First: Thank you for the very informative post.
Problem Devices:
Code:
Xbox 360 Controller for Windows USB\VID_045E&PID_028E\2CEEBE8 This device is disabled.
Security Software:
Code:
msmpeng.exe c:\program files\microsoft security client\antimalware\msmpeng.exe 892 8 200 1380 3/20/2012 8:45 AM 3.0.8402.0 12.48 KB (12,784 bytes) 4/27/2011 6:21 PM
nissrv.exe c:\program files\microsoft security client\antimalware\nissrv.exe 2488 8 200 1380 3/20/2012 8:45 AM 3.0.8402.0 281.52 KB (288,272 bytes) 4/27/2011 6:21 PM
msseces.exe c:\program files\microsoft security client\msseces.exe 2772 8 200 1380 3/20/2012 8:45 AM 2.1.1116.0 1.37 MB (1,436,736 bytes) 6/15/2011 3:35 PM
Possible out of date drivers:
Code:
usbfilter fffff880`03e56000 fffff880`03e62000 Fri Apr 03 05:39:51 2009 (49d5f587) 000128e6 usbfilter.sys
AtiPcie fffff880`01600000 fffff880`01608000 Tue May 05 09:00:22 2009 (4a005486) 000134c7 AtiPcie.sys
The above usbfilter.sys driver being out of date suggests your chipset drivers may be out of date.
usbfilter.sys
AtiPcie.sys
Code:
-
Loading Dump File [D:\Kingston\BSODDmpFiles\Amiculi\032012-18220-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`02c63000 PsLoadedModuleList = 0xfffff800`02ea7650
Debug session time: Tue Mar 20 09:44:27.600 2012 (UTC - 6:00)
System Uptime: 0 days 0:47:28.771
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff88002f20600, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : NETIO.SYS ( NETIO!memmove+bd )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88002f20600, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+3862376630306162
fffff880`02f20600 2815f20280f8 sub byte ptr [fffff87f`fb7208f8],dl
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f11100
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f21528 -- (.exr 0xfffff88002f21528)
ExceptionAddress: fffff88001401f0d (NETIO!memmove+0x00000000000000bd)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f215d0 -- (.trap 0xfffff88002f215d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=b74900054adb251f rbx=0000000000000000 rcx=f7fffa80072ee060
rdx=07fffdfffe47ac08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001401f0d rsp=fffff88002f21768 rbp=0000000000000204
r8=0000000000000204 r9=0000000000000010 r10=32ee783559cebe60
r11=f7fffa80072ee040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETIO!memmove+0xbd:
fffff880`01401f0d 488941e0 mov qword ptr [rcx-20h],rax ds:f7fffa80`072ee040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d6a97b to fffff80002cdfd40
STACK_TEXT:
fffff880`02f20548 fffff800`02d6a97b : 00000000`0000001e ffffffff`c0000005 fffff880`02f20600 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f20550 fffff800`02d32e2c : 00000000`00000001 fffff800`02cf1688 00000000`00000001 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`02f20590 fffff800`02d0afec : fffffa80`00000000 fffff880`02f20de0 fffffa80`00000000 fffff800`02c1f401 : nt! ?? ::FNODOBFM::`string'+0x83d
fffff880`02f205d0 fffff800`02d0aa6d : fffff800`02e259d0 fffff880`02f224e0 00000000`00000000 fffff800`02c63000 : nt!_C_specific_handler+0x8c
fffff880`02f20640 fffff800`02d09845 : fffff800`02e259d0 fffff880`02f206b8 fffff880`02f21528 fffff800`02c63000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f20670 fffff800`02d1a7c1 : fffff880`02f21528 fffff880`02f20d80 fffff880`00000000 f7fffa80`00000005 : nt!RtlDispatchException+0x415
fffff880`02f20d50 fffff800`02cdf3c2 : fffff880`02f21528 00000000`00000392 fffff880`02f215d0 fffff880`02f218e8 : nt!KiDispatchException+0x135
fffff880`02f213f0 fffff800`02cddcca : fffffa80`00000596 00000000`00000000 00000000`00000000 fffffa80`0772d030 : nt!KiExceptionDispatch+0xc2
