Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD and random shutdowns help!!!

25 Jun 2010   #1
Rothmclear

Windows 7 Professional 64 bit (6.1, Build 7600)
 
 
BSOD and random shutdowns help!!!

Hi all.

Starting about 2 weeks ago my computer has had massive issues. Three different crashes.

First just shuts down acts like a 90s mac. Using it and suddenly boom its booting up. This happens 2-10 times a day.

2nd just locks up with very loud buzz noise coming thru speakers. I have to reset to fix and comp reboots. This is happens about once everyday.

3rd is BSOD I have attached the last three dumps. There would be more but I just formatted and reinstalled.

Before anyone asks or suggests I have run Memtest my Ram is good. I have also tried three different video cards. tried 2 different power suplies. All drivers are up to date as of yesterday. (6-24-2010) My CPU temps never get above 55c.

My main priority is BSOD then I will focus on mac like shutdowns.


My System SpecsSystem Spec
.
25 Jun 2010   #2
Lordbob75

Windows 7 Ultimate x64, Mint 9
 
 

One of your dumps points to AVG as the cause. This program is KNOWN to cause BSoDs (we see about 2 a day), and it is recommended that you just remove it. MSE is a great alternative.



Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062510-25802-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`0329ce50
Debug session time: Fri Jun 25 18:51:50.007 2010 (UTC - 7:00)
System Uptime: 0 days 1:12:01.723
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffffa000a50a2f0, 2, 1, fffff800030d470c}

Unable to load image avgtdia.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdia.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdia.sys
Probably caused by : avgtdia.sys ( avgtdia+8be6 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa000a50a2f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030d470c, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800033070e0
 fffffa000a50a2f0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!ObfDereferenceObject+2c
fffff800`030d470c f0480fc11f      lock xadd qword ptr [rdi],rbx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88004db2270 -- (.trap 0xfffff88004db2270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa000a50a320
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030d470c rsp=fffff88004db2400 rbp=ffffffffffffffff
 r8=fffff8000305f000  r9=0000000000000000 r10=fffffa800a79a700
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x2c:
fffff800`030d470c f0480fc11f      lock xadd qword ptr [rdi],rbx ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030ceb69 to fffff800030cf600

STACK_TEXT:  
fffff880`04db2128 fffff800`030ceb69 : 00000000`0000000a fffffa00`0a50a2f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`04db2130 fffff800`030cd7e0 : 00000000`00000001 ffffffff`ffffffff fffffa80`08285d02 fffffa80`08f05500 : nt!KiBugCheckDispatch+0x69
fffff880`04db2270 fffff800`030d470c : 00000000`00000000 fffff880`04db2400 00000000`00000000 fffff880`04db2410 : nt!KiPageFault+0x260
fffff880`04db2400 fffff880`03f2e686 : ffffffff`ffffffff fffffa80`0a979000 00000000`00000014 fffffa80`09c63790 : nt!ObfDereferenceObject+0x2c
fffff880`04db2460 fffff880`03f2e60a : 00000000`00000000 fffffa80`0a979000 fffff880`0196d9a0 fffff880`03f2e6e5 : afd!AfdDerefPollInfoFileObjects+0x36
fffff880`04db2490 fffff880`03f23448 : 00000000`00000000 00000000`00000000 fffffa80`09c63790 00000000`00000001 : afd!AfdCompletePollIrp+0x9a
fffff880`04db24e0 fffff880`03f4af5f : fffffa80`0a979f68 00000000`00000001 00000000`00000000 00000000`0000007c : afd!AfdIndicatePollEvent+0x138
fffff880`04db2530 fffff880`02d05be6 : fffffa80`0a768e90 fffff880`04db2968 fffffa80`00000c20 fffffa80`0000007c : afd!AfdBReceiveEventHandler+0x5af
fffff880`04db25f0 fffffa80`0a768e90 : fffff880`04db2968 fffffa80`00000c20 fffffa80`0000007c fffff880`0000007c : avgtdia+0x8be6
fffff880`04db25f8 fffff880`04db2968 : fffffa80`00000c20 fffffa80`0000007c fffff880`0000007c fffff880`04db26b4 : 0xfffffa80`0a768e90
fffff880`04db2600 fffffa80`00000c20 : fffffa80`0000007c fffff880`0000007c fffff880`04db26b4 fffff880`04827a02 : 0xfffff880`04db2968
fffff880`04db2608 fffffa80`0000007c : fffff880`0000007c fffff880`04db26b4 fffff880`04827a02 fffff880`04db26b8 : 0xfffffa80`00000c20
fffff880`04db2610 fffff880`0000007c : fffff880`04db26b4 fffff880`04827a02 fffff880`04db26b8 fffffa80`0a66ce30 : 0xfffffa80`0000007c
fffff880`04db2618 fffff880`04db26b4 : fffff880`04827a02 fffff880`04db26b8 fffffa80`0a66ce30 fffff880`03f4a9b0 : 0xfffff880`0000007c
fffff880`04db2620 fffff880`04827a02 : fffff880`04db26b8 fffffa80`0a66ce30 fffff880`03f4a9b0 00000000`0000007c : 0xfffff880`04db26b4
fffff880`04db2628 fffff880`04db26b8 : fffffa80`0a66ce30 fffff880`03f4a9b0 00000000`0000007c fffff880`04827a02 : 0xfffff880`04827a02
fffff880`04db2630 fffffa80`0a66ce30 : fffff880`03f4a9b0 00000000`0000007c fffff880`04827a02 fffff880`02d05b10 : 0xfffff880`04db26b8
fffff880`04db2638 fffff880`03f4a9af : 00000000`0000007c fffff880`04827a02 fffff880`02d05b10 fffff880`04db27d0 : 0xfffffa80`0a66ce30
fffff880`04db2640 00000000`00000001 : fffffa80`07c6f110 fffffa80`07767010 fffffa80`07862d38 fffffa80`09797080 : afd!AfdRestartConnect+0x24f
fffff880`04db26c0 fffffa80`07c6f110 : fffffa80`07767010 fffffa80`07862d38 fffffa80`09797080 fffffa80`0a51cd30 : 0x1
fffff880`04db26c8 fffffa80`07767010 : fffffa80`07862d38 fffffa80`09797080 fffffa80`0a51cd30 00000000`00000000 : 0xfffffa80`07c6f110
fffff880`04db26d0 fffffa80`07862d38 : fffffa80`09797080 fffffa80`0a51cd30 00000000`00000000 00000000`00000000 : 0xfffffa80`07767010
fffff880`04db26d8 fffffa80`09797080 : fffffa80`0a51cd30 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`07862d38
fffff880`04db26e0 fffffa80`0a51cd30 : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`00000000 : 0xfffffa80`09797080
fffff880`04db26e8 00000000`00000000 : 00000000`00000000 00000000`00000001 fffffa80`00000000 00000000`00000020 : 0xfffffa80`0a51cd30


