BSOD and random shutdowns help!!!


  1. Posts : 21
    Windows 7 Professional 64 bit (6.1, Build 7600)
       #1

    BSOD and random shutdowns help!!!


    Hi all.

    Starting about 2 weeks ago my computer has had massive issues. Three different crashes.

    First just shuts down acts like a 90s mac. Using it and suddenly boom its booting up. This happens 2-10 times a day.

    2nd just locks up with very loud buzz noise coming thru speakers. I have to reset to fix and comp reboots. This is happens about once everyday.

    3rd is BSOD I have attached the last three dumps. There would be more but I just formatted and reinstalled.

    Before anyone asks or suggests I have run Memtest my Ram is good. I have also tried three different video cards. tried 2 different power suplies. All drivers are up to date as of yesterday. (6-24-2010) My CPU temps never get above 55c.

    My main priority is BSOD then I will focus on mac like shutdowns.
      My Computer


  2. Posts : 6,885
    Windows 7 Ultimate x64, Mint 9
       #2

    One of your dumps points to AVG as the cause. This program is KNOWN to cause BSoDs (we see about 2 a day), and it is recommended that you just remove it. MSE is a great alternative.



    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062510-25802-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`0329ce50
    Debug session time: Fri Jun 25 18:51:50.007 2010 (UTC - 7:00)
    System Uptime: 0 days 1:12:01.723
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa000a50a2f0, 2, 1, fffff800030d470c}
    
    Unable to load image avgtdia.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for avgtdia.sys
    *** ERROR: Module load completed but symbols could not be loaded for avgtdia.sys
    Probably caused by : avgtdia.sys ( avgtdia+8be6 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa000a50a2f0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800030d470c, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800033070e0
     fffffa000a50a2f0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!ObfDereferenceObject+2c
    fffff800`030d470c f0480fc11f      lock xadd qword ptr [rdi],rbx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88004db2270 -- (.trap 0xfffff88004db2270)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffffa000a50a320
    rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800030d470c rsp=fffff88004db2400 rbp=ffffffffffffffff
     r8=fffff8000305f000  r9=0000000000000000 r10=fffffa800a79a700
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!ObfDereferenceObject+0x2c:
    fffff800`030d470c f0480fc11f      lock xadd qword ptr [rdi],rbx ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030ceb69 to fffff800030cf600
    
    STACK_TEXT:  
    fffff880`04db2128 fffff800`030ceb69 : 00000000`0000000a fffffa00`0a50a2f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`04db2130 fffff800`030cd7e0 : 00000000`00000001 ffffffff`ffffffff fffffa80`08285d02 fffffa80`08f05500 : nt!KiBugCheckDispatch+0x69
    fffff880`04db2270 fffff800`030d470c : 00000000`00000000 fffff880`04db2400 00000000`00000000 fffff880`04db2410 : nt!KiPageFault+0x260
    fffff880`04db2400 fffff880`03f2e686 : ffffffff`ffffffff fffffa80`0a979000 00000000`00000014 fffffa80`09c63790 : nt!ObfDereferenceObject+0x2c
    fffff880`04db2460 fffff880`03f2e60a : 00000000`00000000 fffffa80`0a979000 fffff880`0196d9a0 fffff880`03f2e6e5 : afd!AfdDerefPollInfoFileObjects+0x36
    fffff880`04db2490 fffff880`03f23448 : 00000000`00000000 00000000`00000000 fffffa80`09c63790 00000000`00000001 : afd!AfdCompletePollIrp+0x9a
    fffff880`04db24e0 fffff880`03f4af5f : fffffa80`0a979f68 00000000`00000001 00000000`00000000 00000000`0000007c : afd!AfdIndicatePollEvent+0x138
    fffff880`04db2530 fffff880`02d05be6 : fffffa80`0a768e90 fffff880`04db2968 fffffa80`00000c20 fffffa80`0000007c : afd!AfdBReceiveEventHandler+0x5af
    fffff880`04db25f0 fffffa80`0a768e90 : fffff880`04db2968 fffffa80`00000c20 fffffa80`0000007c fffff880`0000007c : avgtdia+0x8be6
    fffff880`04db25f8 fffff880`04db2968 : fffffa80`00000c20 fffffa80`0000007c fffff880`0000007c fffff880`04db26b4 : 0xfffffa80`0a768e90
    fffff880`04db2600 fffffa80`00000c20 : fffffa80`0000007c fffff880`0000007c fffff880`04db26b4 fffff880`04827a02 : 0xfffff880`04db2968
    fffff880`04db2608 fffffa80`0000007c : fffff880`0000007c fffff880`04db26b4 fffff880`04827a02 fffff880`04db26b8 : 0xfffffa80`00000c20
    fffff880`04db2610 fffff880`0000007c : fffff880`04db26b4 fffff880`04827a02 fffff880`04db26b8 fffffa80`0a66ce30 : 0xfffffa80`0000007c
    fffff880`04db2618 fffff880`04db26b4 : fffff880`04827a02 fffff880`04db26b8 fffffa80`0a66ce30 fffff880`03f4a9b0 : 0xfffff880`0000007c
    fffff880`04db2620 fffff880`04827a02 : fffff880`04db26b8 fffffa80`0a66ce30 fffff880`03f4a9b0 00000000`0000007c : 0xfffff880`04db26b4
    fffff880`04db2628 fffff880`04db26b8 : fffffa80`0a66ce30 fffff880`03f4a9b0 00000000`0000007c fffff880`04827a02 : 0xfffff880`04827a02
    fffff880`04db2630 fffffa80`0a66ce30 : fffff880`03f4a9b0 00000000`0000007c fffff880`04827a02 fffff880`02d05b10 : 0xfffff880`04db26b8
    fffff880`04db2638 fffff880`03f4a9af : 00000000`0000007c fffff880`04827a02 fffff880`02d05b10 fffff880`04db27d0 : 0xfffffa80`0a66ce30
    fffff880`04db2640 00000000`00000001 : fffffa80`07c6f110 fffffa80`07767010 fffffa80`07862d38 fffffa80`09797080 : afd!AfdRestartConnect+0x24f
    fffff880`04db26c0 fffffa80`07c6f110 : fffffa80`07767010 fffffa80`07862d38 fffffa80`09797080 fffffa80`0a51cd30 : 0x1
    fffff880`04db26c8 fffffa80`07767010 : fffffa80`07862d38 fffffa80`09797080 fffffa80`0a51cd30 00000000`00000000 : 0xfffffa80`07c6f110
    fffff880`04db26d0 fffffa80`07862d38 : fffffa80`09797080 fffffa80`0a51cd30 00000000`00000000 00000000`00000000 : 0xfffffa80`07767010
    fffff880`04db26d8 fffffa80`09797080 : fffffa80`0a51cd30 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`07862d38
    fffff880`04db26e0 fffffa80`0a51cd30 : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`00000000 : 0xfffffa80`09797080
    fffff880`04db26e8 00000000`00000000 : 00000000`00000000 00000000`00000001 fffffa80`00000000 00000000`00000020 : 0xfffffa80`0a51cd30
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    avgtdia+8be6
    fffff880`02d05be6 ??              ???
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  avgtdia+8be6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: avgtdia
    
