BSOD when connecting to a wifi network

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Camila Pereira, Mar 7, 2011.

  1. Camila Pereira

    Camila Pereira New Member

    Joined:
    Mar 7, 2011
    Messages:
    6
    Likes Received:
    0
    OS: Windows 7 Home Premium x64 (original)
    Manufacturer: Dell
    Model: Inspiron 15r (N5010)
    RAM: 6GB
    CPU: Intel i5 M460 2.53 GHz
    RAM: 6GB
    Video card: Intel HD Graphics
    Sound card: IDT High Definition Audio
    HD: Intel 5 series 6 Port SATA AHCI Controller, 500 GB
    Motherboard: Dell Inspiron N5010 A12
    Ethernet: Realtek RTL8103T Ethernet Controller
    Wireless card: Mini WLAN half size DW1501 Wireless-N/Broadcom Virtual Wireless Adapter
    Antivirus: McAfee (before formatting), Avira Antivir (after formatting)
    Firewall: Zonealarm
    Hardware age: 2 months
    OEM: Yes, before formatting. After, I downloaded from the internet (I have my unique serial key)
    Age of reinstallation: 1 day

    Problem: BSOD only when connecting to a specific, unprotected wireless network in a matter of minutes (may vary between 1 minute to 15 minutes).

    What I have tried: Before formatting: tried some free registry correctors and restoring system. After formatting, I updated the BIOS, and reinstalled/updated the following drivers: chipset, video, sata, ethernet and wlan. Minidump files from 3 BSODs and 3 CPU-Z prints are attached.

    Safe mode with network: no BSOD (tested for 1 hour).

    Description: For 2 months since I got this laptop I had no problems using wired and wifi networks. But just when I brought my laptop to mom's place, where I will be living for 2 months, I'm getting
    BSOD everytime I try to connect to the wifi network here. The last 2 BSODs occurred 1 minute after I connected to the wifi network, but the others time varied.
    When my wifi adapter is on, but not connected to any network, everything works fine. I get no BSOD or any other errors.
    Before formatting, and after the firsts BSODs I've got a file called mfewfpk.sys corrupted, that seems to be related to McAfee antivirus. No viruses were detected by it and Malware Bytes Antimalware.
    As I couldn't find any solution, I formatted everything, but the problem still occurs.
    Other laptops and computers connected to the wifi network, each with different OS (like the one I'm using, which is WinXP Home Edition SP2), work fine.
    What should I do now?
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. Memory looks to be the problem,

    - Hyundai (2048) and Samsung (4096) rated 1333Mhz 9-9-9-24
    - currently set 1066Mhz 7-7-7-20


    2. Uninstall old Avira and old ZoneAlarm, replace with MSE:
    https://www.microsoft.com/security_essentials/


    3. Update drivers:

    Intel(R) Management Engine Interface
    HECIx64.sys Thu Sep 17 15:54:16 2009
    IntelĀ® Driver Update Utility

    Intel Matrix Storage Manager
    iaStor.sys Thu Dec 17 13:41:59 2009
    IntelĀ® Driver Update Utility

    Touchpad
    SynTP.sys Wed Dec 23 15:10:23 2009






    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030711-23946-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02a00000 PsLoadedModuleList = 0xfffff800`02c3de50
    Debug session time: Mon Mar  7 17:07:07.160 2011 (UTC - 5:00)
    System Uptime: 0 days 0:04:15.550
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80002a3a798}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80002a3a798
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002a71469 to fffff80002a71f00
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02a71469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02a6f932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff800`02a3a798 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`079accb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02a6f932 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030611-18798-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
    Debug session time: Sun Mar  6 17:42:53.080 2011 (UTC - 5:00)
    System Uptime: 0 days 0:34:43.859
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80002a95798}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80002a95798
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002acc469 to fffff80002accf00
    
