More than fewer Bsods X(


  1. Posts : 8
    Windows 7 Enterprise x64
       #1

    More than fewer Bsods X(


    Hello, I have got bsods since i bought the pc.
    First 3 days i let my pc Opened.
    After that i got bsods X( which are ungluing me.
    I have windows enterprise x64 - It is non-official because i don`t bought it.
    I got my new pc in August 2010 .
    Here are the minidumps so please help me . I want to keep w7 because wXP is boring but if i got these again and again i will install wXP.
    I got bsods when i played games like Warcraft 3 Frozen throne , NFS hot pursuit 2010, Star wars the force unleashed 2 , medal of honor 2010 , Transformers - war for cybertron and many more. Warcraft 3 install says that warcraft 3 doesn`t work on windows NT, is w7 an windows nt ?

    P.S : I tested my rams with memtest 86+ and no problem detected.
    When i touch my first slot ram because i use the first and the third my pc restarts and starting to beeping, after that i need to remove my rams and put them back again.

    PLease help me .


    REGARDS , Mestejiq.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Update:

    nusb3hub.sys Fri Nov 20 05:15:57 2009
    NEC USB 3.0 Hub - motherboard driver


    Remove Daemon Tools:

    sptd.sys Sun Oct 11 16:55:14 2009

    DuplexSecure - FAQ



    If bsod's do not stop after the above fixes,

    1) Uninstall Eset.
    2) Ensure that RAM is set right in the BIOS according to its officially recommended specs. You can view its current voltage and timings with CPU-Z.
    3) Run memtest overnight:

    RAM - Test with Memtest86+



    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121310-16520-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c57000 PsLoadedModuleList = 0xfffff800`02e94e50
    Debug session time: Mon Dec 13 13:09:51.294 2010 (UTC - 5:00)
    System Uptime: 0 days 2:13:42.684
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {ffffda8005237ff0, 2, 1, fffff80002ccb7b4}
    
    Probably caused by : win32k.sys ( win32k!SetWakeBit+f8 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: ffffda8005237ff0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ccb7b4, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eff0e0
     ffffda8005237ff0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeSetEvent+124
    fffff800`02ccb7b4 48894108        mov     qword ptr [rcx+8],rax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    TRAP_FRAME:  fffff880039e4870 -- (.trap 0xfffff880039e4870)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8005237fe8 rbx=0000000000000000 rcx=ffffda8005237fe8
    rdx=fffffa8001bde458 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ccb7b4 rsp=fffff880039e4a00 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=ffffffffffffffef
    r11=0000000000021114 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    nt!KeSetEvent+0x124:
    fffff800`02ccb7b4 48894108        mov     qword ptr [rcx+8],rax ds:ffffda80`05237ff0=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cc6ca9 to fffff80002cc7740
    
    STACK_TEXT:  
    fffff880`039e4728 fffff800`02cc6ca9 : 00000000`0000000a ffffda80`05237ff0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`039e4730 fffff800`02cc5920 : 00000000`00000004 fffffa80`05237fe0 fffffa80`046f13a0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`039e4870 fffff800`02ccb7b4 : 00000000`40df0088 00000000`00000000 00000000`00010001 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`039e4a00 fffff960`0019b578 : 00000000`00000000 fffff960`00000002 00000000`00000000 ffffda80`05237fe8 : nt!KeSetEvent+0x124
    fffff880`039e4a70 fffff960`00192f33 : fffff900`c00cc280 00000000`00000001 00000000`00000004 fffff800`02cd31e3 : win32k!SetWakeBit+0xf8
    fffff880`039e4aa0 fffff960`00193954 : 00000000`00000000 fffff960`003afa90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x157
    fffff880`039e4af0 fffff960`00124708 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`8000031c : win32k!RawInputThread+0x9b4
    fffff880`039e4bc0 fffff960`001a429a : fffffa80`00000002 fffff880`02139f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
    fffff880`039e4bf0 fffff800`02cc6993 : fffffa80`046f12e0 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
    fffff880`039e4c20 000007fe`fd333d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`01bbf9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd333d3a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!SetWakeBit+f8
    fffff960`0019b578 488b5c2430      mov     rbx,qword ptr [rsp+30h]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32k!SetWakeBit+f8
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    FAILURE_BUCKET_ID:  X64_0xA_win32k!SetWakeBit+f8
    