    IMAGE_NAME:  avgtdia.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bd4af8f
    
    FAILURE_BUCKET_ID:  X64_0xA_avgtdia+8be6
    
    BUCKET_ID:  X64_0xA_avgtdia+8be6
    
    Followup: MachineOwner
    ---------
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062110-30030-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`0301c000 PsLoadedModuleList = 0xfffff800`03259e50
    Debug session time: Mon Jun 21 15:13:29.671 2010 (UTC - 7:00)
    System Uptime: 0 days 3:37:06.983
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff820039a25a0, 0, fffff80003387bc6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : ntkrnlmp.exe ( nt!RtlEqualUnicodeString+26 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff820039a25a0, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff80003387bc6, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c40e0
     fffff820039a25a0 
    
    FAULTING_IP: 
    nt!RtlEqualUnicodeString+26
    fffff800`03387bc6 488b02          mov     rax,qword ptr [rdx]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  taskhost.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880095106b0 -- (.trap 0xfffff880095106b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000000e rbx=0000000000000000 rcx=fffff88009510950
    rdx=fffff820039a25a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003387bc6 rsp=fffff88009510840 rbp=00000000189ebd7e
     r8=0000000000000001  r9=fffff8a00c98bab0 r10=000000000000000e
    r11=fffff8a00c98babe r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!RtlEqualUnicodeString+0x26:
    fffff800`03387bc6 488b02          mov     rax,qword ptr [rdx] ds:fffff820`039a25a0=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000310b801 to fffff8000308c600
    
    STACK_TEXT:  
    fffff880`09510548 fffff800`0310b801 : 00000000`00000050 fffff820`039a25a0 00000000`00000000 fffff880`095106b0 : nt!KeBugCheckEx
    fffff880`09510550 fffff800`0308a6ee : 00000000`00000000 fffff8a0`04accbd0 fffff8a0`00010500 fffff8a0`0544c940 : nt! ?? ::FNODOBFM::`string'+0x40ecb
    fffff880`095106b0 fffff800`03387bc6 : fffff8a0`015cbf60 fffff800`033874cb 00000000`06cb888e fffff8a0`0000cb70 : nt!KiPageFault+0x16e
    fffff880`09510840 fffff800`033874cb : 00000000`06cb888e fffff8a0`0000cb70 fffff8a0`00004900 fffffa80`0a956660 : nt!RtlEqualUnicodeString+0x26
    fffff880`09510850 fffff800`0338698f : 00000000`00000040 fffff880`09510950 fffffa80`08f3a801 00000000`00000001 : nt!ObpLookupDirectoryEntry+0x19b
    fffff880`095108b0 fffff800`0338bb76 : fffffa80`08f3a690 fffff880`09510a30 fffffa80`00000040 fffffa80`06a40360 : nt!ObpLookupObjectName+0x4b0
    fffff880`095109b0 fffff800`03392887 : 00000000`000007ff 00000000`00000001 fffffa80`0a958201 00000000`00000180 : nt!ObOpenObjectByName+0x306
    fffff880`09510a80 fffff800`033ab5b4 : 00000000`00e9ed00 fffff8a0`00100080 fffff8a0`0eb1ba30 00000000`00e9ed50 : nt!IopCreateFile+0x2b7
    fffff880`09510b20 fffff800`0308b853 : fffffa80`0ac72060 00000000`00000001 fffffa80`0a956660 fffff800`033a33b4 : nt!NtOpenFile+0x58
    fffff880`09510bb0 00000000`77b801ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00e9ecb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b801ea
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!RtlEqualUnicodeString+26
    fffff800`03387bc6 488b02          mov     rax,qword ptr [rdx]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!RtlEqualUnicodeString+26
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    FAILURE_BUCKET_ID:  X64_0x50_nt!RtlEqualUnicodeString+26
    