STACK_COMMAND:  kb

FOLLOWUP_IP: 
avgtdia+8be6
fffff880`02d05be6 ??              ???

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  avgtdia+8be6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: avgtdia

IMAGE_NAME:  avgtdia.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4bd4af8f

FAILURE_BUCKET_ID:  X64_0xA_avgtdia+8be6

BUCKET_ID:  X64_0xA_avgtdia+8be6

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062110-30030-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0301c000 PsLoadedModuleList = 0xfffff800`03259e50
Debug session time: Mon Jun 21 15:13:29.671 2010 (UTC - 7:00)
System Uptime: 0 days 3:37:06.983
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff820039a25a0, 0, fffff80003387bc6, 5}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!RtlEqualUnicodeString+26 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff820039a25a0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80003387bc6, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c40e0
 fffff820039a25a0 

FAULTING_IP: 
nt!RtlEqualUnicodeString+26
fffff800`03387bc6 488b02          mov     rax,qword ptr [rdx]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  taskhost.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880095106b0 -- (.trap 0xfffff880095106b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000e rbx=0000000000000000 rcx=fffff88009510950
rdx=fffff820039a25a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003387bc6 rsp=fffff88009510840 rbp=00000000189ebd7e
 r8=0000000000000001  r9=fffff8a00c98bab0 r10=000000000000000e
r11=fffff8a00c98babe r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlEqualUnicodeString+0x26:
fffff800`03387bc6 488b02          mov     rax,qword ptr [rdx] ds:fffff820`039a25a0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000310b801 to fffff8000308c600

STACK_TEXT:  
fffff880`09510548 fffff800`0310b801 : 00000000`00000050 fffff820`039a25a0 00000000`00000000 fffff880`095106b0 : nt!KeBugCheckEx
fffff880`09510550 fffff800`0308a6ee : 00000000`00000000 fffff8a0`04accbd0 fffff8a0`00010500 fffff8a0`0544c940 : nt! ?? ::FNODOBFM::`string'+0x40ecb
fffff880`095106b0 fffff800`03387bc6 : fffff8a0`015cbf60 fffff800`033874cb 00000000`06cb888e fffff8a0`0000cb70 : nt!KiPageFault+0x16e
fffff880`09510840 fffff800`033874cb : 00000000`06cb888e fffff8a0`0000cb70 fffff8a0`00004900 fffffa80`0a956660 : nt!RtlEqualUnicodeString+0x26
fffff880`09510850 fffff800`0338698f : 00000000`00000040 fffff880`09510950 fffffa80`08f3a801 00000000`00000001 : nt!ObpLookupDirectoryEntry+0x19b
fffff880`095108b0 fffff800`0338bb76 : fffffa80`08f3a690 fffff880`09510a30 fffffa80`00000040 fffffa80`06a40360 : nt!ObpLookupObjectName+0x4b0
fffff880`095109b0 fffff800`03392887 : 00000000`000007ff 00000000`00000001 fffffa80`0a958201 00000000`00000180 : nt!ObOpenObjectByName+0x306
fffff880`09510a80 fffff800`033ab5b4 : 00000000`00e9ed00 fffff8a0`00100080 fffff8a0`0eb1ba30 00000000`00e9ed50 : nt!IopCreateFile+0x2b7
fffff880`09510b20 fffff800`0308b853 : fffffa80`0ac72060 00000000`00000001 fffffa80`0a956660 fffff800`033a33b4 : nt!NtOpenFile+0x58
fffff880`09510bb0 00000000`77b801ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00e9ecb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b801ea


