BSOD - Reloaded Fresh but Still happening :(

Page 1 of 3 123 LastLast

  1. Posts : 13
    Windows 7 Ultimate 64 bit
       #1

    BSOD - Reloaded Fresh but Still happening :(


    Windows 7 Ultimate 64-Bit 16 GB of Ram.

    Original OS with the System Windows 7 Ultimate (Yes) I haven't strayed away from the original OS other than reloads.

    Fresh Reload of the OS as of 02/18/2012.

    This is an OEM from IbuyPower. I re-installed from the Disc they supplied in the packaging.

    I bought the system in April of 2010. So it's about 22 months old. :)


    Been having blue screens on the previous oS install which was about 7 months old so I figured I should reload as it started happening I thought with a 2011 version of Webroots Spysweeper. When I reloaded on Saturday I installed the updated version even tho the perfmon report says no antivirus. Secureanywhere 8.0 is running.

    I recently installed the windbg and found that it's blaming ntoskernel for alot of the problems. I also noticed that googleupdate was a process involved and have recently disabled those services for the time being. :) I need your advise to tell me what is really happening :)

    Anyway I hope this enough information for you to troubleshoot my recent BSODs on the fresh install of Windows 7.

    Thank you Thank you so very much - In advance :)
      My Computer


  2. Posts : 11,269
    Windows 7 Home Premium 64 Bit
       #2

    Code:
    1. Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\Kingston\BSODDmpFiles\Jenelia\Windows_NT6_BSOD_jcgriff2\021912-30919-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e56670 Debug session time: Sun Feb 19 11:20:22.716 2012 (GMT-7) System Uptime: 0 days 1:01:31.214 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list .................................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, fffff8800152096a, 0, ffffffffffffffff} Probably caused by : Ntfs.sys ( Ntfs!NtfsReleaseScbFromLazyWrite+42 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8800152096a, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: Ntfs!NtfsReleaseScbFromLazyWrite+42 fffff880`0152096a 837e0801 cmp dword ptr [rsi+8],1 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec0100 ffffffffffffffff CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x1E PROCESS_NAME: rundll32.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002cd9588 to fffff80002c8dc40 STACK_TEXT: fffff880`07a11da8 fffff800`02cd9588 : 00000000`0000001e ffffffff`c0000005 fffff880`0152096a 00000000`00000000 : nt!KeBugCheckEx fffff880`07a11db0 fffff800`02c8d2c2 : fffff880`07a12588 00000000`0d5613d0 fffff880`07a12630 db7a8250`2b279202 : nt! ?? ::FNODOBFM::`string'+0x4977d fffff880`07a12450 fffff800`02c8bbca : 00000000`00000000 00000000`0d561440 fffffa80`0d561300 00000000`0d5613d0 : nt!KiExceptionDispatch+0xc2 fffff880`07a12630 fffff880`0152096a : fffff800`02cd2f97 fffffa80`0d5613d0 fffffa80`0d5614e0 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a fffff880`07a127c8 00000000`00000001 : 00000000`00000001 00000000`00000001 00000000`000007ff 00000000`00000101 : Ntfs!NtfsReleaseScbFromLazyWrite+0x42 fffff880`07a127f8 00000000`00000001 : 00000000`00000001 00000000`000007ff 00000000`00000101 fffff880`00000001 : 0x1 fffff880`07a12800 00000000`00000001 : 00000000`000007ff 00000000`00000101 fffff880`00000001 00000000`00000000 : 0x1 fffff880`07a12808 00000000`000007ff : 00000000`00000101 fffff880`00000001 00000000`00000000 fffff800`02f87c3a : 0x1 fffff880`07a12810 00000000`00000101 : fffff880`00000001 00000000`00000000 fffff800`02f87c3a 00000000`00000000 : 0x7ff fffff880`07a12818 fffff880`00000001 : 00000000`00000000 fffff800`02f87c3a 00000000`00000000 fffff8a0`000a0008 : 0x101 fffff880`07a12820 00000000`00000000 : fffff800`02f87c3a 00000000`00000000 fffff8a0`000a0008 00000000`00000000 : 0xfffff880`00000001 STACK_COMMAND: kb FOLLOWUP_IP: Ntfs!NtfsReleaseScbFromLazyWrite+42 fffff880`0152096a 837e0801 cmp dword ptr [rsi+8],1 SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: Ntfs!NtfsReleaseScbFromLazyWrite+42 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d79997b FAILURE_BUCKET_ID: X64_0x1E_Ntfs!NtfsReleaseScbFromLazyWrite+42 BUCKET_ID: X64_0x1E_Ntfs!NtfsReleaseScbFromLazyWrite+42 Followup: MachineOwner ---------