    BUCKET_ID:  X64_0x50_nt!RtlEqualUnicodeString+26
    
    Followup: MachineOwner
    ---------
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062210-24024-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`0301a000 PsLoadedModuleList = 0xfffff800`03257e50
    Debug session time: Tue Jun 22 16:01:56.112 2010 (UTC - 7:00)
    System Uptime: 0 days 9:58:55.883
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8200342da20, 0, fffff880012d2c50, 5}
    
    
    Could not read faulting driver name
    Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+227 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8200342da20, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff880012d2c50, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c20e0
     fffff8200342da20 
    
    FAULTING_IP: 
    Ntfs!NtfsFindPrefixHashEntry+227
    fffff880`012d2c50 498b7c2418      mov     rdi,qword ptr [r12+18h]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  GUI.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880087297c0 -- (.trap 0xfffff880087297c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000054 rbx=0000000000000000 rcx=000000000000035e
    rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880012d2c50 rsp=fffff88008729950 rbp=0000000000000000
     r8=00000000188f99af  r9=0000000000000000 r10=0000000000000006
    r11=fffff88008729998 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    Ntfs!NtfsFindPrefixHashEntry+0x227:
    fffff880`012d2c50 498b7c2418      mov     rdi,qword ptr [r12+18h] ds:00d8:00000000`00000018=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003109801 to fffff8000308a600
    
    STACK_TEXT:  
    fffff880`08729658 fffff800`03109801 : 00000000`00000050 fffff820`0342da20 00000000`00000000 fffff880`087297c0 : nt!KeBugCheckEx
    fffff880`08729660 fffff800`030886ee : 00000000`00000000 fffff8a0`03977320 00000000`00000000 fffff8a0`0489b010 : nt! ?? ::FNODOBFM::`string'+0x40ecb
    fffff880`087297c0 fffff880`012d2c50 : fffff880`07929aa0 fffff8a0`001fd640 fffffa80`07c0f180 00000000`00000080 : nt!KiPageFault+0x16e
    fffff880`08729950 fffff880`012d3ce2 : fffffa80`06b48010 fffffa80`07c10350 fffff8a0`001fd640 00000000`00000701 : Ntfs!NtfsFindPrefixHashEntry+0x227
    fffff880`08729a80 fffff880`012ce28d : fffffa80`06b48010 fffffa80`071268a0 fffff880`08729c60 fffff880`08729ca8 : Ntfs!NtfsFindStartingNode+0x452
    fffff880`08729b50 fffff880`01237c0d : fffffa80`06b48010 fffffa80`071268a0 fffff880`07929aa0 fffffa80`0a273900 : Ntfs!NtfsCommonCreate+0x3dd
    fffff880`08729d30 fffff800`03082487 : fffff880`07929a10 00000000`7efd7000 00000000`7efd5000 00000000`032cff88 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`08729d60 fffff800`03082441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`079298e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Ntfs!NtfsFindPrefixHashEntry+227
    fffff880`012d2c50 498b7c2418      mov     rdi,qword ptr [r12+18h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+227
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsFindPrefixHashEntry+227
    
