Windows 7 BSOD on new Intel i5, P8P67 LE.

MarlonG

New Member
Joined
Apr 1, 2011
Hey!
I have an Intel i5-2300 on a Asus P8P67 LE mobo, Corsair Vengeance 2x2GB 1333mhz memory and nVidia GeForce 250 gts.

Build the computer myself along with an experienced friend about 5days ago, keep getting these annoying BSODs and have no idea why, tryed updating drivers, changing place on memory sticks etc.

Any help is greatly appreciated!

View attachment Minidump files.zip
 
Looks like a hardware issue:



040111-32307-01.dmp
BugCheck 7F, {0, 0, 0, 0}
Stack: avg, hal, nt
Probably caused by : avgtdix.sys

040111-33992-01.dmp
BugCheck A, {f, 2, 0, 82e209d4}
Stack: nt, usb, hal
Probably caused by : USBPORT.SYS

033111-31090-01.dmp
BugCheck 1000008E, {c0000005, 82c8a762, 9bf4744c, 0}
Probably caused by : hardware ( nt!MiProtectVirtualMemory+15 )

040211-23322-01.dmp
BugCheck D1, {ffff2302, 2, 0, 8b6a7afd}
Probably caused by : tcpip.sys



Possible (real) causers:

- incompattible, wrong set, or faulty RAM
- overclocked system
- bad motherboard or faulty CPU


Let's see if sorting the software turns out any helpful:


1. Replace AVG with MSE:
Link Removed due to 404 Error


2. Update NVIDIA:
nvlddmkm.sys Thu May 14 16:32:27 2009


3. Update Card Reader:
shbecr.sys Fri May 30 08:27:05 2008





CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040111-32307-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82a12000 PsLoadedModuleList = 0x82b5a810
Debug session time: Fri Apr  1 11:47:14.177 2011 (UTC - 4:00)
System Uptime: 0 days 1:08:59.410
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {0, 0, 0, 0}

*** WARNING: Unable to verify timestamp for avgtdix.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
Unable to load image \SystemRoot\system32\DRIVERS\avgfwd6x.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgfwd6x.sys
*** ERROR: Module load completed but symbols could not be loaded for avgfwd6x.sys
Probably caused by : avgtdix.sys ( avgtdix+4ec )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000000, EXCEPTION_DIVIDED_BY_ZERO
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 88424184 to 82a5629b

STACK_TEXT:  
a4bff864 88424184 badb0d00 0000a9d4 a4bff890 nt!KiTrap00+0x8b
WARNING: Frame IP not in any known module. Following frames may be wrong.
a4bff8d4 a4bff9d0 a4bff969 a4bff96a a4bffa7c 0x88424184
a4bff8f4 82e27ba9 00000000 87bf5302 a4bff94c 0xa4bff9d0
a4bff904 82e257ab 8b7154ec 80000000 8b7190b3 hal!KfLowerIrql+0x61
a4bff908 8b7154ec 80000000 8b7190b3 8809fb50 hal!KfReleaseSpinLock+0xb
a4bff950 8fc02e72 8809f840 00000000 a4bff968 avgtdix+0x4ec
a4bff954 8809f840 00000000 a4bff968 a4bffa9c avgfwd6x+0x2e72
a4bff958 00000000 a4bff968 a4bffa9c 00000000 0x8809f840


STACK_COMMAND:  kb

FOLLOWUP_IP: 
avgtdix+4ec
8b7154ec ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  avgtdix+4ec

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: avgtdix

IMAGE_NAME:  avgtdix.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cdd1f96

FAILURE_BUCKET_ID:  0x7f_0_avgtdix+4ec

BUCKET_ID:  0x7f_0_avgtdix+4ec

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040111-33992-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0c000 PsLoadedModuleList = 0x82b54810
Debug session time: Thu Mar 31 20:38:38.673 2011 (UTC - 4:00)
System Uptime: 0 days 0:21:16.906
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {f, 2, 0, 82e209d4}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iMapTransfer+21e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000f, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82e209d4, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82b74718
Unable to read MiSystemVaType memory at 82b54160
 0000000f 