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!RtlEqualUnicodeString+26
fffff800`03387bc6 488b02          mov     rax,qword ptr [rdx]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!RtlEqualUnicodeString+26

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x50_nt!RtlEqualUnicodeString+26

BUCKET_ID:  X64_0x50_nt!RtlEqualUnicodeString+26

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062210-24024-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0301a000 PsLoadedModuleList = 0xfffff800`03257e50
Debug session time: Tue Jun 22 16:01:56.112 2010 (UTC - 7:00)
System Uptime: 0 days 9:58:55.883
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8200342da20, 0, fffff880012d2c50, 5}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+227 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8200342da20, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012d2c50, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c20e0
 fffff8200342da20 

FAULTING_IP: 
Ntfs!NtfsFindPrefixHashEntry+227
fffff880`012d2c50 498b7c2418      mov     rdi,qword ptr [r12+18h]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  GUI.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880087297c0 -- (.trap 0xfffff880087297c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000054 rbx=0000000000000000 rcx=000000000000035e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012d2c50 rsp=fffff88008729950 rbp=0000000000000000
 r8=00000000188f99af  r9=0000000000000000 r10=0000000000000006
r11=fffff88008729998 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!NtfsFindPrefixHashEntry+0x227:
fffff880`012d2c50 498b7c2418      mov     rdi,qword ptr [r12+18h] ds:00d8:00000000`00000018=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003109801 to fffff8000308a600

STACK_TEXT:  
fffff880`08729658 fffff800`03109801 : 00000000`00000050 fffff820`0342da20 00000000`00000000 fffff880`087297c0 : nt!KeBugCheckEx
fffff880`08729660 fffff800`030886ee : 00000000`00000000 fffff8a0`03977320 00000000`00000000 fffff8a0`0489b010 : nt! ?? ::FNODOBFM::`string'+0x40ecb
fffff880`087297c0 fffff880`012d2c50 : fffff880`07929aa0 fffff8a0`001fd640 fffffa80`07c0f180 00000000`00000080 : nt!KiPageFault+0x16e
fffff880`08729950 fffff880`012d3ce2 : fffffa80`06b48010 fffffa80`07c10350 fffff8a0`001fd640 00000000`00000701 : Ntfs!NtfsFindPrefixHashEntry+0x227
fffff880`08729a80 fffff880`012ce28d : fffffa80`06b48010 fffffa80`071268a0 fffff880`08729c60 fffff880`08729ca8 : Ntfs!NtfsFindStartingNode+0x452
fffff880`08729b50 fffff880`01237c0d : fffffa80`06b48010 fffffa80`071268a0 fffff880`07929aa0 fffffa80`0a273900 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`08729d30 fffff800`03082487 : fffff880`07929a10 00000000`7efd7000 00000000`7efd5000 00000000`032cff88 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`08729d60 fffff800`03082441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`079298e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsFindPrefixHashEntry+227
fffff880`012d2c50 498b7c2418      mov     rdi,qword ptr [r12+18h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+227