    2. Loading Dump File [F:\Kingston\BSODDmpFiles\Jenelia\Windows_NT6_BSOD_jcgriff2\021912-31012-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16841.amd64fre.win7_gdr.110622-1503 Machine Name: Kernel base = 0xfffff800`02a67000 PsLoadedModuleList = 0xfffff800`02ca4e70 Debug session time: Sun Feb 19 10:01:37.958 2012 (GMT-7) System Uptime: 0 days 1:31:31.643 Loading Kernel Symbols ............................................................... ................................................................ ............................ Loading User Symbols Loading unloaded module list .................... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff500195287f0, 1, fffff80002de9b2f, 7} Could not read faulting driver name Probably caused by : ntkrnlmp.exe ( nt!RtlpGenerateInheritAcl+d3 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff500195287f0, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffff80002de9b2f, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000007, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0f0e0 fffff500195287f0 FAULTING_IP: nt!RtlpGenerateInheritAcl+d3 fffff800`02de9b2f 4889442438 mov qword ptr [rsp+38h],rax MM_INTERNAL_CODE: 7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: mscorsvw.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff880080e8c60 -- (.trap 0xfffff880080e8c60) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa800ca943dc rbx=0000000000000000 rcx=fffff8a00440297c rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002de9b2f rsp=fffff880080e8df0 rbp=fffff8a004402974 r8=0000000000000001 r9=fffff8a00ae0a2e0 r10=fffff8a004402974 r11=fffff880080e90d9 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac pe cy nt!RtlpGenerateInheritAcl+0xd3: fffff800`02de9b2f 4889442438 mov qword ptr [rsp+38h],rax ss:0018:fffff880`080e8e28=fffff80002c0c2dd Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b56729 to fffff80002ad75c0 STACK_TEXT: fffff880`080e8af8 fffff800`02b56729 : 00000000`00000050 fffff500`195287f0 00000000`00000001 fffff880`080e8c60 : nt!KeBugCheckEx fffff880`080e8b00 fffff800`02ad56ae : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ccb fffff880`080e8c60 fffff800`02de9b2f : fffffa80`0d9bdde0 fffffa80`0d5c2010 00000000`00000000 fffffa80`0d15e8e0 : nt!KiPageFault+0x16e fffff880`080e8df0 fffff800`02de58d5 : 00000000`00000003 00000000`00000001 fffffa80`0f900001 fffff8a0`0ae0a2e0 : nt!RtlpGenerateInheritAcl+0xd3 fffff880`080e8eb0 fffff800`02de5031 : fffff8a0`04402974 fffff880`080e9120 00000000`00000000 00000000`00000701 : nt!RtlpInheritAcl2+0x325 fffff880`080e8f70 fffff800`02de4230 : 00000000`00008000 00000000`00000000 fffff880`000000c8 fffff8a0`0ae0a324 : nt!RtlpInheritAcl+0x17d fffff880`080e9030 fffff800`02d89e69 : fffff8a0`0af43da0 fffff880`080e92e8 fffffa80`00000058 00000000`00000001 : nt!RtlpNewSecurityObject+0xb20 fffff880`080e92c0 fffff800`02d4827f : fffff8a0`0625142c fffffa80`0cfd5b10 fffff8a0`115d9948 00000000`00000000 : nt!SeAssignSecurity+0x3d fffff880`080e9320 fffff800`02d48bf4 : fffff8a0`007f1010 fffffa80`0140e020 fffff8a0`04402960 fffffa80`0cfd5b10 : nt!CmpDoCreateChild+0x437 fffff880`080e9430 fffff800`02daedc5 : fffff8a0`063aa024 fffff880`0140e020 fffff880`080e9630 fffff880`080e9630 : nt!CmpDoCreate+0x268 fffff880`080e9570 fffff800`02dcdba4 : fffff800`02dad960 00000000`00000001 fffffa80`0cfd5b10 fffff8a0`e24e4d01 : nt!CmpParseKey+0x1465 fffff880`080e9840 fffff800`02dd2b7d : fffffa80`0cfd5b10 fffff880`080e99a0 fffff8a0`00000040 fffffa80`0ca94390 : nt!ObpLookupObjectName+0x585 fffff880`080e9940 fffff800`02d71b18 : 00000000`00000000 00000000`00000000 ffff94c1`e407f101 00000000`00000000 : nt!ObOpenObjectByName+0x1cd fffff880`080e99f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmCreateKey+0x2e1 STACK_COMMAND: kb FOLLOWUP_IP: nt!RtlpGenerateInheritAcl+d3 fffff800`02de9b2f 4889442438 mov qword ptr [rsp+38h],rax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!RtlpGenerateInheritAcl+d3 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44 FAILURE_BUCKET_ID: X64_0x50_nt!RtlpGenerateInheritAcl+d3 BUCKET_ID: X64_0x50_nt!RtlpGenerateInheritAcl+d3 Followup: MachineOwner ---------