CURRENT_IRQL:  2

FAULTING_IP: 
hal!HalBuildScatterGatherList+160
82e209d4 85f6            test    esi,esi

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  82b32b20 -- (.trap 0xffffffff82b32b20)
ErrCode = 00000000
eax=89886498 ebx=00000000 ecx=898864a8 edx=00000000 esi=00000000 edi=897b2370
eip=82e209d4 esp=82b32b94 ebp=82b32ba8 iopl=0         nv up ei ng nz ac po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010292
hal!HalBuildScatterGatherList+0x160:
82e209d4 85f6            test    esi,esi
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82e209d4 to 82a527eb

STACK_TEXT:  
82b32b20 82e209d4 badb0d00 00000000 82b2c466 nt!KiTrap0E+0x2cf
82b32ba8 82e20c16 89886490 87e8d028 897b2350 hal!HalBuildScatterGatherList+0x160
82b32bd8 8f32ae70 87bd4490 87e8d028 897b2350 hal!HalGetScatterGatherList+0x26
82b32c24 8f32a807 87e8d028 87e8d970 00000008 USBPORT!USBPORT_Core_iMapTransfer+0x21e
82b32c54 8f324d18 87e8d028 87e8d970 87e8d002 USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x1e3
82b32c78 82a743b5 87e8d97c 87e8d002 00000000 USBPORT!USBPORT_Xdpc_Worker+0x173
82b32cd4 82a74218 82b35d20 82b3f280 00000000 nt!KiExecuteAllDpcs+0xf9
82b32d20 82a74038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xd5
82b32d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38


STACK_COMMAND:  kb

FOLLOWUP_IP: 
USBPORT!USBPORT_Core_iMapTransfer+21e
8f32ae70 8945f4          mov     dword ptr [ebp-0Ch],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBPORT!USBPORT_Core_iMapTransfer+21e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc871

FAILURE_BUCKET_ID:  0xA_USBPORT!USBPORT_Core_iMapTransfer+21e

BUCKET_ID:  0xA_USBPORT!USBPORT_Core_iMapTransfer+21e

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\033111-31090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0b000 PsLoadedModuleList = 0x82b53810
Debug session time: Thu Mar 31 15:57:18.603 2011 (UTC - 4:00)
System Uptime: 0 days 0:46:16.836
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 82c8a762, 9bf4744c, 0}

Probably caused by : hardware ( nt!MiProtectVirtualMemory+15 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82c8a762, The address that the exception occurred at
Arg3: 9bf4744c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiProtectVirtualMemory+15
82c8a762 8b1d24010000    mov     ebx,dword ptr ds:[124h]

TRAP_FRAME:  9bf4744c -- (.trap 0xffffffff9bf4744c)
ErrCode = 00000000
eax=9bf47514 ebx=890f27c8 ecx=01b7c000 edx=ffffffff esi=9bf47628 edi=00000000
eip=82c8a762 esp=9bf474c0 ebp=37e8e981 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!MiProtectVirtualMemory+0x15:
82c8a762 8b1d24010000    mov     ebx,dword ptr ds:[124h] ds:0023:00000124=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  aaHMSvc.exe

CURRENT_IRQL:  0

MISALIGNED_IP: 
nt!MiProtectVirtualMemory+15
82c8a762 8b1d24010000    mov     ebx,dword ptr ds:[124h]