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsFindPrefixHashEntry+227

BUCKET_ID:  X64_0x50_Ntfs!NtfsFindPrefixHashEntry+227

Followup: MachineOwner
---------

1: kd> lmtsmn
start             end                 module name
fffff880`02daf000 fffff880`02ded000   1394ohci 1394ohci.sys Mon Jul 13 17:07:12 2009 (4A5BCC30)
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 16:19:34 2009 (4A5BC106)
fffff880`03ead000 fffff880`03f37000   afd      afd.sys      Mon Jul 13 16:21:40 2009 (4A5BC184)
fffff880`02c6b000 fffff880`02c81000   AgileVpn AgileVpn.sys Mon Jul 13 17:10:24 2009 (4A5BCCF0)
fffff880`06e31000 fffff880`06e39000   ALSysIO64 ALSysIO64.sys Sun Apr 19 12:41:04 2009 (49EB7E50)
fffff880`04000000 fffff880`04015000   amdppm   amdppm.sys   Mon Jul 13 16:19:25 2009 (4A5BC0FD)
fffff880`00fd5000 fffff880`00fe0000   amdxata  amdxata.sys  Tue May 19 10:56:59 2009 (4A12F2EB)
fffff880`06e4c000 fffff880`06e53000   AODDriver AODDriver.sys Sun Oct 12 21:38:55 2008 (48F2D0DF)
fffff880`06ec4000 fffff880`06ecf000   asyncmac asyncmac.sys Mon Jul 13 17:10:13 2009 (4A5BCCE5)
fffff880`00ead000 fffff880`00eb6000   atapi    atapi.sys    Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`00eb6000 fffff880`00ee0000   ataport  ataport.SYS  Mon Jul 13 16:19:52 2009 (4A5BC118)
fffff880`015e1000 fffff880`015e9000   AtiPcie  AtiPcie.sys  Tue May 05 08:00:22 2009 (4A005486)
fffff880`06728000 fffff880`06777000   atksgt   atksgt.sys   Sun May 17 06:36:34 2009 (4A1012E2)
fffff880`0417f000 fffff880`041c6000   avgldx64 avgldx64.sys Wed Feb 10 20:52:31 2010 (4B737EFF)
fffff880`04177000 fffff880`0417e080   avgmfx64 avgmfx64.sys Sun Apr 25 14:06:15 2010 (4BD4AEC7)
fffff880`02d19000 fffff880`02d6a000   avgtdia  avgtdia.sys  Sun Apr 25 14:09:35 2010 (4BD4AF8F)
fffff880`0121f000 fffff880`01226000   Beep     Beep.SYS     Mon Jul 13 17:00:13 2009 (4A5BCA8D)
fffff880`04166000 fffff880`04177000   blbdrive blbdrive.sys Mon Jul 13 16:35:59 2009 (4A5BC4DF)
fffff880`053a8000 fffff880`053c6000   bowser   bowser.sys   Mon Jul 13 16:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Mon Jul 13 18:25:40 2009 (4A5BDE94)
fffff880`05f8e000 fffff880`05fab000   cdfs     cdfs.sys     Mon Jul 13 16:19:46 2009 (4A5BC112)
fffff880`00c00000 fffff880`00c2a000   cdrom    cdrom.sys    Mon Jul 13 16:19:54 2009 (4A5BC11A)
fffff880`00cd8000 fffff880`00d98000   CI       CI.dll       Mon Jul 13 18:32:13 2009 (4A5BE01D)
fffff880`013c9000 fffff880`013f9000   CLASSPNP CLASSPNP.SYS Mon Jul 13 16:19:58 2009 (4A5BC11E)
fffff880`00c7a000 fffff880`00cd8000   CLFS     CLFS.SYS     Mon Jul 13 16:19:57 2009 (4A5BC11D)
fffff880`014cd000 fffff880`01540000   cng      cng.sys      Mon Jul 13 16:49:40 2009 (4A5BC814)
fffff880`040b2000 fffff880`040c2000   CompositeBus CompositeBus.sys Mon Jul 13 17:00:33 2009 (4A5BCAA1)
fffff880`05c3d000 fffff880`05c4b000   crashdmp crashdmp.sys Mon Jul 13 17:01:01 2009 (4A5BCABD)
fffff880`040c5000 fffff880`04148000   csc      csc.sys      Mon Jul 13 16:24:26 2009 (4A5BC22A)
fffff880`04148000 fffff880`04166000   dfsc     dfsc.sys     Mon Jul 13 16:23:44 2009 (4A5BC200)
fffff880`03e7c000 fffff880`03e8b000   discache discache.sys Mon Jul 13 16:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 16:19:57 2009 (4A5BC11D)
fffff880`05f66000 fffff880`05f88000   drmk     drmk.sys     Mon Jul 13 18:01:25 2009 (4A5BD8E5)
fffff880`05c57000 fffff880`05c60000   dump_atapi dump_atapi.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`05c4b000 fffff880`05c57000   dump_ataport dump_ataport.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`05c60000 fffff880`05c73000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 16:21:51 2009 (4A5BC18F)
fffff880`05c73000 fffff880`05c7f000   Dxapi    Dxapi.sys    Mon Jul 13 16:38:28 2009 (4A5BC574)
fffff880`14a89000 fffff880`14b7d000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 18:00:14 2009 (4AC5509E)
fffff880`14b7d000 fffff880`14bc3000   dxgmms1  dxgmms1.sys  Mon Jul 13 16:38:32 2009 (4A5BC578)
fffff880`052aa000 fffff880`052e0000   fastfat  fastfat.SYS  Mon Jul 13 16:23:28 2009 (4A5BC1F0)
fffff880`04099000 fffff880`040a6000   fdc      fdc.sys      Mon Jul 13 17:00:54 2009 (4A5BCAB6)
