurfSetInformation+0x110
9a0c3d1c 775c64f4 4d120ede 00000008 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
02e7f6e0 00000000 00000000 00000000 00000000 0x775c64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!HmgLockEx+67
961bbf11 0fb74f08        movzx   ecx,word ptr [edi+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!HmgLockEx+67

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dbbb5

FAILURE_BUCKET_ID:  0x8E_win32k!HmgLockEx+67

BUCKET_ID:  0x8E_win32k!HmgLockEx+67

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120210-19531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e4f000 PsLoadedModuleList = 0x82f97810
Debug session time: Thu Dec  2 13:35:29.010 2010 (UTC - 5:00)
System Uptime: 0 days 1:07:12.977
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 961dbf11, 9b71bb98, 0}

Probably caused by : win32k.sys ( win32k!HmgLockEx+67 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 961dbf11, The address that the exception occurred at
Arg3: 9b71bb98, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
win32k!HmgLockEx+67
961dbf11 0fb74f08        movzx   ecx,word ptr [edi+8]

TRAP_FRAME:  9b71bb98 -- (.trap 0xffffffff9b71bb98)
ErrCode = 00000000
eax=84fd1d48 ebx=00000000 ecx=ffbbf000 edx=00000a08 esi=ff800000 edi=00000000
eip=961dbf11 esp=9b71bc0c ebp=9b71bc30 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
win32k!HmgLockEx+0x67:
961dbf11 0fb74f08        movzx   ecx,word ptr [edi+8]     ds:0023:00000008=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 961dd68f to 961dbf11

STACK_TEXT:  
9b71bc30 961dd68f 00000000 96191966 fdebc370 win32k!HmgLockEx+0x67
9b71bc38 96191966 fdebc370 9b71bc70 9618cd17 win32k!HmgLock+0x7
9b71bc44 9618cd17 00000000 00000000 fdebc370 win32k!GreReferenceObject+0x16
9b71bc54 9618cda6 aa121666 00000001 00000000 win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x27
9b71bc70 961df730 aa121666 aa121666 fdebc370 win32k!SFMLOGICALSURFACE::DeInitialize+0x21
9b71bc88 9618d313 fdebc370 00000001 00000000 win32k!bhLSurfDestroyLogicalSurfaceObject+0x31
9b71bcac 96191d88 ffb8b748 00000000 0d43cc84 win32k!GreSfmCloseCompositorRef+0x8b
9b71bd1c 82e9244a aa121666 00000008 00000000 win32k!NtGdiHLSurfSetInformation+0x110
9b71bd1c 76f764f4 aa121666 00000008 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0163f708 00000000 00000000 00000000 00000000 0x76f764f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!HmgLockEx+67
961dbf11 0fb74f08        movzx   ecx,word ptr [edi+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!HmgLockEx+67

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dbbb5

FAILURE_BUCKET_ID:  0x8E_win32k!HmgLockEx+67

BUCKET_ID:  0x8E_win32k!HmgLockEx+67

Followup: MachineOwner
---------


Drivers:

