BSODs


  1. Posts : 17
    7
       #1

    BSODs


    Got a laptop with Vista Basic on and it's constantly giving BSOD errors but it's intermittent.

    The machine has been wiped back to factory settings and still continuing to BSOD.

    Laptop is

    Clevo M760TG
    CPU: Celeron 585
    RAM: 1GB
    HDD : Samsung

    can any one help with the BSOD error code as to what is causing it please?

    Many Thanks!
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    wigwam said:
    Got a laptop with Vista Basic on and it's constantly giving BSOD errors but it's intermittent.

    The machine has been wiped back to factory settings and still continuing to BSOD.

    Laptop is

    Clevo M760TG
    CPU: Celeron 585
    RAM: 1GB
    HDD : Samsung

    can any one help with the BSOD error code as to what is causing it please?

    Many Thanks!
    Hi and welcome
    well kind of a strange place to be asking that but here goes. took a quick look at 2 of the four dmps. other 2 were garbled. this one was probably caused by ntkrpamp.exe, but there are so many problems.

    I would update every driver listed. there are currently drivers 3 years old on it.
    download and run memtestx86 for several hours at least (preferably overnight)
    run a system file check
    to doso type cmd in search>right click and run as admin> type sfc /scannow
    let us know the results
    If you are overclocking STOP
    If you are running a raid update its driver
    Hope this helps