fffff880`00fe0000 fffff880`00ff4000   fileinfo fileinfo.sys Mon Jul 13 16:34:25 2009 (4A5BC481)
fffff880`05272000 fffff880`0527d000   flpydisk flpydisk.sys Mon Jul 13 17:00:54 2009 (4A5BCAB6)
fffff880`00d98000 fffff880`00de4000   fltmgr   fltmgr.sys   Mon Jul 13 16:19:59 2009 (4A5BC11F)
fffff880`01551000 fffff880`0155b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 16:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 19:34:26 2009 (4ABD7DB2)
fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 16:21:08 2009 (4A5BC164)
fffff880`06e39000 fffff880`06e42000   gdrv     gdrv.sys     Thu Mar 12 20:22:29 2009 (49B9D175)
fffff880`06e42000 fffff880`06e4c000   GVTDrv64 GVTDrv64.sys Tue Sep 05 00:10:02 2006 (44FD22CA)
fffff800`035f6000 fffff800`0363f000   hal      hal.dll      Mon Jul 13 18:27:36 2009 (4A5BDF08)
fffff880`04075000 fffff880`04099000   HDAudBus HDAudBus.sys Mon Jul 13 17:06:13 2009 (4A5BCBF5)
fffff880`05c00000 fffff880`05c19000   HIDCLASS HIDCLASS.SYS Mon Jul 13 17:06:21 2009 (4A5BCBFD)
fffff880`05c19000 fffff880`05c21080   HIDPARSE HIDPARSE.SYS Mon Jul 13 17:06:17 2009 (4A5BCBF9)
fffff880`05fe3000 fffff880`05ff1000   hidusb   hidusb.sys   Mon Jul 13 17:06:22 2009 (4A5BCBFE)
fffff880`052e0000 fffff880`053a8000   HTTP     HTTP.sys     Mon Jul 13 16:22:16 2009 (4A5BC1A8)
fffff880`016d5000 fffff880`016de000   hwpolicy hwpolicy.sys Mon Jul 13 16:19:22 2009 (4A5BC0FA)
fffff880`00e73000 fffff880`00e93000   jraid    jraid.sys    Wed Oct 07 04:26:03 2009 (4ACC7ACB)
fffff880`04566000 fffff880`04575000   kbdclass kbdclass.sys Mon Jul 13 16:19:50 2009 (4A5BC116)
fffff880`05c22000 fffff880`05c30000   kbdhid   kbdhid.sys   Mon Jul 13 17:00:20 2009 (4A5BCA94)
fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Mon Jul 13 18:31:07 2009 (4A5BDFDB)
fffff880`04400000 fffff880`04443000   ks       ks.sys       Mon Jul 13 17:00:31 2009 (4A5BCA9F)
fffff880`014b3000 fffff880`014cd000   ksecdd   ksecdd.sys   Mon Jul 13 16:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:03:32 2009 (4B21E0B4)
fffff880`05f88000 fffff880`05f8d200   ksthunk  ksthunk.sys  Mon Jul 13 17:00:19 2009 (4A5BCA93)
fffff880`06777000 fffff880`06784000   lirsgt   lirsgt.sys   Sun May 17 06:06:57 2009 (4A100BF1)
fffff880`05cd1000 fffff880`05ce6000   lltdio   lltdio.sys   Mon Jul 13 17:08:50 2009 (4A5BCC92)
fffff880`05c8d000 fffff880`05cb0000   luafv    luafv.sys    Mon Jul 13 16:26:13 2009 (4A5BC295)
fffff880`04584000 fffff880`045c0880   mcdbus   mcdbus.sys   Tue Feb 24 03:34:07 2009 (49A3CD1F)
fffff880`00c59000 fffff880`00c66000   mcupdate mcupdate.dll Mon Jul 13 18:29:09 2009 (4A5BDF65)
fffff880`05c7f000 fffff880`05c8d000   monitor  monitor.sys  Mon Jul 13 16:38:52 2009 (4A5BC58C)
fffff880`04575000 fffff880`04584000   mouclass mouclass.sys Mon Jul 13 16:19:50 2009 (4A5BC116)
fffff880`05c30000 fffff880`05c3d000   mouhid   mouhid.sys   Mon Jul 13 17:00:20 2009 (4A5BCA94)
fffff880`00e93000 fffff880`00ead000   mountmgr mountmgr.sys Mon Jul 13 16:19:54 2009 (4A5BC11A)
fffff880`053c6000 fffff880`053de000   mpsdrv   mpsdrv.sys   Mon Jul 13 17:08:25 2009 (4A5BCC79)
fffff880`0446c000 fffff880`04499000   mrxsmb   mrxsmb.sys   Sat Feb 27 00:52:19 2010 (4B88CF33)
fffff880`066b7000 fffff880`06705000   mrxsmb10 mrxsmb10.sys Sat Feb 27 00:52:28 2010 (4B88CF3C)
fffff880`06705000 fffff880`06728000   mrxsmb20 mrxsmb20.sys Sat Feb 27 00:52:26 2010 (4B88CF3A)
fffff880`00ee0000 fffff880`00eeb000   msahci   msahci.sys   Mon Jul 13 17:01:01 2009 (4A5BCABD)
fffff880`02cd2000 fffff880`02cdd000   Msfs     Msfs.SYS     Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`01057000 fffff880`01061000   msisadrv msisadrv.sys Mon Jul 13 16:19:26 2009 (4A5BC0FE)
fffff880`01455000 fffff880`014b3000   msrpc    msrpc.sys    Mon Jul 13 16:21:32 2009 (4A5BC17C)
fffff880`03e71000 fffff880`03e7c000   mssmbios mssmbios.sys Mon Jul 13 16:31:10 2009 (4A5BC3BE)
fffff880`017ec000 fffff880`017fe000   mup      mup.sys      Mon Jul 13 16:23:45 2009 (4A5BC201)
fffff880`016e2000 fffff880`017d4000   ndis     ndis.sys     Mon Jul 13 16:21:40 2009 (4A5BC184)
fffff880`044ca000 fffff880`044d6000   ndistapi ndistapi.sys Mon Jul 13 17:10:00 2009 (4A5BCCD8)