fffff880`02f215d0 fffff880`01401f0d : fffff880`01409b0d fffffa80`09850b90 00000000`00000000 fffffa80`0772d030 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f21768 fffff880`01409b0d : fffffa80`09850b90 00000000`00000000 fffffa80`0772d030 00000000`00000001 : NETIO!memmove+0xbd
fffff880`02f21770 fffff880`01685bc7 : fffff880`02f21898 fffff880`02f21870 fffff880`02f21880 fffff880`02f218e8 : NETIO!RtlCopyMdlToMdlIndirect+0xfd
fffff880`02f21810 fffff880`016ce8b8 : fffffa80`09850b90 00000000`00000000 00000000`00000001 fffffa80`08429d50 : tcpip!TcpCovetNetBufferListAndEnqueueInput+0x137
fffff880`02f218e0 fffff880`016cbd58 : 00000000`a9d32953 fffff880`02f21c80 fffffa80`085bb000 fffffa80`09850b90 : tcpip!TcpDeliverReceive+0x128
fffff880`02f219e0 fffff880`016cc8b5 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`041553fc : tcpip!TcpTcbFastDatagram+0x208
fffff880`02f21ba0 fffff880`016cb67a : fffffa80`06b51de0 fffff880`016c3b00 fffffa80`06b15401 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff880`02f21d50 fffff880`016cd2ab : fffff880`057688a2 fffffa80`075e4000 00000000`00000000 00000000`00000000 : tcpip!TcpMatchReceive+0x1fa
fffff880`02f21ea0 fffff880`016c41c7 : fffffa80`06b51de0 fffffa80`075fb380 fffffa80`00008fc0 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`02f21f70 fffff880`016c3d3a : 00000000`00000000 fffff880`017e39a0 fffff880`02f22130 fffffa80`08422610 : tcpip!IppDeliverListToProtocol+0x97
fffff880`02f22030 fffff880`016c3339 : fffff880`017e39a0 fffffa80`08422700 fffff880`02f220a0 fffff880`02f22120 : tcpip!IppProcessDeliverList+0x5a
fffff880`02f220d0 fffff880`016c10af : 00000000`6701a8c0 fffffa80`075e4000 fffff880`017e39a0 00000000`082f9001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`02f221b0 fffff880`016c06a2 : fffffa80`085c3230 00000000`00000000 fffffa80`082f9001 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`02f223b0 fffff880`016bfb3a : fffffa80`082f9010 fffff880`02f224e0 fffffa80`082f9010 fffff880`03e00000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`02f22490 fffff800`02ceba88 : fffffa80`08429d50 00000000`00004800 fffffa80`07921b60 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`02f224e0 fffff880`016c0202 : fffff880`016bfa60 fffff880`016ee368 fffffa80`06b29d02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`02f225c0 fffff880`015820eb : fffffa80`082788d0 00000000`00000000 fffffa80`07fc41a0 fffff880`016ef3ef : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`02f22630 fffff880`0154bad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`02f226a0 fffff880`014c4cc1 : fffffa80`07fc41a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`02f22b20 fffff880`04165ce8 : fffffa80`08273000 00000000`00000001 fffffa80`08273618 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`02f22b70 fffffa80`08273000 : 00000000`00000001 fffffa80`08273618 00000000`00000000 fffffa80`00000001 : Rt64win7+0x16ce8
fffff880`02f22b78 00000000`00000001 : fffffa80`08273618 00000000`00000000 fffffa80`00000001 fffff880`02f22c10 : 0xfffffa80`08273000
fffff880`02f22b80 fffffa80`08273618 : 00000000`00000000 fffffa80`00000001 fffff880`02f22c10 00000001`07fc8000 : 0x1
fffff880`02f22b88 00000000`00000000 : fffffa80`00000001 fffff880`02f22c10 00000001`07fc8000 00000000`00000001 : 0xfffffa80`08273618
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!memmove+bd
fffff880`01401f0d 488941e0 mov qword ptr [rcx-20h],rax
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: NETIO!memmove+bd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0x1E_c0000005_NETIO!memmove+bd
BUCKET_ID: X64_0x1E_c0000005_NETIO!memmove+bd