    Ken J++




    smserial.sys 0x8a65a000 0x8a74a380 0x000f0380 0x45ae0ac6 1/17/2007 6:38:46 AM
    spldr.sys 0x85f56000 0x85f5e000 0x00008000 0x467b17dd 6/21/2007 7:29:17 PM
    spsys.sys 0xa3405000 0xa34b4000 0x000af000 0x467b18be 6/21/2007 7:33:02 PM
    HDAudBus.sys 0x85d43000 0x85d55000 0x00012000 0x474ca5d1 11/27/2007 6:18:41 PM
    SynTP.sys 0x89805000 0x89833500 0x0002e500 0x4758a4e1 12/6/2007 8:41:53 PM
    hal.dll 0x81c09000 0x81c3c000 0x00033000 0x47918a38 1/19/2008 12:27:20 AM
    intelppm.sys 0x89866000 0x89875000 0x0000f000 0x47918a38 1/19/2008 12:27:20 AM
    Fs_Rec.SYS 0x8a758000 0x8a761000 0x00009000 0x47918a5d 1/19/2008 12:27:57 AM
    CLFS.SYS 0x80485000 0x804c6000 0x00041000 0x47918a61 1/19/2008 12:28:01 AM
    Msfs.SYS 0x8a7ac000 0x8a7b7000 0x0000b000 0x47918a68 1/19/2008 12:28:08 AM
    Npfs.SYS 0x8a7b7000 0x8a7c5000 0x0000e000 0x47918a69 1/19/2008 12:28:09 AM
    fltmgr.sys 0x805a6000 0x805d8000 0x00032000 0x47918a6a 1/19/2008 12:28:10 AM
    mup.sys 0x85f5e000 0x85f6d000 0x0000f000 0x47918a74 1/19/2008 12:28:20 AM
    dfsc.sys 0x8a962000 0x8a979000 0x00017000 0x47918a74 1/19/2008 12:28:20 AM
    bowser.sys 0xa353c000 0xa3555000 0x00019000 0x47918a7a 1/19/2008 12:28:26 AM
    mrxsmb.sys 0xa358a000 0xa35a9000 0x0001f000 0x47918a81 1/19/2008 12:28:33 AM
    rdbss.sys 0x8a91c000 0x8a958000 0x0003c000 0x47918a82 1/19/2008 12:28:34 AM
    mrxsmb20.sys 0xa35e2000 0xa35fa000 0x00018000 0x47918a83 1/19/2008 12:28:35 AM
    mrxdav.sys 0xa356a000 0xa358a000 0x00020000 0x47918a8c 1/19/2008 12:28:44 AM
    Ntfs.sys 0x85e0e000 0x85f1d000 0x0010f000 0x47918a96 1/19/2008 12:28:54 AM
    srvnet.sys 0xa351f000 0xa353c000 0x0001d000 0x47918aa7 1/19/2008 12:29:11 AM
    srv2.sys 0x80db3000 0x80dda000 0x00027000 0x47918aaa 1/19/2008 12:29:14 AM
    luafv.sys 0x80d35000 0x80d50000 0x0001b000 0x47918afb 1/19/2008 12:30:35 AM
    BATTC.SYS 0x80721000 0x8072b000 0x0000a000 0x47918b7d 1/19/2008 12:32:45 AM
    compbatt.sys 0x8071e000 0x80720900 0x00002900 0x47918b7f 1/19/2008 12:32:47 AM
    CmBatt.sys 0x89859000 0x8985c780 0x00003780 0x47918b7f 1/19/2008 12:32:47 AM
    wmiacpi.sys 0x8985d000 0x89866000 0x00009000 0x47918b7f 1/19/2008 12:32:47 AM
    acpi.sys 0x80691000 0x806d7000 0x00046000 0x47918b80 1/19/2008 12:32:48 AM
    msisadrv.sys 0x806e0000 0x806e8000 0x00008000 0x47918b83 1/19/2008 12:32:51 AM
    mssmbios.sys 0x899a8000 0x899b2000 0x0000a000 0x47918b87 1/19/2008 12:32:55 AM
    pci.sys 0x806e8000 0x8070f000 0x00027000 0x47918b89 1/19/2008 12:32:57 AM
    fileinfo.sys 0x807d2000 0x807e2000 0x00010000 0x47918be3 1/19/2008 12:34:27 AM
    watchdog.sys 0x8a3d8000 0x8a3e5000 0x0000d000 0x47918c21 1/19/2008 12:35:29 AM
    Dxapi.sys 0x80d1c000 0x80d26000 0x0000a000 0x47918c4c 1/19/2008 12:36:12 AM
    ksecdd.sys 0x8220c000 0x8227d000 0x00071000 0x47918d80 1/19/2008 12:41:20 AM
    msrpc.sys 0x82388000 0x823b3000 0x0002b000 0x47918f1f 1/19/2008 12:48:15 AM
    Beep.SYS 0x8a768000 0x8a76f000 0x00007000 0x47918f56 1/19/2008 12:49:10 AM
    Null.SYS 0x8a761000 0x8a768000 0x00007000 0x47918f58 1/19/2008 12:49:12 AM
    mountmgr.sys 0x80784000 0x80794000 0x00010000 0x47918f59 1/19/2008 12:49:13 AM
    kbdclass.sys 0x85dcd000 0x85dd8000 0x0000b000 0x47918f5a 1/19/2008 12:49:14 AM
    mouclass.sys 0x89836000 0x89841000 0x0000b000 0x47918f5a 1/19/2008 12:49:14 AM
    i8042prt.sys 0x85dba000 0x85dcd000 0x00013000 0x47918f5d 1/19/2008 12:49:17 AM