    STACK_TEXT:  
    fffff800`041f4d28 fffff800`02acc469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`041f4d30 fffff800`02aca932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`041f4e70 fffff800`02a95798 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`03fcacb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02aca932 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030711-24445-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02a52000 PsLoadedModuleList = 0xfffff800`02c8fe50
    Debug session time: Sun Mar  6 17:54:52.775 2011 (UTC - 5:00)
    System Uptime: 0 days 0:10:54.180
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80002a8c798}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80002a8c798
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac3469 to fffff80002ac3f00
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02ac3469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02ac1932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff800`02a8c798 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`066b2cb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02ac1932 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00eed000 fffff880`00f44000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`04000000 fffff880`0408a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04434000 fffff880`0444a000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0127d000 fffff880`01288000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`0122f000 fffff880`01238000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01238000 fffff880`01262000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`05798000 fffff880`057b3000   avgntflt avgntflt.sys Tue Mar 24 10:00:46 2009 (49C8E78E)
    fffff880`00fb5000 fffff880`00fc1000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`0571e000 fffff880`05727000   BCM42RLY BCM42RLY.sys Thu Jan 21 22:28:23 2010 (4B591B57)
    fffff880`04a62000 fffff880`04a6b000   bcmvwl64 bcmvwl64.sys Thu Jan 21 22:28:30 2010 (4B591B5E)
    fffff880`0444e000 fffff880`0473d000   bcmwl664 bcmwl664.sys Thu Jan 21 22:30:58 2010 (4B591BF2)
    fffff880`042ef000 fffff880`042f6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02f17000 fffff880`02f28000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`026c8000 fffff880`026e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00720000 fffff960`00747000   cdd      cdd.dll      unavailable (00000000)
    fffff880`042bc000 fffff880`042e6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d17000 fffff880`00dd7000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01a00000 fffff880`01a30000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cb9000 fffff880`00d17000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04409000 fffff880`0440d500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01346000 fffff880`013b9000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fac000 fffff880`00fb5000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`04424000 fffff880`04434000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`057b3000 fffff880`057c1000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02ef9000 fffff880`02f17000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02eea000 fffff880`02ef9000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01bd1000 fffff880`01be7000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05800000 fffff880`05822000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`057c1000 fffff880`057d4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04099000 fffff880`042a1000   dump_iaStor dump_iaStor.sys Thu Dec 17 13:41:59 2009 (4B2A7B77)
    fffff880`055e8000 fffff880`055f4000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0548c000 fffff880`05580000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
    fffff880`05580000 fffff880`055c6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`02f9b000 fffff880`02fd1000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`012d4000 fffff880`012e8000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01288000 fffff880`012d4000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`015e7000 fffff880`015f1000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01b97000 fffff880`01bd1000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`01794000 fffff880`017de000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02a09000 fffff800`02a52000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`02f28000 fffff880`02f4c000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`055c6000 fffff880`055d7000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`01400000 fffff880`01419000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`059f7000 fffff880`059ff080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`01600000 fffff880`0160e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02600000 fffff880`026c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01b8e000 fffff880`01b97000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0479b000 fffff880`047b9000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01027000 fffff880`0122f000   iaStor   iaStor.sys   Thu Dec 17 13:41:59 2009 (4B2A7B77)
    fffff880`04a6d000 fffff880`0548bb60   igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
    fffff880`047d9000 fffff880`047ffd00   Impcd    Impcd.sys    Fri Feb 26 18:32:11 2010 (4B8859FB)
    fffff880`05828000 fffff880`0586f000   IntcDAud IntcDAud.sys Wed Feb 03 08:38:31 2010 (4B697C57)
    fffff880`0440e000 fffff880`04424000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`02774000 fffff880`0277f000   ISWKL    ISWKL.sys    Wed Oct 14 09:12:56 2009 (4AD5CE58)
    fffff880`047ca000 fffff880`047d9000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`015f1000 fffff880`015ff000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bb9000 fffff800`00bc3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`05877000 fffff880`058ba000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`015bc000 fffff880`015d6000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01769000 fffff880`01794000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`05822000 fffff880`05827200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0474a000 fffff880`0475f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`00dd7000 fffff880`00dfa000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c61000 fffff880`00ca5000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`01a30000 fffff880`01a3e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`047bb000 fffff880`047ca000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`01000000 fffff880`0100d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fd6000 fffff880`00ff0000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0277f000 fffff880`02797000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02797000 fffff880`027c3000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
    fffff880`03c48000 fffff880`03c95000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