LAST_CONTROL_TRANSFER:  from 82c8ad6f to 82c8a762

STACK_TEXT:  
9bf474c0 82c8ad6f 890f27c8 9bf47514 9bf47518 nt!MiProtectVirtualMemory+0x15
9bf47534 82a4e42a ffffffff 9bf47634 9bf47628 nt!NtProtectVirtualMemory+0x12e
9bf47534 82a4ca71 ffffffff 9bf47634 9bf47628 nt!KiFastCallEntry+0x12a
9bf475c0 82c6ebfe ffffffff 9bf47634 9bf47628 nt!ZwProtectVirtualMemory+0x11
9bf47654 82c69f5c 00000000 00000000 00000000 nt!RtlCreateUserStack+0x1e4
9bf47704 82c818a1 890f27c8 8595825c 00000000 nt!PspAllocateThread+0x2c2
9bf478cc 82c43f5c 0187fc38 001fffff 00000000 nt!PspCreateThread+0x1b7
9bf47d00 82a4e42a 0187fc38 001fffff 00000000 nt!NtCreateThreadEx+0x20b
9bf47d00 776e64f4 0187fc38 001fffff 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0187fe54 00000000 00000000 00000000 00000000 0x776e64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiProtectVirtualMemory+15
82c8a762 8b1d24010000    mov     ebx,dword ptr ds:[124h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiProtectVirtualMemory+15

FOLLOWUP_NAME:  MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_NAME:  hardware

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID:  IP_MISALIGNED

Followup: MachineOwner
---------








Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040211-23322-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82a02000 PsLoadedModuleList = 0x82b4a810
Debug session time: Sat Apr  2 14:19:24.735 2011 (UTC - 4:00)
System Uptime: 0 days 2:25:58.062
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {ffff2302, 2, 0, 8b6a7afd}

Probably caused by : tcpip.sys ( tcpip!IppRouteSetTimeout+1b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff2302, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8b6a7afd, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82b6a718
Unable to read MiSystemVaType memory at 82b4a160
 ffff2302 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!IppRouteSetTimeout+1b
8b6a7afd 83780400        cmp     dword ptr [eax+4],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  82b28984 -- (.trap 0xffffffff82b28984)
ErrCode = 00000000
eax=ffff22fe ebx=82b28ac0 ecx=8b6aa22c edx=88b7f170 esi=8b6aa370 edi=8b6aa1ac
eip=8b6a7afd esp=82b289f8 ebp=82b28a14 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
tcpip!IppRouteSetTimeout+0x1b:
8b6a7afd 83780400        cmp     dword ptr [eax+4],0  ds:0023:ffff2302=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 8b6a7afd to 82a4881b

STACK_TEXT:  
82b28984 8b6a7afd badb0d00 88b7f170 82b6a8c8 nt!KiTrap0E+0x2cf
82b28a14 82b28a44 8b6aa1ac 82b28a34 8883312c tcpip!IppRouteSetTimeout+0x1b
82b28a18 8b6aa1ac 82b28a34 8883312c 00000000 nt!KiDoubleFaultStack+0x2a44
82b28a44 8b6aa7b2 00000000 0000446c 00000001 tcpip!TtFireTimerEx+0x71
82b28ad8 8b6aa497 88998968 8b7114ac 875c3350 tcpip!IppAddressSetTimeout+0x4f
82b28af4 8b6a9f11 875c3388 01b2d900 82b28b00 tcpip!Ipv4pInterfaceSetTimeout+0x52
82b28b20 8b6a99d2 8b70ed98 00000000 82b28b7c tcpip!IppCompartmentSetTimeout+0x8a
82b28b30 8b6a99a8 8b70ed98 82a6c16d 8b71fb00 tcpip!IppProtocolTimeout+0xf
82b28b38 82a6c16d 8b71fb00 00000000 7ed7d4e7 tcpip!IppTimeout+0x3c
82b28b7c 82a6c111 82b2bd20 82b28ca8 00000001 nt!KiProcessTimerDpcTable+0x50
82b28c68 82a6bfce 82b2bd20 82b28ca8 00000000 nt!KiProcessExpiredTimerList+0x101
82b28cdc 82a6a34e 00089102 895e5a68 82b35280 nt!KiTimerExpiration+0x25c
82b28d20 82a6a178 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82b28d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!IppRouteSetTimeout+1b
8b6a7afd 83780400        cmp     dword ptr [eax+4],0

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  tcpip!IppRouteSetTimeout+1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c15a3db