    BUCKET_ID:  X64_0xA_win32k!SetWakeBit+f8
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121510-16052-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
    Debug session time: Wed Dec 15 14:12:35.040 2010 (UTC - 5:00)
    System Uptime: 0 days 3:20:52.068
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {ffffda800542652c, 2, 0, fffff880016079eb}
    
    Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: ffffda800542652c, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880016079eb, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb30e0
     ffffda800542652c 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!KfdClassify+76e
    fffff880`016079eb 458b422c        mov     r8d,dword ptr [r10+2Ch]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88003361ab0 -- (.trap 0xfffff88003361ab0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffff88003361d98
    rdx=fffffa8001b14cd8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880016079eb rsp=fffff88003361c40 rbp=fffff880033621b0
     r8=0000000000000000  r9=0000000000000001 r10=ffffda8005426500
    r11=fffffa8001b14cb0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po cy
    NETIO!KfdClassify+0x76e:
    fffff880`016079eb 458b422c        mov     r8d,dword ptr [r10+2Ch] ds:0001:ffffda80`0542652c=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c7aca9 to fffff80002c7b740
    
    STACK_TEXT:  
    fffff880`03361968 fffff800`02c7aca9 : 00000000`0000000a ffffda80`0542652c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03361970 fffff800`02c79920 : 00000000`00000000 fffff880`03361d98 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`03361ab0 fffff880`016079eb : 00000000`00000000 fffff880`033621b0 fffff880`03362070 fffff880`03362070 : nt!KiPageFault+0x260
    fffff880`03361c40 fffff880`0163fa84 : fffff880`033623f8 fffff880`03362120 fffffa80`00000001 fffff880`03362020 : NETIO!KfdClassify+0x76e
    fffff880`03361fb0 fffff880`0163fef8 : fffffa80`0219d2c0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
    fffff880`033620d0 fffff880`016402a9 : fffffa80`0219d200 fffffa80`02898960 fffffa80`01eeb000 fffff880`010398a2 : NETIO!StreamCommonInspect+0x228
    fffff880`033623b0 fffff880`01908af8 : fffffa80`0219d2c0 fffff880`03362700 fffffa80`01eeb030 fffffa80`02727fa0 : NETIO!WfpStreamInspectReceive+0xf9
    fffff880`03362430 fffff880`01933131 : fffffa80`023006f0 fffff880`03362760 00000000`0000002a fffff880`03362760 : tcpip!InetInspectReceive+0x48
    fffff880`03362470 fffff880`018bb830 : 00000000`81cc1f3d fffffa80`023006f0 fffffa80`01eeb030 fffffa80`01eeb030 : tcpip!TcpInspectReceive+0x71
    fffff880`033624c0 fffff880`01878e95 : 00000000`00000014 fffff880`00000000 fffffa80`04a5b6c0 fffffa80`0219d2c0 : tcpip! ?? ::FNODOBFM::`string'+0x3cab5
    fffff880`03362680 fffff880`0187d86a : fffffa80`028aef00 00000000`00000000 fffffa80`0271c448 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
    fffff880`03362830 fffff880`0187d3b7 : fffffa80`031effd0 fffffa80`04a5b6c0 00000000`00000000 fffff880`01860700 : tcpip!TcpMatchReceive+0x1fa
    fffff880`03362980 fffff880`0185f6c7 : fffffa80`04a5d8d7 fffffa80`028bd9d7 fffffa80`028ad8d7 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
    fffff880`03362a30 fffff880`0185f799 : fffff880`03362bb0 fffff880`0196d9a0 fffff880`03362bc0 00000000`00000001 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`03362af0 fffff880`0185fc90 : 00000000`00000000 fffff800`02c82992 00000000`00000000 fffff880`03362bb0 : tcpip!IppProcessDeliverList+0x59
    fffff880`03362b60 fffff880`018367c2 : fffffa80`018dfb60 fffff880`00c4077d 00000000`00000000 fffffa80`026fe040 : tcpip!IppReceiveHeaderBatch+0x231
    fffff880`03362c40 fffff800`02f77c43 : fffffa80`026fe040 fffff800`02e205f8 fffffa80`018dfb60 fffffa80`027539e0 : tcpip!IppLoopbackTransmit+0x72
    fffff880`03362c80 fffff800`02c88961 : fffff800`02e20500 fffff800`02f77c20 fffffa80`018dfb60 fffff800`02e205f8 : nt!IopProcessWorkItem+0x23
    fffff880`03362cb0 fffff800`02f1fc06 : 00000000`00000000 fffffa80`018dfb60 00000000`00000080 fffffa80`018aa890 : nt!ExpWorkerThread+0x111
    fffff880`03362d40 fffff800`02c59c26 : fffff880`0328e180 fffffa80`018dfb60 fffff880`03299040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`03362d80 00000000`00000000 : fffff880`03363000 fffff880`0335d000 fffff880`033629f0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!KfdClassify+76e
    fffff880`016079eb 458b422c        mov     r8d,dword ptr [r10+2Ch]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!KfdClassify+76e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!KfdClassify+76e
    