    BUCKET_ID:  X64_0x50_Ntfs!NtfsFindPrefixHashEntry+227
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtsmn
    start             end                 module name
    fffff880`02daf000 fffff880`02ded000   1394ohci 1394ohci.sys Mon Jul 13 17:07:12 2009 (4A5BCC30)
    fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 16:19:34 2009 (4A5BC106)
    fffff880`03ead000 fffff880`03f37000   afd      afd.sys      Mon Jul 13 16:21:40 2009 (4A5BC184)
    fffff880`02c6b000 fffff880`02c81000   AgileVpn AgileVpn.sys Mon Jul 13 17:10:24 2009 (4A5BCCF0)
    fffff880`06e31000 fffff880`06e39000   ALSysIO64 ALSysIO64.sys Sun Apr 19 12:41:04 2009 (49EB7E50)
    fffff880`04000000 fffff880`04015000   amdppm   amdppm.sys   Mon Jul 13 16:19:25 2009 (4A5BC0FD)
    fffff880`00fd5000 fffff880`00fe0000   amdxata  amdxata.sys  Tue May 19 10:56:59 2009 (4A12F2EB)
    fffff880`06e4c000 fffff880`06e53000   AODDriver AODDriver.sys Sun Oct 12 21:38:55 2008 (48F2D0DF)
    fffff880`06ec4000 fffff880`06ecf000   asyncmac asyncmac.sys Mon Jul 13 17:10:13 2009 (4A5BCCE5)
    fffff880`00ead000 fffff880`00eb6000   atapi    atapi.sys    Mon Jul 13 16:19:47 2009 (4A5BC113)
    fffff880`00eb6000 fffff880`00ee0000   ataport  ataport.SYS  Mon Jul 13 16:19:52 2009 (4A5BC118)
    fffff880`015e1000 fffff880`015e9000   AtiPcie  AtiPcie.sys  Tue May 05 08:00:22 2009 (4A005486)
    fffff880`06728000 fffff880`06777000   atksgt   atksgt.sys   Sun May 17 06:36:34 2009 (4A1012E2)
    fffff880`0417f000 fffff880`041c6000   avgldx64 avgldx64.sys Wed Feb 10 20:52:31 2010 (4B737EFF)
    fffff880`04177000 fffff880`0417e080   avgmfx64 avgmfx64.sys Sun Apr 25 14:06:15 2010 (4BD4AEC7)
    fffff880`02d19000 fffff880`02d6a000   avgtdia  avgtdia.sys  Sun Apr 25 14:09:35 2010 (4BD4AF8F)
    fffff880`0121f000 fffff880`01226000   Beep     Beep.SYS     Mon Jul 13 17:00:13 2009 (4A5BCA8D)
    fffff880`04166000 fffff880`04177000   blbdrive blbdrive.sys Mon Jul 13 16:35:59 2009 (4A5BC4DF)
    fffff880`053a8000 fffff880`053c6000   bowser   bowser.sys   Mon Jul 13 16:23:50 2009 (4A5BC206)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Mon Jul 13 18:25:40 2009 (4A5BDE94)
    fffff880`05f8e000 fffff880`05fab000   cdfs     cdfs.sys     Mon Jul 13 16:19:46 2009 (4A5BC112)
    fffff880`00c00000 fffff880`00c2a000   cdrom    cdrom.sys    Mon Jul 13 16:19:54 2009 (4A5BC11A)
    fffff880`00cd8000 fffff880`00d98000   CI       CI.dll       Mon Jul 13 18:32:13 2009 (4A5BE01D)
    fffff880`013c9000 fffff880`013f9000   CLASSPNP CLASSPNP.SYS Mon Jul 13 16:19:58 2009 (4A5BC11E)
    fffff880`00c7a000 fffff880`00cd8000   CLFS     CLFS.SYS     Mon Jul 13 16:19:57 2009 (4A5BC11D)
    fffff880`014cd000 fffff880`01540000   cng      cng.sys      Mon Jul 13 16:49:40 2009 (4A5BC814)
    fffff880`040b2000 fffff880`040c2000   CompositeBus CompositeBus.sys Mon Jul 13 17:00:33 2009 (4A5BCAA1)
    fffff880`05c3d000 fffff880`05c4b000   crashdmp crashdmp.sys Mon Jul 13 17:01:01 2009 (4A5BCABD)
    fffff880`040c5000 fffff880`04148000   csc      csc.sys      Mon Jul 13 16:24:26 2009 (4A5BC22A)
    fffff880`04148000 fffff880`04166000   dfsc     dfsc.sys     Mon Jul 13 16:23:44 2009 (4A5BC200)
    fffff880`03e7c000 fffff880`03e8b000   discache discache.sys Mon Jul 13 16:37:18 2009 (4A5BC52E)
    fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 16:19:57 2009 (4A5BC11D)
    fffff880`05f66000 fffff880`05f88000   drmk     drmk.sys     Mon Jul 13 18:01:25 2009 (4A5BD8E5)
    fffff880`05c57000 fffff880`05c60000   dump_atapi dump_atapi.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
    fffff880`05c4b000 fffff880`05c57000   dump_ataport dump_ataport.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
    fffff880`05c60000 fffff880`05c73000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 16:21:51 2009 (4A5BC18F)
    fffff880`05c73000 fffff880`05c7f000   Dxapi    Dxapi.sys    Mon Jul 13 16:38:28 2009 (4A5BC574)
    fffff880`14a89000 fffff880`14b7d000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 18:00:14 2009 (4AC5509E)
    fffff880`14b7d000 fffff880`14bc3000   dxgmms1  dxgmms1.sys  Mon Jul 13 16:38:32 2009 (4A5BC578)
    fffff880`052aa000 fffff880`052e0000   fastfat  fastfat.SYS  Mon Jul 13 16:23:28 2009 (4A5BC1F0)
    fffff880`04099000 fffff880`040a6000   fdc      fdc.sys      Mon Jul 13 17:00:54 2009 (4A5BCAB6)