FAILURE_BUCKET_ID:  0xD1_tcpip!IppRouteSetTimeout+1b

BUCKET_ID:  0xD1_tcpip!IppRouteSetTimeout+1b

Followup: MachineOwner
---------





DRIVERS

Code:
start    end        module name
90d8d000 90db9000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8ae8d000 8aed5000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
9041e000 90478000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
90c00000 90c12000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b141000 8b14a000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
905d6000 905d7040   AsIO     AsIO.sys     Tue Aug 24 03:24:46 2010 (4C7373BE)
9298c000 929a6000   asmthub3 asmthub3.sys Wed Dec 08 05:12:46 2010 (4CFF5A1E)
8adb3000 8adfe000   asmtxhci asmtxhci.sys Wed Dec 08 05:12:30 2010 (4CFF5A0E)
905d4000 905d51a0   AsUpIO   AsUpIO.sys   Mon Aug 02 22:48:02 2010 (4C578362)
8b10b000 8b114000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b114000 8b137000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
8fbd2000 8fbe3000   avgfwd6x avgfwd6x.sys Sun Jul 11 21:37:25 2010 (4C3A71D5)
9a54b000 9a573000   AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:21 2010 (4C589715)
8b5b5000 8b5be000   AVGIDSEH AVGIDSEH.Sys Mon Sep 13 18:46:35 2010 (4C8EA9CB)
9a4f2000 9a4fc000   AVGIDSFilter AVGIDSFilter.Sys Tue Aug 03 18:23:18 2010 (4C5896D6)
8fb16000 8fb1f000   AVGIDSShim AVGIDSShim.Sys Tue Aug 03 18:25:56 2010 (4C589774)
8afb2000 8afedd00   avgldx86 avgldx86.sys Tue Dec 07 21:00:20 2010 (4CFEE6B4)
8fb4d000 8fb59000   avgmfx86 avgmfx86.sys Mon Sep 06 20:48:01 2010 (4C858BC1)
8b619000 8b61db80   avgrkx86 avgrkx86.sys Mon Sep 06 20:48:16 2010 (4C858BD0)
8b18f000 8b1d6980   avgtdix  avgtdix.sys  Fri Nov 12 06:05:58 2010 (4CDD1F96)
8fb60000 8fb67000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
905c6000 905d4000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8acbe000 8acc6000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
913d5000 913ee000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
988a0000 988be000   cdd      cdd.dll      unavailable (00000000)
929a6000 929bc000   cdfs     cdfs.sys     Mon Jul 13 19:11:14 2009 (4A5BBF12)
8fb2e000 8fb4d000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8ad08000 8adb3000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b590000 8b5b5000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8acc6000 8ad08000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8b381000 8b3de000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
90de7000 90df4000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
929e0000 929ed000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
9054a000 905ae000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
905ae000 905c6000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
9053e000 9054a000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b608000 8b619000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
92973000 9298c000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
929ed000 929fe000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
91257000 91358000   dump_iaStor dump_iaStor.sys Sat Nov 06 03:37:33 2010 (4CD505BD)
91382000 9138c000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
90c19000 90cd0000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 22:37:53 2010 (4CCF7981)
90cd0000 90d09000   dxgmms1  dxgmms1.sys  Wed Feb 02 22:34:49 2011 (4D4A2259)
8b17e000 8b18f000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b14a000 8b17e000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b3ec000 8b3f5000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
8b55e000 8b590000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
8b76e000 8b79f000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82e12000 82e49000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
90d6e000 90d8d000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
90d09000 90d13080   HECI     HECI.sys     Tue Oct 19 19:33:38 2010 (4CBE2AD2)
91358000 9136b000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
92622000 92628480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
92617000 92622000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
8fa18000 8fa9d000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b600000 8b608000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8b00a000 8b10b000   iaStor   iaStor.sys   Sat Nov 06 03:37:33 2010 (4CD505BD)
90dc3000 90dcc000   ICCWDT   ICCWDT.sys   Wed Aug 18 04:27:40 2010 (4C6B997C)
90dd5000 90de7000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8fa0b000 8fa18000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
9136b000 91377000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
80ba1000 80ba9000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8ac00000 8ac34000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
8b36e000 8b381000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8b50c000 8b531000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
913b2000 913c2000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
91397000 913b2000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8ac35000 8acad000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
9138c000 91397000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
8b200000 8b20d000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
91377000 91382000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8af9c000 8afb2000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
913ee000 91400000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
8fa9d000 8fac0000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
8fac0000 8fafb000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
8fafb000 8fb16000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8b137000 8b141000   msahci   msahci.sys   Mon Jul 13 19:45:50 2009 (4A5BC72E)
8fbb9000 8fbc4000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8aede000 8aee6000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b343000 8b36e000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