    BUCKET_ID:  X64_0xD1_NETIO!KfdClassify+76e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121810-15475-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c66000 PsLoadedModuleList = 0xfffff800`02ea3e50
    Debug session time: Sat Dec 18 12:56:26.580 2010 (UTC - 5:00)
    System Uptime: 0 days 2:25:17.969
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {ffffda8003398290, 2, 0, fffff80002ce31dc}
    
    Probably caused by : win32k.sys ( win32k!TimersProc+197 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: ffffda8003398290, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ce31dc, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e0
     ffffda8003398290 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiInsertTimerTable+1cc
    fffff800`02ce31dc 4c3b78f8        cmp     r15,qword ptr [rax-8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    TRAP_FRAME:  fffff8800212c7e0 -- (.trap 0xfffff8800212c7e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffda8003398298 rbx=0000000000000000 rcx=fffffa800339c298
    rdx=fffffa8003396298 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ce31dc rsp=fffff8800212c970 rbp=fffffa8003396298
     r8=ffffffffffffffff  r9=0000000000000013 r10=fffff80002e50e80
    r11=fffff8800212c900 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    nt!KiInsertTimerTable+0x1cc:
    fffff800`02ce31dc 4c3b78f8        cmp     r15,qword ptr [rax-8] ds:dc40:ffffda80`03398290=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cd5ca9 to fffff80002cd6740
    
    STACK_TEXT:  
    fffff880`0212c698 fffff800`02cd5ca9 : 00000000`0000000a ffffda80`03398290 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0212c6a0 fffff800`02cd4920 : fffff800`02ce2b25 fffffa80`0464b160 fffff880`03163180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0212c7e0 fffff800`02ce31dc : 00000000`00200202 fffff800`02cdb1fa fffff880`031d3180 fffffa80`05749060 : nt!KiPageFault+0x260
    fffff880`0212c970 fffff800`02ce2de0 : ffffffff`ffbf9ba0 fffff800`02e50e80 fffffa80`0464b160 00000000`00000000 : nt!KiInsertTimerTable+0x1cc
    fffff880`0212c9d0 fffff800`02ce2ce4 : fffff900`c013dc40 ffffffff`ffbf9ba0 00000000`00000000 fffff960`00000002 : nt!KiSetTimerEx+0xf0
    fffff880`0212ca60 fffff960`000f2eb3 : fffff900`c013dc40 00000000`00000001 00000000`00000004 fffff800`02ce21e3 : nt!KeSetTimer+0x14
    fffff880`0212caa0 fffff960`000f3894 : 00000000`00000000 fffff960`00310a90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x197
    fffff880`0212caf0 fffff960`00084528 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 00000000`00000000 : win32k!RawInputThread+0x9b4
    fffff880`0212cbc0 fffff960`0010409a : fffffa80`00000002 fffff880`02111f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
    fffff880`0212cbf0 fffff800`02cd5993 : fffffa80`04658990 00000000`00000004 000007ff`fffae000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
    fffff880`0212cc20 000007fe`fda83d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0033f9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fda83d3a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!TimersProc+197
    fffff960`000f2eb3 488b5c2450      mov     rbx,qword ptr [rsp+50h]
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  win32k!TimersProc+197
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cbe5d3e
    