    fffff880`00fe0000 fffff880`00ff4000   fileinfo fileinfo.sys Mon Jul 13 16:34:25 2009 (4A5BC481)
    fffff880`05272000 fffff880`0527d000   flpydisk flpydisk.sys Mon Jul 13 17:00:54 2009 (4A5BCAB6)
    fffff880`00d98000 fffff880`00de4000   fltmgr   fltmgr.sys   Mon Jul 13 16:19:59 2009 (4A5BC11F)
    fffff880`01551000 fffff880`0155b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 16:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 19:34:26 2009 (4ABD7DB2)
    fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 16:21:08 2009 (4A5BC164)
    fffff880`06e39000 fffff880`06e42000   gdrv     gdrv.sys     Thu Mar 12 20:22:29 2009 (49B9D175)
    fffff880`06e42000 fffff880`06e4c000   GVTDrv64 GVTDrv64.sys Tue Sep 05 00:10:02 2006 (44FD22CA)
    fffff800`035f6000 fffff800`0363f000   hal      hal.dll      Mon Jul 13 18:27:36 2009 (4A5BDF08)
    fffff880`04075000 fffff880`04099000   HDAudBus HDAudBus.sys Mon Jul 13 17:06:13 2009 (4A5BCBF5)
    fffff880`05c00000 fffff880`05c19000   HIDCLASS HIDCLASS.SYS Mon Jul 13 17:06:21 2009 (4A5BCBFD)
    fffff880`05c19000 fffff880`05c21080   HIDPARSE HIDPARSE.SYS Mon Jul 13 17:06:17 2009 (4A5BCBF9)
    fffff880`05fe3000 fffff880`05ff1000   hidusb   hidusb.sys   Mon Jul 13 17:06:22 2009 (4A5BCBFE)
    fffff880`052e0000 fffff880`053a8000   HTTP     HTTP.sys     Mon Jul 13 16:22:16 2009 (4A5BC1A8)
    fffff880`016d5000 fffff880`016de000   hwpolicy hwpolicy.sys Mon Jul 13 16:19:22 2009 (4A5BC0FA)
    fffff880`00e73000 fffff880`00e93000   jraid    jraid.sys    Wed Oct 07 04:26:03 2009 (4ACC7ACB)
    fffff880`04566000 fffff880`04575000   kbdclass kbdclass.sys Mon Jul 13 16:19:50 2009 (4A5BC116)
    fffff880`05c22000 fffff880`05c30000   kbdhid   kbdhid.sys   Mon Jul 13 17:00:20 2009 (4A5BCA94)
    fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Mon Jul 13 18:31:07 2009 (4A5BDFDB)
    fffff880`04400000 fffff880`04443000   ks       ks.sys       Mon Jul 13 17:00:31 2009 (4A5BCA9F)
    fffff880`014b3000 fffff880`014cd000   ksecdd   ksecdd.sys   Mon Jul 13 16:20:54 2009 (4A5BC156)
    fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:03:32 2009 (4B21E0B4)
    fffff880`05f88000 fffff880`05f8d200   ksthunk  ksthunk.sys  Mon Jul 13 17:00:19 2009 (4A5BCA93)
    fffff880`06777000 fffff880`06784000   lirsgt   lirsgt.sys   Sun May 17 06:06:57 2009 (4A100BF1)
    fffff880`05cd1000 fffff880`05ce6000   lltdio   lltdio.sys   Mon Jul 13 17:08:50 2009 (4A5BCC92)
    fffff880`05c8d000 fffff880`05cb0000   luafv    luafv.sys    Mon Jul 13 16:26:13 2009 (4A5BC295)
    fffff880`04584000 fffff880`045c0880   mcdbus   mcdbus.sys   Tue Feb 24 03:34:07 2009 (49A3CD1F)
    fffff880`00c59000 fffff880`00c66000   mcupdate mcupdate.dll Mon Jul 13 18:29:09 2009 (4A5BDF65)
    fffff880`05c7f000 fffff880`05c8d000   monitor  monitor.sys  Mon Jul 13 16:38:52 2009 (4A5BC58C)
    fffff880`04575000 fffff880`04584000   mouclass mouclass.sys Mon Jul 13 16:19:50 2009 (4A5BC116)
    fffff880`05c30000 fffff880`05c3d000   mouhid   mouhid.sys   Mon Jul 13 17:00:20 2009 (4A5BCA94)
    fffff880`00e93000 fffff880`00ead000   mountmgr mountmgr.sys Mon Jul 13 16:19:54 2009 (4A5BC11A)
    fffff880`053c6000 fffff880`053de000   mpsdrv   mpsdrv.sys   Mon Jul 13 17:08:25 2009 (4A5BCC79)
    fffff880`0446c000 fffff880`04499000   mrxsmb   mrxsmb.sys   Sat Feb 27 00:52:19 2010 (4B88CF33)
    fffff880`066b7000 fffff880`06705000   mrxsmb10 mrxsmb10.sys Sat Feb 27 00:52:28 2010 (4B88CF3C)
    fffff880`06705000 fffff880`06728000   mrxsmb20 mrxsmb20.sys Sat Feb 27 00:52:26 2010 (4B88CF3A)
    fffff880`00ee0000 fffff880`00eeb000   msahci   msahci.sys   Mon Jul 13 17:01:01 2009 (4A5BCABD)
    fffff880`02cd2000 fffff880`02cdd000   Msfs     Msfs.SYS     Mon Jul 13 16:19:47 2009 (4A5BC113)
    fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 16:19:26 2009 (4A5BC0FE)
    fffff880`01455000 fffff880`014b3000   msrpc    msrpc.sys    Mon Jul 13 16:21:32 2009 (4A5BC17C)
    fffff880`03e71000 fffff880`03e7c000   mssmbios mssmbios.sys Mon Jul 13 16:31:10 2009 (4A5BC3BE)
    fffff880`017ec000 fffff880`017fe000   mup      mup.sys      Mon Jul 13 16:23:45 2009 (4A5BC201)
    fffff880`016e2000 fffff880`017d4000   ndis     ndis.sys     Mon Jul 13 16:21:40 2009 (4A5BC184)
    fffff880`044ca000 fffff880`044d6000   ndistapi ndistapi.sys Mon Jul 13 17:10:00 2009 (4A5BCCD8)