    swenum.sys 0x8997c000 0x8997d380 0x00001380 0x47918f60 1/19/2008 12:49:20 AM
    ks.sys 0x8997e000 0x899a8000 0x0002a000 0x47918f61 1/19/2008 12:49:21 AM
    CLASSPNP.SYS 0x85fa5000 0x85fc6000 0x00021000 0x47918f70 1/19/2008 12:49:36 AM
    atapi.sys 0x80794000 0x8079c000 0x00008000 0x47918f74 1/19/2008 12:49:40 AM
    ataport.SYS 0x8079c000 0x807ba000 0x0001e000 0x47918f74 1/19/2008 12:49:40 AM
    PCIIDEX.SYS 0x807c4000 0x807d2000 0x0000e000 0x47918f74 1/19/2008 12:49:40 AM
    dump_dumpata.sys 0x899f3000 0x899fe000 0x0000b000 0x47918f74 1/19/2008 12:49:40 AM
    msahci.sys 0x807ba000 0x807c4000 0x0000a000 0x47918f77 1/19/2008 12:49:43 AM
    crashdmp.sys 0x8a9ed000 0x8a9fa000 0x0000d000 0x47918f77 1/19/2008 12:49:43 AM
    dump_msahci.sys 0x85fcf000 0x85fd9000 0x0000a000 0x47918f77 1/19/2008 12:49:43 AM
    SCSIPORT.SYS 0x85d94000 0x85dba000 0x00026000 0x47918f78 1/19/2008 12:49:44 AM
    disk.sys 0x85f94000 0x85fa5000 0x00011000 0x47918f7b 1/19/2008 12:49:47 AM
    storport.sys 0x898a3000 0x898e4000 0x00041000 0x47918f7d 1/19/2008 12:49:49 AM
    cdrom.sys 0x89841000 0x89859000 0x00018000 0x47918f7e 1/19/2008 12:49:50 AM
    volmgr.sys 0x8072b000 0x8073a000 0x0000f000 0x47918f7f 1/19/2008 12:49:51 AM
    partmgr.sys 0x8070f000 0x8071e000 0x0000f000 0x47918f82 1/19/2008 12:49:54 AM
    volmgrx.sys 0x8073a000 0x80784000 0x0004a000 0x47918f88 1/19/2008 12:50:00 AM
    volsnap.sys 0x85f1d000 0x85f56000 0x00039000 0x47918f92 1/19/2008 12:50:10 AM
    crcdisk.sys 0x85fc6000 0x85fcf000 0x00009000 0x47918fa5 1/19/2008 12:50:29 AM
    msiscsi.sys 0x89875000 0x898a3000 0x0002e000 0x47918fb4 1/19/2008 12:50:44 AM
    ecache.sys 0x85f6d000 0x85f94000 0x00027000 0x47918fb7 1/19/2008 12:50:47 AM
    vga.sys 0x8a76f000 0x8a77b000 0x0000c000 0x47919006 1/19/2008 12:52:06 AM
    VIDEOPRT.SYS 0x8a77b000 0x8a79c000 0x00021000 0x4791900a 1/19/2008 12:52:10 AM
    WDFLDR.SYS 0x80684000 0x80691000 0x0000d000 0x47919013 1/19/2008 12:52:19 AM
    monitor.sys 0x80d26000 0x80d35000 0x0000f000 0x47919013 1/19/2008 12:52:19 AM
    Wdf01000.sys 0x80608000 0x80684000 0x0007c000 0x47919015 1/19/2008 12:52:21 AM
    WMILIB.SYS 0x806d7000 0x806e0000 0x00009000 0x47919044 1/19/2008 12:53:08 AM
    STREAM.SYS 0x80d0f000 0x80d1bf00 0x0000cf00 0x4791904c 1/19/2008 12:53:16 AM
    USBD.SYS 0x89834000 0x89835700 0x00001700 0x4791904d 1/19/2008 12:53:17 AM
    portcls.sys 0x8a608000 0x8a635000 0x0002d000 0x4791904d 1/19/2008 12:53:17 AM
    usbuhci.sys 0x8a3e5000 0x8a3f0000 0x0000b000 0x47919050 1/19/2008 12:53:20 AM
    usbehci.sys 0x8a3f0000 0x8a3ff000 0x0000f000 0x47919051 1/19/2008 12:53:21 AM
    USBPORT.SYS 0x85d05000 0x85d43000 0x0003e000 0x47919053 1/19/2008 12:53:23 AM
    usbccgp.sys 0x8a9d6000 0x8a9ed000 0x00017000 0x47919059 1/19/2008 12:53:29 AM
    umbus.sys 0x899b2000 0x899bf000 0x0000d000 0x47919064 1/19/2008 12:53:40 AM
    usbhub.sys 0x899bf000 0x899f3000 0x00034000 0x47919064 1/19/2008 12:53:40 AM
    mpsdrv.sys 0xa3555000 0xa356a000 0x00015000 0x479190a5 1/19/2008 12:54:45 AM
    lltdio.sys 0x80d5c000 0x80d6c000 0x00010000 0x479190b7 1/19/2008 12:55:03 AM
    rspndr.sys 0x80da0000 0x80db3000 0x00013000 0x479190b7 1/19/2008 12:55:03 AM
    HTTP.sys 0xa34b4000 0xa351f000 0x0006b000 0x479190c9 1/19/2008 12:55:21 AM
    smb.sys 0x8a7e4000 0x8a7f8000 0x00014000 0x479190cf 1/19/2008 12:55:27 AM