90534000 9053e000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b7ef000 8b7ff000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b417000 8b4ce000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
90df4000 90dff000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
91600000 91622000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
91246000 91257000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
9049e000 904ac000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8b5cb000 8b5fd000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
8b4ce000 8b50c000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8fbc4000 8fbd2000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
9052a000 90534000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a02000 82e12000   nt       ntkrpamp.exe Tue Oct 26 22:30:44 2010 (4CC78ED4)
8b214000 8b343000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
8fb59000 8fb60000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
91627000 91f8c940   nvlddmkm nvlddmkm.sys Thu May 14 16:32:27 2009 (4A0C7FDB)
9047f000 9049e000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8af1b000 8af2c000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
8aee6000 8af10000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8af87000 8af8e000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
8af8e000 8af9c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b3de000 8b3ec000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9a423000 9a4ba000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
92944000 92973000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
8acad000 8acbe000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
91fde000 91ff6000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
90400000 90418000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8b400000 8b417000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
8b1d7000 8b1ee000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
904e9000 9052a000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
91ff6000 92000000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
8fba1000 8fba9000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8fba9000 8fbb1000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8fbb1000 8fbb9000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8b531000 8b55e000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
913c2000 913d5000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
91f8d000 91fde000   Rt86win7 Rt86win7.sys Wed Dec 29 06:43:32 2010 (4D1B1EE4)
9262b000 92943a00   RTKVHDA  RTKVHDA.sys  Tue Nov 23 05:06:52 2010 (4CEB923C)
929d4000 929e0000   scfilter scfilter.sys Mon Jul 13 19:33:50 2009 (4A5BC45E)
9a4ba000 9a4c4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
90db9000 90dc3000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
904ac000 904c6000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
929bc000 929c6580   shbecr   shbecr.sys   Fri May 30 08:27:05 2008 (483FF299)
929c7000 929d2000   SMCLIB   SMCLIB.SYS   Mon Jul 13 19:45:28 2009 (4A5BC718)
8b7e7000 8b7ef000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
a502b000 a5095000   spsys    spsys.sys    Mon May 11 12:37:10 2009 (4A085436)
9a573000 9a5c4000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
9a4fc000 9a54b000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
9a4c4000 9a4e5000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
90c12000 90c13380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8b625000 8b76e000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
9a4e5000 9a4f2000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8fa00000 8fa0b000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8fbe3000 8fbfa000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
904d9000 904e9000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
98870000 98879000   TSDDD    TSDDD.dll    unavailable (00000000)
905d8000 905f9000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
8b1ee000 8b1fc000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
92600000 92617000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
929d2000 929d3700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
90d14000 90d23000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
91202000 91246000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
90d23000 90d6e000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
8af10000 8af1b000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8fb67000 8fb73000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8fb73000 8fb94000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8b79f000 8b7a7380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8af2c000 8af3c000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8af3c000 8af87000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8b7a8000 8b7e7000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
904c6000 904d9000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8fb94000 8fba1000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8ae0e000 8ae7f000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8ae7f000 8ae8d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
90478000 9047f000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
98610000 9885b000   win32k   win32k.sys   unavailable (00000000)
90dcc000 90dd5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:19:16 2009 (4A5BC0F4)
8aed5000 8aede000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)

Unloaded modules:
8fb16000 8fb2e000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
8b5be000 8b5cb000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8fa1c000 8fb1d000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00101000
8fb1d000 8fb2e000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
Okay thanks alot! Will dive right into the problem and try and solve it, i will post an update concearning the issue in a short amount of time.
 
Back
Top Bottom