    FAILURE_BUCKET_ID:  X64_0xA_win32k!TimersProc+197
    
    BUCKET_ID:  X64_0xA_win32k!TimersProc+197
    
    Followup: MachineOwner
    ---------


    Drivers:

    Code:
    start             end                 module name
    fffff880`045b2000 fffff880`045f0000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00e2f000 fffff880`00e86000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`04235000 fffff880`042bf000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02e9c000 fffff880`02eb2000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`02e0e000 fffff880`02e53000   ajjjwb2r ajjjwb2r.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
    fffff880`0451a000 fffff880`0452f000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`011d9000 fffff880`011ed000   amdsata  amdsata.sys  Wed Oct 07 16:13:09 2009 (4ACCF655)
    fffff880`01062000 fffff880`0106d000   amdxata  amdxata.sys  Wed Oct 07 16:13:10 2009 (4ACCF656)
    fffff880`044ec000 fffff880`044f4000   AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
    fffff880`07671000 fffff880`0767c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`0119b000 fffff880`011a4000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`011a4000 fffff880`011ce000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`01b61000 fffff880`01b69000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
    fffff880`010ed000 fffff880`010f9000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`01bdb000 fffff880`01be2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`044db000 fffff880`044ec000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02af9000 fffff880`02b17000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00770000 fffff960`00797000   cdd      cdd.dll      unavailable (00000000)
    fffff880`01ba8000 fffff880`01bd2000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c85000 fffff880`00d45000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01b31000 fffff880`01b61000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c27000 fffff880`00c85000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`012d5000 fffff880`01348000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`010e4000 fffff880`010ed000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`02e8c000 fffff880`02e9c000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0614b000 fffff880`06159000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0443a000 fffff880`044bd000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`044bd000 fffff880`044db000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`04200000 fffff880`0420f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01b1b000 fffff880`01b31000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06123000 fffff880`06145000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06163000 fffff880`06177000   dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
    fffff880`06159000 fffff880`06163000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`06177000 fffff880`0618a000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0618a000 fffff880`06196000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`046e5000 fffff880`047d9000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04600000 fffff880`04646000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`05a78000 fffff880`05b4f000   eamonm   eamonm.sys   Wed Jul 14 04:13:43 2010 (4C3D71B7)
    fffff880`01a00000 fffff880`01a25000   ehdrv    ehdrv.sys    Wed Jul 14 04:14:21 2010 (4C3D71DD)
    fffff880`02bcd000 fffff880`02bee000   epfwwfpr epfwwfpr.sys Wed Jul 14 04:10:34 2010 (4C3D70FA)
    fffff880`01263000 fffff880`01277000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01217000 fffff880`01263000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01411000 fffff880`0141b000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    fffff880`01ae1000 fffff880`01b1b000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0179e000 fffff880`017e8000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`077b0000 fffff880`077b9000   gdrv     gdrv.sys     Thu Mar 12 23:22:29 2009 (49B9D175)
    fffff880`047d9000 fffff880`047e6000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02c1d000 fffff800`02c66000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`0458e000 fffff880`045b2000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`061c1000 fffff880`061da000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`061da000 fffff880`061e2080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`061b3000 fffff880`061c1000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02a31000 fffff880`02af9000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01612000 fffff880`0161b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`02e5f000 fffff880`02e7d000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`02f72000 fffff880`02f81000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`061e3000 fffff880`061f1000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00ba1000 fffff800`00bab000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`02f83000 fffff880`02fc6000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`015dd000 fffff880`015f7000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01773000 fffff880`0179e000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`06145000 fffff880`0614a200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05e44000 fffff880`05e59000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05e00000 fffff880`05e23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c06000 fffff880`00c13000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`061f1000 fffff880`061ff000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`02e7d000 fffff880`02e8c000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`01181000 fffff880`0119b000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02b17000 fffff880`02b2f000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02b2f000 fffff880`02b5c000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`02b5c000 fffff880`02baa000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`02baa000 fffff880`02bcd000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`011ce000 fffff880`011d9000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01a83000 fffff880`01a8e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e86000 fffff880`00e90000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01277000 fffff880`012d5000   msrpc    msrpc.sys    unavailable (00000000)