    netbt.sys 0x8a851000 0x8a883000 0x00032000 0x479190d5 1/19/2008 12:55:33 AM
    tunmp.sys 0x85e00000 0x85e09000 0x00009000 0x479190dc 1/19/2008 12:55:40 AM
    ndisuio.sys 0x80d96000 0x80da0000 0x0000a000 0x479190dc 1/19/2008 12:55:40 AM
    fwpkclnt.sys 0x85cea000 0x85d05000 0x0001b000 0x479190e0 1/19/2008 12:55:44 AM
    netbios.sys 0x8a8fb000 0x8a909000 0x0000e000 0x479190e1 1/19/2008 12:55:45 AM
    tunnel.sys 0x85ff1000 0x85ffc000 0x0000b000 0x479190e6 1/19/2008 12:55:50 AM
    nsiproxy.sys 0x8a958000 0x8a962000 0x0000a000 0x479190e6 1/19/2008 12:55:50 AM
    ndis.sys 0x8227d000 0x82388000 0x0010b000 0x479190e7 1/19/2008 12:55:51 AM
    tdx.sys 0x8a7ce000 0x8a7e4000 0x00016000 0x479190ee 1/19/2008 12:55:58 AM
    NETIO.SYS 0x823b3000 0x823ed000 0x0003a000 0x47919103 1/19/2008 12:56:19 AM
    ndistapi.sys 0x89906000 0x89911000 0x0000b000 0x47919108 1/19/2008 12:56:24 AM
    NDProxy.SYS 0x85dd8000 0x85de9000 0x00011000 0x4791910c 1/19/2008 12:56:28 AM
    rasacd.sys 0x8a7c5000 0x8a7ce000 0x00009000 0x4791910f 1/19/2008 12:56:31 AM
    wanarp.sys 0x8a909000 0x8a91c000 0x00013000 0x4791910f 1/19/2008 12:56:31 AM
    ndiswan.sys 0x89911000 0x89934000 0x00023000 0x47919110 1/19/2008 12:56:32 AM
    rasl2tp.sys 0x898ef000 0x89906000 0x00017000 0x47919111 1/19/2008 12:56:33 AM
    raspppoe.sys 0x89934000 0x89943000 0x0000f000 0x47919111 1/19/2008 12:56:33 AM
    raspptp.sys 0x89943000 0x89957000 0x00014000 0x47919112 1/19/2008 12:56:34 AM
    rassstp.sys 0x89957000 0x8996c000 0x00015000 0x4791911b 1/19/2008 12:56:43 AM
    ws2ifsl.sys 0x8a883000 0x8a88c000 0x00009000 0x47919121 1/19/2008 12:56:49 AM
    afd.sys 0x8a809000 0x8a851000 0x00048000 0x4791912c 1/19/2008 12:57:00 AM
    TDI.SYS 0x898e4000 0x898ef000 0x0000b000 0x47919136 1/19/2008 12:57:10 AM
    modem.sys 0x8a74b000 0x8a758000 0x0000d000 0x4791913c 1/19/2008 12:57:16 AM
    termdd.sys 0x8996c000 0x8997c000 0x00010000 0x47919222 1/19/2008 1:01:06 AM
    RDPCDD.sys 0x8a79c000 0x8a7a4000 0x00008000 0x47919224 1/19/2008 1:01:08 AM
    rdpencdd.sys 0x8a7a4000 0x8a7ac000 0x00008000 0x47919225 1/19/2008 1:01:09 AM
    TSDDD.dll 0x902e0000 0x902e9000 0x00009000 0x47919225 1/19/2008 1:01:09 AM
    drmk.sys 0x8a635000 0x8a65a000 0x00025000 0x47919e4e 1/19/2008 1:53:02 AM
    BOOTVID.dll 0x8047d000 0x80485000 0x00008000 0x4791a653 1/19/2008 2:27:15 AM
    mcupdate_GenuineIntel.dll 0x8040c000 0x8046c000 0x00060000 0x4791a6e7 1/19/2008 2:29:43 AM
    PSHED.dll 0x8046c000 0x8047d000 0x00011000 0x4791a749 1/19/2008 2:31:21 AM
    kdcom.dll 0x80404000 0x8040c000 0x00008000 0x4791a769 1/19/2008 2:31:53 AM
    Rtlh86.sys 0x85d55000 0x85d76000 0x00021000 0x47b3e601 2/14/2008 1:56:01 AM
    CI.dll 0x804c6000 0x805a6000 0x000e0000 0x47be5708 2/22/2008 12:00:56 AM
    BisonC07.sys 0x80c0b000 0x80d0e800 0x00103800 0x47e247bc 3/20/2008 6:17:16 AM
    RTKVHDA.sys 0x8a407000 0x8a6073c0 0x002003c0 0x47ea2703 3/26/2008 5:35:47 AM
    pacer.sys 0x8a88c000 0x8a8a2000 0x00016000 0x47f6d426 4/4/2008 8:21:42 PM
    tcpip.sys 0x85c03000 0x85cea000 0x000e7000 0x4812c4f1 4/26/2008 1:00:17 AM
    nwifi.sys 0x80d6c000 0x80d96000 0x0002a000 0x4832325f 5/19/2008 9:07:27 PM
    dxgkrnl.sys 0x8a339000 0x8a3d8000 0x0009f000 0x4893b1df 8/1/2008 8:01:19 PM
    mrxsmb10.sys 0xa35a9000 0xa35e2000 0x00039000 0x48b4a864 8/26/2008 8:05:40 PM
    srv.sys 0xa3c05000 0xa3c51000 0x0004c000 0x4947159b 12/15/2008 9:42:35 PM