Code:
start    end        module name
88f37000 88f7f000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8d63d000 8d697000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
8eb4d000 8eb5f000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8e108000 8e11a000   amdk8    amdk8.sys    Mon Jul 13 19:11:03 2009 (4A5BBF07)
8f38c000 8f39b000   AmdLLD   AmdLLD.sys   Fri Jun 29 15:47:32 2007 (468561D4)
890ef000 890f8000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
991f6000 991ff000   asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
88ff2000 88ffb000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
89029000 8904c000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
95b53000 95b71000   AtiHdmi  AtiHdmi.sys  Wed Nov 18 18:25:03 2009 (4B04824F)
8e000000 8e024000   atikmpag atikmpag.sys Fri Dec 11 14:50:53 2009 (4B22A29D)
8ee17000 8f358000   atipmdag atipmdag.sys Fri Dec 11 15:31:46 2009 (4B22AC32)
8eb07000 8eb40000   au0uoekx au0uoekx.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
8ee00000 8ee15000   avgntflt avgntflt.sys Thu Nov 11 10:54:47 2010 (4CDC11C7)
8e0c4000 8e0e7000   avipbb   avipbb.sys   Thu May 27 10:11:26 2010 (4BFE7D8E)
897a8000 897af000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8e0b6000 8e0c4000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
88c1e000 88c26000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
970bc000 970d5000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
963b0000 963ce000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
89782000 897a1000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
88c68000 88d13000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
896fe000 89723000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
88c26000 88c68000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
89399000 893f6000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
8eb40000 8eb4d000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
95b7b000 95b88000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8e03a000 8e09e000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8e09e000 8e0b6000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8d795000 8d7a1000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
896ed000 896fe000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
95b3a000 95b53000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
95bc9000 95bda000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
95b92000 95bc9000   dump_nvstor32 dump_nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
95b88000 95b92000   dump_storport dump_storport.sys Mon Jul 12 23:24:27 2010 (4C3BDC6B)
95b71000 95b7b000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
8ea17000 8eace000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
8eace000 8eb07000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
97167000 9716a180   EIO1     EIO1.sys     Wed Aug 08 03:15:17 2007 (46B96D85)
8e11a000 8e125000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
8912c000 8913d000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8ebf4000 8ebfe000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
890f8000 8912c000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8920e000 89217000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
896bb000 896ed000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
895b0000 895e1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
8e1ef000 8e1f4280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
82e18000 82e4f000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8e1d0000 8e1ef000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
95be5000 95bf8000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
95bf8000 95bfe480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
95bda000 95be5000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
97037000 970bc000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
896b3000 896bb000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8e147000 8e15f000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8e15f000 8e16c000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80ba1000 80ba9000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8f358000 8f38c000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
89386000 89399000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
89442000 89467000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
8e024000 8e034000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8d600000 8d61b000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
88c02000 88c0d000   mcupdate mcupdate.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
9580d000 95818000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
8ea00000 8ea0d000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
95802000 9580d000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
88ddd000 88df3000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
970d5000 970e7000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
970e7000 9710a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
9710a000 97145000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
97145000 97160000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
89608000 89613000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
88f7f000 88f87000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8935b000 89386000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8d78b000 8d795000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
896a3000 896b3000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8913d000 891f4000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
8eb77000 8eb82000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8eb82000 8eba4000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
8f3ed000 8f3fe000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
8d6ef000 8d6fd000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8d697000 8d6c9000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
89404000 89442000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
89613000 89621000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8d781000 8d78b000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82e4f000 8325f000   nt       ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
8922c000 8935b000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
897a1000 897a8000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
8d7a1000 8d7e5880   nvmf6232 nvmf6232.sys Thu Jul 30 19:47:55 2009 (4A72312B)
8904c000 89071000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
890b8000 890ef000   nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
8d6d0000 8d6ef000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8e12f000 8e147000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
88fbc000 88fcd000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
97160000 97167000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
88f92000 88fbc000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
88fdd000 88fe4000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
88fe4000 88ff2000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
89200000 8920e000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9901d000 990b4000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
95b0b000 95b3a000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
88c0d000 88c1e000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8eb5f000 8eb77000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
8eba4000 8ebbc000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8ebbc000 8ebd3000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
8ebd3000 8ebea000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8d740000 8d781000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8ebea000 8ebf4000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
897e9000 897f1000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
897f1000 897f9000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
89600000 89608000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
89676000 896a3000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8d7e6000 8d7f9000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
9581b000 95b0af80   RTKVHDA  RTKVHDA.sys  Fri Apr 30 04:59:05 2010 (4BDA9BD9)
88f11000 88f37000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
990b4000 990be000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
8e125000 8e12f000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8d6fd000 8d717000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
8966e000 89676000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
88e15000 88f08000   spsc     spsc.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
9913b000 9918c000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
990ec000 9913b000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
990be000 990df000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
8d73a000 8d73fa00   ssmdrv   ssmdrv.sys   Tue May 05 06:05:18 2009 (4A000F5E)
89071000 890b8000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
8ea0d000 8ea0e380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
89467000 895b0000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
990df000 990ec000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
89621000 8962c000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
89000000 89017000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8d72a000 8d73a000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
96380000 96389000   TSDDD    TSDDD.dll    Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8e0e7000 8e108000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
8f39b000 8f3a9000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
95800000 95801700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
8e1c1000 8e1d0000   usbehci  usbehci.sys  Fri Oct 23 23:58:55 2009 (4AE27B7F)
8f3a9000 8f3ed000   usbhub   usbhub.sys   Sat Oct 24 00:00:05 2009 (4AE27BC5)
8e16c000 8e176000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
8e176000 8e1c1000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
88f87000 88f92000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
897af000 897bb000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
897bb000 897dc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
895e1000 895e9380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
88fcd000 88fdd000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88d92000 88ddd000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8962f000 8966e000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
8d717000 8d72a000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
897dc000 897e9000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
88d13000 88d84000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
88d84000 88d92000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8d6c9000 8d6d0000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
96120000 9636b000   win32k   win32k.sys   Tue Aug 31 22:34:29 2010 (4C7DBBB5)
88f08000 88f11000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8d61b000 8d635000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)

Unloaded modules:
9918c000 991f6000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
89723000 89730000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
89730000 8973a000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
8973a000 89771000   dump_nvstor3
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00037000
89771000 89782000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
My System SpecsSystem Spec
Reply

 BSOD when exiting programs/games sometimes




Thread Tools




Similar help and support threads
Thread Forum
BSOD when exiting games/programs/anything
Hi! I've been having a lot of issues with BSODs lately where I exit a program like Chrome, Skype, Steam games, etc. and on exit my computer BSODs. On start-up, I then have to reinstall the drivers for my USB WiFi adapter (NETGEAR A6200 Wifi USB Adapter). That part happens without fail. It isn't...
BSOD Help and Support
BSOD after exiting games
Hello everyone, first time poster, though I do wish I didn't have to =p I am generally an avid PC gamer, and play games on Steam on my custom built PC. Lately, I have been getting BSODs after exiting games. This does not happen every time, and the game seems to vary. The three times it has...
BSOD Help and Support
BSOD's when exiting programs
Hello, I've experienced several BSOD's for the past two weeks. I noticed that they happen when exiting certain programs such as - Sierrachart/Transact (both of these programs run together as one platform)- when pressing the X button to quit and after pressing YES to quit when asked by the...
BSOD Help and Support
BSOD after exiting games.
Hi, this desktop have been around for 3-4 years and i decided to upgrade the specs to use it again. Before i had the PSU and graphic card changed, it was already experiencing BSOD and it was caused by the amd drivers. I had them replaced on the 20th April 2013 and it was working fine until just...
BSOD Help and Support
BSOD after exiting games
Hello, most of the times I exit a game (usually by Alt-F4) I get a bsod. It doesn't specify any files. Does anyone have any insight on this? Win 7 ultimate x86 Laptop is brand new, installed windows last week.
BSOD Help and Support
Win 7 64 bit BSOD after exiting games
Hey guys, i have an issue that is very irritating. I'm getting blue screens after exiting some games. "BUGCHECK_STR: 0x76" is the most recent. This wasn't happening before i reinstalled my windows. I am hoping to pick up an SSD drive shortly, but if my PC keeps on playing up then i don't...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 10:54.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App