    fffff880`044d6000 fffff880`04505000   ndiswan  ndiswan.sys  Mon Jul 13 17:10:11 2009 (4A5BCCE3)
    fffff880`0527d000 fffff880`05292000   NDProxy  NDProxy.SYS  Mon Jul 13 17:10:05 2009 (4A5BCCDD)
    fffff880`03f66000 fffff880`03f75000   netbios  netbios.sys  Mon Jul 13 17:09:26 2009 (4A5BCCB6)
    fffff880`02d6a000 fffff880`02daf000   netbt    netbt.sys    Mon Jul 13 16:21:28 2009 (4A5BC178)
    fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 16:21:46 2009 (4A5BC18A)
    fffff880`02cdd000 fffff880`02cee000   Npfs     Npfs.SYS     Mon Jul 13 16:19:48 2009 (4A5BC114)
    fffff880`03e65000 fffff880`03e71000   nsiproxy nsiproxy.sys Mon Jul 13 16:21:02 2009 (4A5BC15E)
    fffff800`0301a000 fffff800`035f6000   nt       ntkrnlmp.exe Sat Feb 27 00:55:23 2010 (4B88CFEB)
    fffff880`01226000 fffff880`013c9000   Ntfs     Ntfs.sys     Mon Jul 13 16:20:47 2009 (4A5BC14F)
    fffff880`00ff4000 fffff880`00ffd000   Null     Null.SYS     Mon Jul 13 16:19:37 2009 (4A5BC109)
    fffff880`04455000 fffff880`0446c000   nusb3hub nusb3hub.sys Fri Nov 20 03:15:57 2009 (4B066C5D)
    fffff880`14bc3000 fffff880`14bf3000   nusb3xhc nusb3xhc.sys Fri Nov 20 03:16:01 2009 (4B066C61)
    fffff880`14a87000 fffff880`14a88180   nvBridge nvBridge.kmd Mon Jun 07 15:07:11 2010 (4C0D6D8F)
    fffff880`13e19000 fffff880`14a86c80   nvlddmkm nvlddmkm.sys Mon Jun 07 15:16:55 2010 (4C0D6FD7)
    fffff880`03f40000 fffff880`03f66000   pacer    pacer.sys    Mon Jul 13 17:09:41 2009 (4A5BCCC5)
    fffff880`03e8b000 fffff880`03ea8000   parport  parport.sys  Mon Jul 13 17:00:40 2009 (4A5BCAA8)
    fffff880`0106e000 fffff880`01083000   partmgr  partmgr.sys  Mon Jul 13 16:19:58 2009 (4A5BC11E)
    fffff880`00fa2000 fffff880`00fd5000   pci      pci.sys      Mon Jul 13 16:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 16:19:49 2009 (4A5BC115)
    fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 16:19:48 2009 (4A5BC114)
    fffff880`01540000 fffff880`01551000   pcw      pcw.sys      Mon Jul 13 16:19:27 2009 (4A5BC0FF)
    fffff880`06600000 fffff880`066a6000   peauth   peauth.sys   Mon Jul 13 18:01:19 2009 (4A5BD8DF)
    fffff880`05f29000 fffff880`05f66000   portcls  portcls.sys  Mon Jul 13 17:06:27 2009 (4A5BCC03)
    fffff880`00c66000 fffff880`00c7a000   PSHED    PSHED.dll    Mon Jul 13 18:32:23 2009 (4A5BE027)
    fffff880`044a6000 fffff880`044ca000   rasl2tp  rasl2tp.sys  Mon Jul 13 17:10:11 2009 (4A5BCCE3)
    fffff880`04505000 fffff880`04520000   raspppoe raspppoe.sys Mon Jul 13 17:10:17 2009 (4A5BCCE9)
    fffff880`04520000 fffff880`04541000   raspptp  raspptp.sys  Mon Jul 13 17:10:18 2009 (4A5BCCEA)
    fffff880`04541000 fffff880`0455b000   rassstp  rassstp.sys  Mon Jul 13 17:10:25 2009 (4A5BCCF1)
    fffff880`03e14000 fffff880`03e65000   rdbss    rdbss.sys    Mon Jul 13 16:24:09 2009 (4A5BC219)
    fffff880`0455b000 fffff880`04566000   rdpbus   rdpbus.sys   Mon Jul 13 17:17:46 2009 (4A5BCEAA)
    fffff880`02cb7000 fffff880`02cc0000   RDPCDD   RDPCDD.sys   Mon Jul 13 17:16:34 2009 (4A5BCE62)
    fffff880`02cc0000 fffff880`02cc9000   rdpencdd rdpencdd.sys Mon Jul 13 17:16:34 2009 (4A5BCE62)
    fffff880`02cc9000 fffff880`02cd2000   rdprefmp rdprefmp.sys Mon Jul 13 17:16:35 2009 (4A5BCE63)
    fffff880`015a7000 fffff880`015e1000   rdyboost rdyboost.sys Mon Jul 13 16:34:34 2009 (4A5BC48A)
    fffff880`05292000 fffff880`052aa000   rspndr   rspndr.sys   Mon Jul 13 17:08:50 2009 (4A5BCC92)
    fffff880`0401e000 fffff880`04075000   Rt64win7 Rt64win7.sys Mon Mar 22 02:57:14 2010 (4BA73EFA)
    fffff880`05cea000 fffff880`05f28580   RTKVHD64 RTKVHD64.sys Fri Apr 30 02:05:58 2010 (4BDA9D76)
    fffff880`05ff1000 fffff880`05ffd000   RtNdPt60 RtNdPt60.sys Sun Jul 19 19:27:32 2009 (4A63D614)
    fffff880`011b7000 fffff880`011e6000   SCSIPORT SCSIPORT.SYS Mon Jul 13 17:01:04 2009 (4A5BCAC0)
    fffff880`066a6000 fffff880`066b1000   secdrv   secdrv.SYS   Wed Sep 13 06:18:38 2006 (4508052E)
    fffff880`040a6000 fffff880`040b2000   serenum  serenum.sys  Mon Jul 13 17:00:33 2009 (4A5BCAA1)
    fffff880`03f75000 fffff880`03f92000   serial   serial.sys   Mon Jul 13 17:00:40 2009 (4A5BCAA8)
    fffff880`017e4000 fffff880`017ec000   spldr    spldr.sys    Mon May 11 09:56:27 2009 (4A0858BB)
    fffff880`01087000 fffff880`011ae000   spvp     spvp.sys     Wed Apr 07 18:29:00 2010 (4BBD315C)
    fffff880`06f5a000 fffff880`06ff2000   srv      srv.sys      Tue Dec 08 01:32:55 2009 (4B1E0F37)