    Loading Dump File [C:\Users\K\Desktop\Mini112509-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*d:\symbols*Symbol information
    Executable search path is:
    Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 6001.18226.x86fre.vistasp1_gdr.090302-1506
    Machine Name:
    Kernel base = 0x81c3c000 PsLoadedModuleList = 0x81d53c70
    Debug session time: Wed Nov 25 08:31:28.093 2009 (GMT-5)
    System Uptime: 0 days 0:00:52.671
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 7F, {d, 0, 0, 0}

    Probably caused by : ntkrpamp.exe ( nt!KiSystemFatalException+f )


    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these

    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000d, EXCEPTION_GP_FAULT
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_d

    CUSTOMER_CRASH_COUNT: 2

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: BullGuardUpdate

    CURRENT_IRQL: 0

    LAST_CONTROL_TRANSFER: from 81e6e489 to 81c97497

    STACK_TEXT:
    a322bb14 81e6e489 badb0d00 84c2aebb c0800017 nt!KiSystemFatalException+0xf
    a322bc18 81e60625 8bb0c9d0 858ef520 a322bd14 nt!MiMapViewOfImageSection+0x613
    a322bc88 81e60715 858ef520 a322bd14 00000000 nt!MiMapViewOfSection+0x22a
    a322bcb8 81e60922 89405d50 858ef520 a322bd14 nt!MmMapViewOfSection+0x2a
    a322bd34 81c93a1a 00000018 ffffffff 0012f4cc nt!NtMapViewOfSection+0x203
    a322bd34 77a79a94 00000018 ffffffff 0012f4cc nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0012f3e4 00000000 00000000 00000000 00000000 0x77a79a94


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!KiSystemFatalException+f
    81c97497 c3 ret

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!KiSystemFatalException+f

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntkrpamp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 49ac8fb4

    FAILURE_BUCKET_ID: 0x7f_d_nt!KiSystemFatalException+f

    BUCKET_ID: 0x7f_d_nt!KiSystemFatalException+f

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000d, EXCEPTION_GP_FAULT
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_d

    CUSTOMER_CRASH_COUNT: 2

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: BullGuardUpdate

    CURRENT_IRQL: 0

    LAST_CONTROL_TRANSFER: from 81e6e489 to 81c97497

    STACK_TEXT:
    a322bb14 81e6e489 badb0d00 84c2aebb c0800017 nt!KiSystemFatalException+0xf
    a322bc18 81e60625 8bb0c9d0 858ef520 a322bd14 nt!MiMapViewOfImageSection+0x613
    a322bc88 81e60715 858ef520 a322bd14 00000000 nt!MiMapViewOfSection+0x22a
    a322bcb8 81e60922 89405d50 858ef520 a322bd14 nt!MmMapViewOfSection+0x2a
    a322bd34 81c93a1a 00000018 ffffffff 0012f4cc nt!NtMapViewOfSection+0x203
    a322bd34 77a79a94 00000018 ffffffff 0012f4cc nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0012f3e4 00000000 00000000 00000000 00000000 0x77a79a94


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!KiSystemFatalException+f
    81c97497 c3 ret

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!KiSystemFatalException+f

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntkrpamp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 49ac8fb4

    FAILURE_BUCKET_ID: 0x7f_d_nt!KiSystemFatalException+f

    BUCKET_ID: 0x7f_d_nt!KiSystemFatalException+f

    Followup: MachineOwner


    Kenn J++

    ---------
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 07:39.
Find Us