    3. Loading Dump File [F:\Kingston\BSODDmpFiles\Jenelia\Windows_NT6_BSOD_jcgriff2\021812-24991-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50 Debug session time: Sat Feb 18 13:58:29.397 2012 (GMT-7) System Uptime: 0 days 0:19:02.708 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {1d0, 2, 0, fffff88001681730} Probably caused by : tcpip.sys ( tcpip!TcpMppQueryTcbKillRate+34 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000000001d0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff88001681730, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0 00000000000001d0 CURRENT_IRQL: 2 FAULTING_IP: tcpip!TcpMppQueryTcbKillRate+34 fffff880`01681730 448b1b mov r11d,dword ptr [rbx] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff88002d8c260 -- (.trap 0xfffff88002d8c260) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001681730 rsp=fffff88002d8c3f0 rbp=0000000000000088 r8=0000000000000001 r9=0000000000000002 r10=fffff88002d64180 r11=0000000000000004 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc tcpip!TcpMppQueryTcbKillRate+0x34: fffff880`01681730 448b1b mov r11d,dword ptr [rbx] ds:0e60:00000000`00000000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002a89469 to fffff80002a89f00 STACK_TEXT: fffff880`02d8c118 fffff800`02a89469 : 00000000`0000000a 00000000`000001d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`02d8c120 fffff800`02a880e0 : 00000000`00000000 00000000`000001d0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02d8c260 fffff880`01681730 : 00000000`000001d0 fffff880`02d64180 00000000`00000002 00000000`00000000 : nt!KiPageFault+0x260 fffff880`02d8c3f0 fffff880`01681e6b : 00000000`00000e10 00000000`00000002 00000000`00000002 00000000`0001bea4 : tcpip!TcpMppQueryTcbKillRate+0x34 fffff880`02d8c440 fffff880`016705fc : fffffa80`0d91ad30 00000000`00000e10 00000000`00000004 00000000`0001bea4 : tcpip!TcpTimerMppTimeoutHandler+0x63 fffff880`02d8c4f0 fffff800`02a95fa6 : fffff880`02d8c600 fffffa80`00010264 00000000`00000001 00000000`00000000 : tcpip!TcpPeriodicTimeoutHandler+0x39e fffff880`02d8c570 fffff800`02a95326 : fffffa80`0d91ae00 00000000`00011e22 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66 fffff880`02d8c5e0 fffff800`02a95e7e : 00000002`a91b7fba fffff880`02d8cc58 00000000`00011e22 fffff880`02d669c8 : nt!KiProcessExpiredTimerList+0xc6 fffff880`02d8cc30 fffff800`02a95697 : 00000000`e30e5ec1 00000000`00011e22 00000000`e30e5e9a 00000000`00000021 : nt!KiTimerExpiration+0x1be fffff880`02d8ccd0 fffff800`02a926fa : fffff880`02d64180 fffff880`02d6efc0 00000000`00000000 fffff880`050a7588 : nt!KiRetireDpcList+0x277 fffff880`02d8cd80 00000000`00000000 : fffff880`02d8d000 fffff880`02d87000 fffff880`02d8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: tcpip!TcpMppQueryTcbKillRate+34 fffff880`01681730 448b1b mov r11d,dword ptr [rbx] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: tcpip!TcpMppQueryTcbKillRate+34 FOLLOWUP_NAME: MachineOwner MODULE_NAME: tcpip IMAGE_NAME: tcpip.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc26e FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpMppQueryTcbKillRate+34 BUCKET_ID: X64_0xD1_tcpip!TcpMppQueryTcbKillRate+34 Followup: MachineOwner ---------
    1. Points to your hard disk having errors. Other possible causes are Memory problems... Viruses... Corrupted hard disk file system... Corrupted System Files... Lack of Windows updates... Drivers...
      Thanks to JMH for helping with my understanding of this crash.
    2. Possible causes are Memory problems... Graphics card memory problems... BIOS... Corrupted hard disk file system... Corrupted System Files... Missing Windows Updates... Drivers...
    3. Points to your network or your antivirus. Likely Webroot related.