    fffff880`06ef1000 fffff880`06f5a000   srv2     srv2.sys     Mon Jul 13 16:25:02 2009 (4A5BC24E)
    fffff880`06784000 fffff880`067b1000   srvnet   srvnet.sys   Tue Dec 08 01:32:26 2009 (4B1E0F1A)
    fffff880`045c1000 fffff880`045c2480   swenum   swenum.sys   Mon Jul 13 17:00:18 2009 (4A5BCA92)
    fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Mon Jul 13 16:25:34 2009 (4A5BC26E)
    fffff880`067b1000 fffff880`067c3000   tcpipreg tcpipreg.sys Mon Jul 13 17:09:49 2009 (4A5BCCCD)
    fffff880`02d0c000 fffff880`02d19000   TDI      TDI.SYS      Mon Jul 13 16:21:18 2009 (4A5BC16E)
    fffff880`02cee000 fffff880`02d0c000   tdx      tdx.sys      Mon Jul 13 16:21:15 2009 (4A5BC16B)
    fffff880`03e00000 fffff880`03e14000   termdd   termdd.sys   Mon Jul 13 17:16:36 2009 (4A5BCE64)
    fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    Mon Jul 13 17:16:34 2009 (4A5BCE62)
    fffff880`041c6000 fffff880`041ec000   tunnel   tunnel.sys   Mon Jul 13 17:09:37 2009 (4A5BCCC1)
    fffff880`04443000 fffff880`04455000   umbus    umbus.sys    Mon Jul 13 17:06:56 2009 (4A5BCC20)
    fffff880`05fc6000 fffff880`05fe3000   usbccgp  usbccgp.sys  Mon Jul 13 17:06:45 2009 (4A5BCC15)
    fffff880`14bf3000 fffff880`14bf4f00   USBD     USBD.SYS     Mon Jul 13 17:06:23 2009 (4A5BCBFF)
    fffff880`13e00000 fffff880`13e11000   usbehci  usbehci.sys  Mon Jul 13 17:06:30 2009 (4A5BCC06)
    fffff880`05218000 fffff880`05272000   usbhub   usbhub.sys   Mon Jul 13 17:07:09 2009 (4A5BCC2D)
    fffff880`14bf5000 fffff880`14c00000   usbohci  usbohci.sys  Mon Jul 13 17:06:30 2009 (4A5BCC06)
    fffff880`02c00000 fffff880`02c56000   USBPORT  USBPORT.SYS  Mon Jul 13 17:06:31 2009 (4A5BCC07)
    fffff880`06ff2000 fffff880`06ffe000   usbprint usbprint.sys Mon Jul 13 17:38:18 2009 (4A5BD37A)
    fffff880`05fab000 fffff880`05fc6000   USBSTOR  USBSTOR.SYS  Mon Jul 13 17:06:34 2009 (4A5BCC0A)
    fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 17:01:31 2009 (4A5BCADB)
    fffff880`00c2a000 fffff880`00c38000   vga      vga.sys      Mon Jul 13 16:38:47 2009 (4A5BC587)
    fffff880`02c82000 fffff880`02ca7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 16:38:51 2009 (4A5BC58B)
    fffff880`03fad000 fffff880`03ffa000   vmm      vmm.sys      Sun Feb 18 01:11:21 2007 (45D80A29)
    fffff880`02c56000 fffff880`02c6b000   VMNetSrv VMNetSrv.sys Wed Jan 24 05:05:46 2007 (45B74B9A)
    fffff880`017d4000 fffff880`017e4000   vmstorfl vmstorfl.sys Mon Jul 13 16:42:54 2009 (4A5BC67E)
    fffff880`011e6000 fffff880`011fb000   volmgr   volmgr.sys   Mon Jul 13 16:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 16:20:33 2009 (4A5BC141)
    fffff880`0155b000 fffff880`015a7000   volsnap  volsnap.sys  Mon Jul 13 16:20:08 2009 (4A5BC128)
    fffff880`03f92000 fffff880`03fad000   wanarp   wanarp.sys   Mon Jul 13 17:10:21 2009 (4A5BCCED)
    fffff880`02ca7000 fffff880`02cb7000   watchdog watchdog.sys Mon Jul 13 16:37:35 2009 (4A5BC53F)
    fffff880`00eef000 fffff880`00f93000   Wdf01000 Wdf01000.sys Mon Jul 13 16:22:07 2009 (4A5BC19F)
    fffff880`00f93000 fffff880`00fa2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 16:19:54 2009 (4A5BC11A)
    fffff880`03f37000 fffff880`03f40000   wfplwf   wfplwf.sys   Mon Jul 13 17:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   Sat May 01 08:06:30 2010 (4BDC4376)
    fffff880`067c3000 fffff880`067cc000   WinFLdrv WinFLdrv.sys Wed Nov 18 06:05:58 2009 (4B03F136)
    fffff880`04015000 fffff880`0401e000   wmiacpi  wmiacpi.sys  Mon Jul 13 16:31:02 2009 (4A5BC3B6)
    fffff880`011ae000 fffff880`011b7000   WMILIB   WMILIB.SYS   Mon Jul 13 16:19:51 2009 (4A5BC117)
    fffff880`05cb0000 fffff880`05cd1000   WudfPf   WudfPf.sys   Mon Jul 13 17:05:37 2009 (4A5BCBD1)
    fffff880`06e00000 fffff880`06e31000   WUDFRd   WUDFRd.sys   Mon Jul 13 17:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`06e53000 fffff880`06ec4000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`015e9000 fffff880`015f7000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01200000 fffff880`0120c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`015f7000 fffff880`01600000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`0120c000 fffff880`0121f000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    ~Lordbob
      My Computer