Followup: MachineOwner
---------
-
Loading Dump File [D:\Kingston\BSODDmpFiles\Amiculi\031812-16426-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`02c57000 PsLoadedModuleList = 0xfffff800`02e9b650
Debug session time: Sun Mar 18 17:38:41.840 2012 (UTC - 6:00)
System Uptime: 1 days 1:55:43.386
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002cdef0b, fffff8800a3d2dc0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiInsertTimerTable+13b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cdef0b, Address of the instruction which caused the bugcheck
Arg3: fffff8800a3d2dc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiInsertTimerTable+13b
fffff800`02cdef0b 488b42f8 mov rax,qword ptr [rdx-8]
CONTEXT: fffff8800a3d2dc0 -- (.cxr 0xfffff8800a3d2dc0)
rax=0000000000000000 rbx=fffffa800793d9b0 rcx=0000000000000000
rdx=f7fff80002e4b5e8 rsi=0000000000000560 rdi=fffff80002e48e80
rip=fffff80002cdef0b rsp=fffff8800a3d37a0 rbp=fffff80002e4b5e8
r8=fffffa800793d970 r9=000000000000001b r10=fffff80002e48e80
r11=fffffa8006e0a000 r12=fffff80002e4b5e8 r13=0000000000000001
r14=fffffa800793d900 r15=000000d955060186
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!KiInsertTimerTable+0x13b:
fffff800`02cdef0b 488b42f8 mov rax,qword ptr [rdx-8] ds:002b:f7fff800`02e4b5e0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: EQVoiceService
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002cdef0b
STACK_TEXT:
fffff880`0a3d37a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInsertTimerTable+0x13b
FOLLOWUP_IP:
nt!KiInsertTimerTable+13b
fffff800`02cdef0b 488b42f8 mov rax,qword ptr [rdx-8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiInsertTimerTable+13b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ec79dd2
STACK_COMMAND: .cxr 0xfffff8800a3d2dc0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiInsertTimerTable+13b
BUCKET_ID: X64_0x3B_nt!KiInsertTimerTable+13b
Followup: MachineOwner
---------
-
Loading Dump File [D:\Kingston\BSODDmpFiles\Amiculi\031712-16458-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e4d650
Debug session time: Sat Mar 17 09:46:02.504 2012 (UTC - 6:00)
System Uptime: 0 days 12:58:56.800
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002c42e40, fffff880031408e8, fffff88003140140}
Probably caused by : ntkrnlmp.exe ( nt!KeEnumerateKernelStackSegments+28 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c42e40, The address that the exception occurred at
Arg3: fffff880031408e8, Exception Record Address
Arg4: fffff88003140140, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KeEnumerateKernelStackSegments+28
fffff800`02c42e40 48894508 mov qword ptr [rbp+8],rax
EXCEPTION_RECORD: fffff880031408e8 -- (.exr 0xfffff880031408e8)
ExceptionAddress: fffff80002c42e40 (nt!KeEnumerateKernelStackSegments+0x0000000000000028)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: ffffffffffffffff
Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000
CONTEXT: fffff88003140140 -- (.cxr 0xfffff88003140140)
rax=fffff8800a07b000 rbx=0000000000000000 rcx=fffffa800a446470
rdx=fffff80002c427e0 rsi=fffff88003140cb0 rdi=fffffa800a446470
rip=fffff80002c42e40 rsp=fffff88003140b20 rbp=f7fff8800a080db0
r8=fffff88003140bd0 r9=0000000000000001 r10=0000000000000000
r11=fffff80002c94930 r12=fffff88003140bd0 r13=0000000000000000
r14=0000000000000000 r15=fffff80000b96080
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KeEnumerateKernelStackSegments+0x28:
fffff800`02c42e40 48894508 mov qword ptr [rbp+8],rax ss:0018:f7fff880`0a080db8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: ffffffffffffffff