    Thanks to Dave76 for help understanding possible causes.



    One of your devices has not yet had its drivers installed.
    Code:
    Not Available	PCI\VEN_1957&DEV_00B6&SUBSYS_11011A56&REV_12\4&16A7741&0&0028	The drivers for this device are not installed.


    Do the following steps. After each step, test if the system is stable, and if it is not, proceed to the next step.

    • If you are overclocking any hardware, please stop.


    • Install the drivers for your device that is missing drivers. It looks like a gaming adapter device or network adapter device or PCI device... I could not find the exact match through Google, so hopefully you'll have better luck since it is one of your components.


    • Uninstall Webroot antivirus using the steps for uninstall outlined in How do I uninstall and reinstall my program? and replace it with Microsoft Security Essentials - Free Antivirus for Windows to run with Windows firewall, at least to test.


    • Run Disk Check with both boxes checked for all HDDs and with Automatically fix file system errors checked for all SSDs. Post back your logs for the checks after finding them using Check Disk (chkdsk) - Read Event Viewer Log


    • Download Seagate Seatools and run diagnostics on your hard drive that is running Windows.
      My Computer


  3. Posts : 13
    Windows 7 Ultimate 64 bit
    Thread Starter
       #3

    Thanks for your reply, the missing driver is a BigFootNetworks Killer Card. I uninstalled that after the TCPIP crash thinking it was related to that. So at the present time I'm running the onboard Realtek 1GB adapter.

    There's no overclocking going on but this board does have many options for overclocking but I've never overclocked I never have any need to this machine is plenty fast :)

    I have the seagate tools, I ran a quick test on the Disk with the OS installed and no errors, even a simple Windows scan found nothing wrong either.

    Since I turned off the gupdate (google update) services no blue screens for at least 7 hours. I'll run some more extensive tests on the hard-drives and memory and report back .

    Thank you for looking at these :)
      My Computer


  4. Posts : 11,269
    Windows 7 Home Premium 64 Bit
       #4

    You're welcome. Let us know if you have any more crashes (hope not) or if the system is stable (best wishes this is the case). :)
      My Computer


  5. Posts : 13
    Windows 7 Ultimate 64 bit
    Thread Starter
       #5

    Running Seagate tools, i believe it was scanning the OS drive, Seagate tools locked up and there was some really small text at the top of the screen. I couldn't read it as it was super small and the system was just froze solid. My thinking is there is a very bad spot on the drive it was scanning and crashed it. What do you think?

    No way to get to the logs cause I had to shut off due to a very loud beeeep coming from the system.
      My Computer


  6. Posts : 11,269
    Windows 7 Home Premium 64 Bit
       #6

    Was it a sustained beep? Beeps signify hardware failure of some kind. See the image for the possible failures. My guess is it was just the last one and it may have easily been due to the hard disk being bad. There is a DOS version of SeaTools you could run instead. You will have to burn the SeaTools ISO to a CD or DVD to use it.
      My Computer


  7. Posts : 13
    Windows 7 Ultimate 64 bit
    Thread Starter
       #7

    It was a Solid Long beep (While Seagate dos version tools was running when i moved the cursor after it locked up) and it wouldn't stop until I shut the computer off. This wasn't at post , I haven't turned it back on since being at work :/
      My Computer


  8. Posts : 13
    Windows 7 Ultimate 64 bit
    Thread Starter
       #8

    Running scan again on the drive that I think is bad, I'll let you know what happens. It's about 24 months old so I doubt Seagate will issue a RMA for it , or will they? :)
      My Computer


  9. Posts : 11,269
    Windows 7 Home Premium 64 Bit
       #9

    It depends on the drive. Some still have three year warranties.
      My Computer


  10. Posts : 13
    Windows 7 Ultimate 64 bit
    Thread Starter
       #10

    Well good news, I ran through scan fully and there we no errors on any of the drives through seagate DOS tools. I ran a MS memory check too and no errors with memory. After work today I'll boot up Windows to see what happens.

    Thanks :)
      My Computer


 
Page 1 of 3 123 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 14:19.
Find Us