    fffff880`043eb000 fffff880`043f6000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01621000 fffff880`01713000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02ed6000 fffff880`02ee2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02ee2000 fffff880`02f11000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05a63000 fffff880`05a78000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`04333000 fffff880`04342000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`042bf000 fffff880`04304000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01713000 fffff880`01773000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01a8e000 fffff880`01a9f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`043df000 fffff880`043eb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c66000 fffff800`03242000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0143a000 fffff880`015dd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01bd2000 fffff880`01bdb000   Null     Null.SYS     unavailable (00000000)
    fffff880`02fd8000 fffff880`02fef000   nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
    fffff880`04646000 fffff880`04676000   nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
    fffff880`055ec000 fffff880`055ed180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
    fffff880`04a12000 fffff880`055eba80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
    fffff880`0430d000 fffff880`04333000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`010cf000 fffff880`010e4000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`0109c000 fffff880`010cf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0116a000 fffff880`01171000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`01171000 fffff880`01181000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01400000 fffff880`01411000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05b4f000 fffff880`05bf5000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`060e6000 fffff880`06123000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c13000 fffff880`00c27000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02eb2000 fffff880`02ed6000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02f11000 fffff880`02f2c000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`02f2c000 fffff880`02f4d000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`02f4d000 fffff880`02f67000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0438e000 fffff880`043df000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02f67000 fffff880`02f72000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01a68000 fffff880`01a71000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a71000 fffff880`01a7a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a7a000 fffff880`01a83000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01394000 fffff880`013ce000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05e59000 fffff880`05e71000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04685000 fffff880`046dc000   Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
    fffff880`05eac000 fffff880`060e5080   RTKVHD64 RTKVHD64.sys Tue Apr 06 06:17:30 2010 (4BBB0A3A)
    fffff880`00e00000 fffff880`00e2f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`02bee000 fffff880`02bf9000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`02e53000 fffff880`02e5f000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04342000 fffff880`0435f000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`017f8000 fffff880`01800000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`00eb8000 fffff880`00fde000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
    fffff880`0771a000 fffff880`077b0000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`076b3000 fffff880`0771a000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`02a00000 fffff880`02a2d000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`01000000 fffff880`01062000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`02f81000 fffff880`02f82480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`05e71000 fffff880`05e83000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01abd000 fffff880`01aca000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01a9f000 fffff880`01abd000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`0437a000 fffff880`0438e000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004d0000 fffff960`004da000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`044f4000 fffff880`0451a000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`02fc6000 fffff880`02fd8000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`06196000 fffff880`061b3000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`04676000 fffff880`04677f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`055ee000 fffff880`055ff000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04678000 fffff880`04685000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
    fffff880`05a09000 fffff880`05a63000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`047e6000 fffff880`047f1000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04538000 fffff880`0458e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00e90000 fffff880`00e9d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01a25000 fffff880`01a33000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01a33000 fffff880`01a58000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`017e8000 fffff880`017f8000   vmstorfl vmstorfl.sys unavailable (00000000)
    fffff880`010f9000 fffff880`0110e000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0110e000 fffff880`0116a000   volmgrx  volmgrx.sys  unavailable (00000000)
    fffff880`01348000 fffff880`01394000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0435f000 fffff880`0437a000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01a58000 fffff880`01a68000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00d45000 fffff880`00de9000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00de9000 fffff880`00df8000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04304000 fffff880`0430d000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00030000 fffff960`00340000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`0452f000 fffff880`04538000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00fde000 fffff880`00fe7000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05e23000 fffff880`05e44000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`07600000 fffff880`07671000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`01b69000 fffff880`01b77000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01b77000 fffff880`01b81000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`01b81000 fffff880`01b95000   dump_amdsata
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00014000
    fffff880`01b95000 fffff880`01ba8000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


  3. Posts : 8
    Windows 7 Enterprise x64
    Thread Starter
       #3

    MEMTest86+ No problems were found.

    So i will try the 2 options and post-back if i still get ;d thx.
      My Computer


  4. Posts : 8
    Windows 7 Enterprise x64
    Thread Starter
       #4

    What about netio.sys error? I still have not received it but just in case.
    I got one more bsod with nvlddmkm.sys which i fixed ( faulty nvidia old driver ) and no more. Thanks cybercore !
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 22:08.
Find Us