fffff880`044d6000 fffff880`04505000   ndiswan  ndiswan.sys  Mon Jul 13 17:10:11 2009 (4A5BCCE3)
fffff880`0527d000 fffff880`05292000   NDProxy  NDProxy.SYS  Mon Jul 13 17:10:05 2009 (4A5BCCDD)
fffff880`03f66000 fffff880`03f75000   netbios  netbios.sys  Mon Jul 13 17:09:26 2009 (4A5BCCB6)
fffff880`02d6a000 fffff880`02daf000   netbt    netbt.sys    Mon Jul 13 16:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 16:21:46 2009 (4A5BC18A)
fffff880`02cdd000 fffff880`02cee000   Npfs     Npfs.SYS     Mon Jul 13 16:19:48 2009 (4A5BC114)
fffff880`03e65000 fffff880`03e71000   nsiproxy nsiproxy.sys Mon Jul 13 16:21:02 2009 (4A5BC15E)
fffff800`0301a000 fffff800`035f6000   nt       ntkrnlmp.exe Sat Feb 27 00:55:23 2010 (4B88CFEB)
fffff880`01226000 fffff880`013c9000   Ntfs     Ntfs.sys     Mon Jul 13 16:20:47 2009 (4A5BC14F)
fffff880`00ff4000 fffff880`00ffd000   Null     Null.SYS     Mon Jul 13 16:19:37 2009 (4A5BC109)
fffff880`04455000 fffff880`0446c000   nusb3hub nusb3hub.sys Fri Nov 20 03:15:57 2009 (4B066C5D)
fffff880`14bc3000 fffff880`14bf3000   nusb3xhc nusb3xhc.sys Fri Nov 20 03:16:01 2009 (4B066C61)
fffff880`14a87000 fffff880`14a88180   nvBridge nvBridge.kmd Mon Jun 07 15:07:11 2010 (4C0D6D8F)
fffff880`13e19000 fffff880`14a86c80   nvlddmkm nvlddmkm.sys Mon Jun 07 15:16:55 2010 (4C0D6FD7)
fffff880`03f40000 fffff880`03f66000   pacer    pacer.sys    Mon Jul 13 17:09:41 2009 (4A5BCCC5)
fffff880`03e8b000 fffff880`03ea8000   parport  parport.sys  Mon Jul 13 17:00:40 2009 (4A5BCAA8)
fffff880`0106e000 fffff880`01083000   partmgr  partmgr.sys  Mon Jul 13 16:19:58 2009 (4A5BC11E)
fffff880`00fa2000 fffff880`00fd5000   pci      pci.sys      Mon Jul 13 16:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 16:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 16:19:48 2009 (4A5BC114)
fffff880`01540000 fffff880`01551000   pcw      pcw.sys      Mon Jul 13 16:19:27 2009 (4A5BC0FF)
fffff880`06600000 fffff880`066a6000   peauth   peauth.sys   Mon Jul 13 18:01:19 2009 (4A5BD8DF)
fffff880`05f29000 fffff880`05f66000   portcls  portcls.sys  Mon Jul 13 17:06:27 2009 (4A5BCC03)
fffff880`00c66000 fffff880`00c7a000   PSHED    PSHED.dll    Mon Jul 13 18:32:23 2009 (4A5BE027)
fffff880`044a6000 fffff880`044ca000   rasl2tp  rasl2tp.sys  Mon Jul 13 17:10:11 2009 (4A5BCCE3)
fffff880`04505000 fffff880`04520000   raspppoe raspppoe.sys Mon Jul 13 17:10:17 2009 (4A5BCCE9)
fffff880`04520000 fffff880`04541000   raspptp  raspptp.sys  Mon Jul 13 17:10:18 2009 (4A5BCCEA)
fffff880`04541000 fffff880`0455b000   rassstp  rassstp.sys  Mon Jul 13 17:10:25 2009 (4A5BCCF1)
fffff880`03e14000 fffff880`03e65000   rdbss    rdbss.sys    Mon Jul 13 16:24:09 2009 (4A5BC219)
fffff880`0455b000 fffff880`04566000   rdpbus   rdpbus.sys   Mon Jul 13 17:17:46 2009 (4A5BCEAA)
fffff880`02cb7000 fffff880`02cc0000   RDPCDD   RDPCDD.sys   Mon Jul 13 17:16:34 2009 (4A5BCE62)
fffff880`02cc0000 fffff880`02cc9000   rdpencdd rdpencdd.sys Mon Jul 13 17:16:34 2009 (4A5BCE62)
fffff880`02cc9000 fffff880`02cd2000   rdprefmp rdprefmp.sys Mon Jul 13 17:16:35 2009 (4A5BCE63)
fffff880`015a7000 fffff880`015e1000   rdyboost rdyboost.sys Mon Jul 13 16:34:34 2009 (4A5BC48A)
fffff880`05292000 fffff880`052aa000   rspndr   rspndr.sys   Mon Jul 13 17:08:50 2009 (4A5BCC92)
fffff880`0401e000 fffff880`04075000   Rt64win7 Rt64win7.sys Mon Mar 22 02:57:14 2010 (4BA73EFA)
fffff880`05cea000 fffff880`05f28580   RTKVHD64 RTKVHD64.sys Fri Apr 30 02:05:58 2010 (4BDA9D76)
fffff880`05ff1000 fffff880`05ffd000   RtNdPt60 RtNdPt60.sys Sun Jul 19 19:27:32 2009 (4A63D614)
fffff880`011b7000 fffff880`011e6000   SCSIPORT SCSIPORT.SYS Mon Jul 13 17:01:04 2009 (4A5BCAC0)
fffff880`066a6000 fffff880`066b1000   secdrv   secdrv.SYS   Wed Sep 13 06:18:38 2006 (4508052E)
fffff880`040a6000 fffff880`040b2000   serenum  serenum.sys  Mon Jul 13 17:00:33 2009 (4A5BCAA1)
fffff880`03f75000 fffff880`03f92000   serial   serial.sys   Mon Jul 13 17:00:40 2009 (4A5BCAA8)
fffff880`017e4000 fffff880`017ec000   spldr    spldr.sys    Mon May 11 09:56:27 2009 (4A0858BB)
fffff880`01087000 fffff880`011ae000   spvp     spvp.sys     Wed Apr 07 18:29:00 2010 (4BBD315C)
fffff880`06f5a000 fffff880`06ff2000   srv      srv.sys      Tue Dec 08 01:32:55 2009 (4B1E0F37)