  3. Posts : 1,598
    Microsoft Window 7 Professional 32 bit
       #3

    I guess this BSODs was caused by your AVG antivirus software, as it is indicated in one minidump. I would recommend you to remove AVG just for testing purpose
    AVG is known to cause BSOD, on some systems. I suggest that you uninstall it while trouble shooting using the uninstall tool > Info > Tool (32bit) - Tool (64 bit). If you have AVG Identity Protection installed, uninstall it also >Info > Tool. I recommend that you install MSE and make sure Windows Firewall is turned on.
    Secondly, please run system file check
    Start-->cmd (run as administrator)-->sfc /scannow (space between sfc and /)

    One of the dump indicated Ntfs.sys, this is hard drive controller driver, I would run a check disk to make sure things are ok:
    Disk Check

    BUGcheck:
    Code:
    BugCheck 50, {fffff8200342da20, 0, fffff880012d2c50, 5}
    
    
    Could not read faulting driver name
    Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+227 )
    
    Followup: MachineOwner
    ---------
    BugCheck 50, {fffff820039a25a0, 0, fffff80003387bc6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : ntkrnlmp.exe ( nt!RtlEqualUnicodeString+26 )
    
    Followup: MachineOwner
    ---------
    Update these drivers:
    Code:
    AODDriver AODDriver.sys Mon Oct 13 11:38:55 2008 (48F2D0DF)
    ~Tuan

    opp...LB is faster than me...good job AVG LB
      My Computer


  4. Posts : 21
    Windows 7 Professional 64 bit (6.1, Build 7600)
    Thread Starter
       #4

    See I knew all I had to do was ask the masters. Thankyou LB and Tuan. AVG is gone and MSE is scanning. Driver updated and system scan running. I did a disk check on boot up last night. 2T takes a long time. I will start scanning other drives. Is the built in tool best or is there a program that some one suggests. Lets hope that kills the BSODS.

    Any one have any suggestions for the SLOP(sudden loss of power) and then reboot?
      My Computer


  5. Posts : 1,598
    Microsoft Window 7 Professional 32 bit
       #5

    You can try to update power manager drivers for your computer. I don't know if it is availble for your machine but check it out. Adapter can be problem too...I'm not a hardware guy:)
      My Computer


  6. Posts : 21
    Windows 7 Professional 64 bit (6.1, Build 7600)
    Thread Starter
       #6

    Hey guys just wanted to close this out. Problem turned out to be a couple drivers, lost allocated space on a couple harddrives and it appears GOM media player. Is there a known issue or should I look into it for additional info?

    Oh and as I looked more into my system activities log I noticed that about a minute or two before the crashes the Application Experience service aka AeLookupSvc was started. I guess there was some kind of issues with this compatibility service. I disabled and haven't crashed a single time today.
    Last edited by Rothmclear; 28 Jun 2010 at 22:25.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 05:02.
Find Us