EXCEPTION_PARAMETER2: 0000000000000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb7100
0000000000000000
FOLLOWUP_IP:
nt!KeEnumerateKernelStackSegments+28
fffff800`02c42e40 48894508 mov qword ptr [rbp+8],rax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002c42de8 to fffff80002c42e40
STACK_TEXT:
fffff880`03140b20 fffff800`02c42de8 : 00000000`00000000 00000000`00000000 fffff880`03140cb0 fffffa80`0a446470 : nt!KeEnumerateKernelStackSegments+0x28
fffff880`03140bb0 fffff800`02c42d8c : 00000000`00000000 00000000`00000020 00000000`00000000 fffff800`02c29bf3 : nt!MmOutPageKernelStack+0x34
fffff880`03140c90 fffff800`02cb9878 : 00000000`00000000 00000000`00000080 fffffa80`06a25040 fffffa80`06a25000 : nt!KiOutSwapKernelStacks+0x11c
fffff880`03140d00 fffff800`02f1ff7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSwapProcessOrStack+0x48
fffff880`03140d40 fffff800`02c769c6 : fffff800`02dfae80 fffffa80`06af0b60 fffff800`02e08cc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03140d80 00000000`00000000 : fffff880`03141000 fffff880`0313b000 fffff880`03140a50 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeEnumerateKernelStackSegments+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ec79dd2
STACK_COMMAND: .cxr 0xfffff88003140140 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!KeEnumerateKernelStackSegments+28
BUCKET_ID: X64_0x7E_nt!KeEnumerateKernelStackSegments+28
Followup: MachineOwner
---------
- Seems to be an out of date or corrupted Realtek Ethernet Driver. Rt64win7.sys. Other possible causes include Memory problems... Viruses... Corrupted hard disk file system... Corrupted System Files... Lack of Windows updates... Drivers...
Thanks to JMH for helping with my understanding of this crash. - Possible causes are Memory problems... Corrupted hard disk file system... Corrupted System Files... Graphics Driver... Drivers...
- Possible causes are Memory problems... BIOS... Corrupted hard disk file system... Corrupted System Files... Lack of Windows updates... Drivers...
Thanks to Dave76 for help understanding possible causes.
I suspect a possible corrupted driver for your network adapter. Re-install the latest Realtek driver using the link above to find the driver, or better yet, from the motherboard downloads page. When you re-install, use the following general steps:
- Click Start Menu
- Right Click My Computer/Computer
- Click Manage
- Click Device Manager from the list on the left
- Find the device you are trying to uninstall by expanding the appropriate set of devices
- Right click the device
- Click Uninstall (do not click OK in the dialog box that pops up after hitting Uninstall)
- Put a tick in Delete driver software for this device (if this option is available, otherwise just hit OK) and hit OK
- Restart your computer
- Install the latest driver for the device once Windows starts.
Alternatively:
- Login as an adminstrative user.
- Click Start Menu
- Click Control Panel
- Click Hardware and Sound
- Click Device Manager (the last link under Devices and Printers)
- Find the device you are trying to uninstall by expanding the appropriate set of devices
- Right click the device
- Click Uninstall (do not click OK in the dialog box that pops up after hitting Uninstall)
- Put a tick in Delete driver software for this device (if this option is available, otherwise just hit OK) and hit OK
- Restart your computer
- Install the latest driver for the device once Windows starts.
Let's check out your RAM configuration:- Download and install CPU-Z and Upload screenshots of the CPU, Mainboard, Memory, and SPD tabs. In the SPD tab, upload an image of each slot.