fffff880`06ef1000 fffff880`06f5a000   srv2     srv2.sys     Mon Jul 13 16:25:02 2009 (4A5BC24E)
fffff880`06784000 fffff880`067b1000   srvnet   srvnet.sys   Tue Dec 08 01:32:26 2009 (4B1E0F1A)
fffff880`045c1000 fffff880`045c2480   swenum   swenum.sys   Mon Jul 13 17:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Mon Jul 13 16:25:34 2009 (4A5BC26E)
fffff880`067b1000 fffff880`067c3000   tcpipreg tcpipreg.sys Mon Jul 13 17:09:49 2009 (4A5BCCCD)
fffff880`02d0c000 fffff880`02d19000   TDI      TDI.SYS      Mon Jul 13 16:21:18 2009 (4A5BC16E)
fffff880`02cee000 fffff880`02d0c000   tdx      tdx.sys      Mon Jul 13 16:21:15 2009 (4A5BC16B)
fffff880`03e00000 fffff880`03e14000   termdd   termdd.sys   Mon Jul 13 17:16:36 2009 (4A5BCE64)
fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    Mon Jul 13 17:16:34 2009 (4A5BCE62)
fffff880`041c6000 fffff880`041ec000   tunnel   tunnel.sys   Mon Jul 13 17:09:37 2009 (4A5BCCC1)
fffff880`04443000 fffff880`04455000   umbus    umbus.sys    Mon Jul 13 17:06:56 2009 (4A5BCC20)
fffff880`05fc6000 fffff880`05fe3000   usbccgp  usbccgp.sys  Mon Jul 13 17:06:45 2009 (4A5BCC15)
fffff880`14bf3000 fffff880`14bf4f00   USBD     USBD.SYS     Mon Jul 13 17:06:23 2009 (4A5BCBFF)
fffff880`13e00000 fffff880`13e11000   usbehci  usbehci.sys  Mon Jul 13 17:06:30 2009 (4A5BCC06)
fffff880`05218000 fffff880`05272000   usbhub   usbhub.sys   Mon Jul 13 17:07:09 2009 (4A5BCC2D)
fffff880`14bf5000 fffff880`14c00000   usbohci  usbohci.sys  Mon Jul 13 17:06:30 2009 (4A5BCC06)
fffff880`02c00000 fffff880`02c56000   USBPORT  USBPORT.SYS  Mon Jul 13 17:06:31 2009 (4A5BCC07)
fffff880`06ff2000 fffff880`06ffe000   usbprint usbprint.sys Mon Jul 13 17:38:18 2009 (4A5BD37A)
fffff880`05fab000 fffff880`05fc6000   USBSTOR  USBSTOR.SYS  Mon Jul 13 17:06:34 2009 (4A5BCC0A)
fffff880`01061000 fffff880`0106e000   vdrvroot vdrvroot.sys Mon Jul 13 17:01:31 2009 (4A5BCADB)
fffff880`00c2a000 fffff880`00c38000   vga      vga.sys      Mon Jul 13 16:38:47 2009 (4A5BC587)
fffff880`02c82000 fffff880`02ca7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 16:38:51 2009 (4A5BC58B)
fffff880`03fad000 fffff880`03ffa000   vmm      vmm.sys      Sun Feb 18 01:11:21 2007 (45D80A29)
fffff880`02c56000 fffff880`02c6b000   VMNetSrv VMNetSrv.sys Wed Jan 24 05:05:46 2007 (45B74B9A)
fffff880`017d4000 fffff880`017e4000   vmstorfl vmstorfl.sys Mon Jul 13 16:42:54 2009 (4A5BC67E)
fffff880`011e6000 fffff880`011fb000   volmgr   volmgr.sys   Mon Jul 13 16:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 16:20:33 2009 (4A5BC141)
fffff880`0155b000 fffff880`015a7000   volsnap  volsnap.sys  Mon Jul 13 16:20:08 2009 (4A5BC128)
fffff880`03f92000 fffff880`03fad000   wanarp   wanarp.sys   Mon Jul 13 17:10:21 2009 (4A5BCCED)
fffff880`02ca7000 fffff880`02cb7000   watchdog watchdog.sys Mon Jul 13 16:37:35 2009 (4A5BC53F)
fffff880`00eef000 fffff880`00f93000   Wdf01000 Wdf01000.sys Mon Jul 13 16:22:07 2009 (4A5BC19F)
fffff880`00f93000 fffff880`00fa2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 16:19:54 2009 (4A5BC11A)
fffff880`03f37000 fffff880`03f40000   wfplwf   wfplwf.sys   Mon Jul 13 17:09:26 2009 (4A5BCCB6)
fffff960`000f0000 fffff960`003ff000   win32k   win32k.sys   Sat May 01 08:06:30 2010 (4BDC4376)
fffff880`067c3000 fffff880`067cc000   WinFLdrv WinFLdrv.sys Wed Nov 18 06:05:58 2009 (4B03F136)
fffff880`04015000 fffff880`0401e000   wmiacpi  wmiacpi.sys  Mon Jul 13 16:31:02 2009 (4A5BC3B6)
fffff880`011ae000 fffff880`011b7000   WMILIB   WMILIB.SYS   Mon Jul 13 16:19:51 2009 (4A5BC117)
fffff880`05cb0000 fffff880`05cd1000   WudfPf   WudfPf.sys   Mon Jul 13 17:05:37 2009 (4A5BCBD1)
fffff880`06e00000 fffff880`06e31000   WUDFRd   WUDFRd.sys   Mon Jul 13 17:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`06e53000 fffff880`06ec4000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`015e9000 fffff880`015f7000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01200000 fffff880`0120c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`015f7000 fffff880`01600000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0120c000 fffff880`0121f000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
~Lordbob
My System SpecsSystem Spec
25 Jun 2010   #3
ttran

Microsoft Window 7 Professional 32 bit
 
 

I guess this BSODs was caused by your AVG antivirus software, as it is indicated in one minidump. I would recommend you to remove AVG just for testing purpose
AVG is known to cause BSOD, on some systems. I suggest that you uninstall it while trouble shooting using the uninstall tool > Info > Tool (32bit) - Tool (64 bit). If you have AVG Identity Protection installed, uninstall it also >Info > Tool. I recommend that you install MSE and make sure Windows Firewall is turned on.
Secondly, please run system file check
Start-->cmd (run as administrator)-->sfc /scannow (space between sfc and /)

One of the dump indicated Ntfs.sys, this is hard drive controller driver, I would run a check disk to make sure things are ok:
Disk Check

BUGcheck:
Code:
BugCheck 50, {fffff8200342da20, 0, fffff880012d2c50, 5}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+227 )

Followup: MachineOwner
---------
BugCheck 50, {fffff820039a25a0, 0, fffff80003387bc6, 5}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!RtlEqualUnicodeString+26 )

Followup: MachineOwner
---------
Update these drivers:
Code:
AODDriver AODDriver.sys Mon Oct 13 11:38:55 2008 (48F2D0DF)
~Tuan

opp...LB is faster than me...good job AVG LB
My System SpecsSystem Spec
.

25 Jun 2010   #4
Rothmclear

Windows 7 Professional 64 bit (6.1, Build 7600)
 
 

See I knew all I had to do was ask the masters. Thankyou LB and Tuan. AVG is gone and MSE is scanning. Driver updated and system scan running. I did a disk check on boot up last night. 2T takes a long time. I will start scanning other drives. Is the built in tool best or is there a program that some one suggests. Lets hope that kills the BSODS.

Any one have any suggestions for the SLOP(sudden loss of power) and then reboot?
My System SpecsSystem Spec
25 Jun 2010   #5
ttran

Microsoft Window 7 Professional 32 bit
 
 

You can try to update power manager drivers for your computer. I don't know if it is availble for your machine but check it out. Adapter can be problem too...I'm not a hardware guy
My System SpecsSystem Spec
27 Jun 2010   #6
Rothmclear

Windows 7 Professional 64 bit (6.1, Build 7600)
 
 

Hey guys just wanted to close this out. Problem turned out to be a couple drivers, lost allocated space on a couple harddrives and it appears GOM media player. Is there a known issue or should I look into it for additional info?

Oh and as I looked more into my system activities log I noticed that about a minute or two before the crashes the Application Experience service aka AeLookupSvc was started. I guess there was some kind of issues with this compatibility service. I disabled and haven't crashed a single time today.
My System SpecsSystem Spec
Reply

 BSOD and random shutdowns help!!!




Thread Tools




Similar help and support threads
Thread Forum
BSOD with random shutdowns
Hi all, First time poster, run into problems with my new PC. When confirming bluetooth settings on initial PC setup, the programme froze with the message 'Windows shell common Dll is not responding'. After using task manager to shut the app down, I attempted to shut the PC down to see if...
BSOD Help and Support
Random Shutdowns - No BSOD
Hi, Just brought a laptop from a friend and been having problems with it. It will randomly power off with no shut down sequence. I looked in event viewer and there is only one critical event which says "Event 41, Kernel-Power". Any help will be greatly appreciated. Thanks
General Discussion
BSOD random shutdowns
PC just shuts off with no apparent pattern. Please help - files attached
BSOD Help and Support
Random Shutdowns no BSOD?
I was having some BSOD issues but they seemed to have been resolved. I have gotten a few random freeze then auto reboots. When it reboots it says "loading intel boot (something)" but then says there is no bootable media. I hit power to shut the pc off then hit it to turn it on and it boots like...
BSOD Help and Support
BSOD and random shutdowns
First I want to say sorry for the long post I just want to make sure you have all the info you will need. I did a new build and am having some bad BSOD, random shutdowns, as well as hard time starting up. I have uploaded the System Health report as well as the Dump Files. What I...
BSOD Help and Support
random shutdowns most w/ no BSOD
I am getting an occasional shutdown (once a week or so)- the computer just turns off, no BSOD, usually no minidump. A critical error shows up in Event Viewer but it's after the reboot: "The system rebooted without cleanly shutting down first. This error could be caused if the system stopped...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 09:25.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App