    fffff880`03c95000 fffff880`03cb8000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
    fffff880`01262000 fffff880`0126d000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2)
    fffff880`04354000 fffff880`0435f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f4d000 fffff880`00f57000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`012e8000 fffff880`01346000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02edf000 fffff880`02eea000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01b7c000 fffff880`01b8e000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01617000 fffff880`01709000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04a56000 fffff880`04a62000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02742000 fffff880`02755000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`02e00000 fffff880`02e2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05926000 fffff880`0593b000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`0408a000 fffff880`04099000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`0439b000 fffff880`043e0000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01709000 fffff880`01769000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0435f000 fffff880`04370000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02ed3000 fffff880`02edf000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a52000 fffff800`0302f000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`01419000 fffff880`015bc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`042e6000 fffff880`042ef000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`026ef000 fffff880`02742000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`013b9000 fffff880`013df000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f97000 fffff880`00fac000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f57000 fffff880`00f8a000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0126d000 fffff880`0127d000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015d6000 fffff880`015e7000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`03cb8000 fffff880`03d5e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`059ba000 fffff880`059f7000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00ca5000 fffff880`00cb9000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02fd1000 fffff880`02ff5000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02e2f000 fffff880`02e4a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`02e4a000 fffff880`02e6b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`017de000 fffff880`017f8000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02e82000 fffff880`02ed3000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`04339000 fffff880`04342000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04342000 fffff880`0434b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0434b000 fffff880`04354000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01b42000 fffff880`01b7c000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02755000 fffff880`0276d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03d5e000 fffff880`03d69000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01b3a000 fffff880`01b42000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05727000 fffff880`05798000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`05686000 fffff880`0571e000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
    fffff880`0561d000 fffff880`05686000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`03d69000 fffff880`03d96000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
    fffff880`0593b000 fffff880`059ba000   stwrt64  stwrt64.sys  Wed Apr 07 05:41:19 2010 (4BBC533F)
    fffff880`0444a000 fffff880`0444b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`02f4c000 fffff880`02f9b000   SynTP    SynTP.sys    Wed Dec 23 15:10:23 2009 (4B32792F)
    fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`03d96000 fffff880`03da8000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0438e000 fffff880`0439b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`04370000 fffff880`0438e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`01be7000 fffff880`01bfb000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`0276d000 fffff880`02774000   TurboB   TurboB.sys   Mon Nov 02 15:47:34 2009 (4AEF4566)
    fffff880`058ba000 fffff880`058cc000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`013df000 fffff880`013fc000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`047b9000 fffff880`047baf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`055d7000 fffff880`055e8000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
    fffff880`058cc000 fffff880`05926000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF)
    fffff880`04a00000 fffff880`04a56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00e00000 fffff880`00e2d100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
    fffff880`00f8a000 fffff880`00f97000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`042f6000 fffff880`04304000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`04304000 fffff880`04329000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fc1000 fffff880`00fd6000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01aee000 fffff880`01b3a000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`01a3e000 fffff880`01acf000   vsdatant vsdatant.sys Sun Nov 22 18:37:44 2009 (4B09CB48)
    fffff880`0473d000 fffff880`0474a000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`043e9000 fffff880`043ff000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`01acf000 fffff880`01aea000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`04329000 fffff880`04339000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e3a000 fffff880`00ede000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ede000 fffff880`00eed000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`043e0000 fffff880`043e9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00000000 fffff960`0030f000   win32k   win32k.sys   unavailable (00000000)
    fffff880`04400000 fffff880`04409000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f44000 fffff880`00f4d000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    
    Unloaded modules:
    fffff880`02e6b000 fffff880`02e79000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`04099000 fffff880`042a1000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00208000
    fffff880`042a1000 fffff880`042b4000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`0474a000 fffff880`0479b000   Rt64win7.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00051000
    fffff880`01a30000 fffff880`01a3e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`040a1000 fffff880`042a9000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00208000
    fffff880`042a9000 fffff880`042bc000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. Camila Pereira

    Camila Pereira New Member

    Joined:
    Mar 7, 2011
    Messages:
    6
    Likes Received:
    0
    Thank you for your assistance. It was ZoneAlarm's fault. I uninstalled it and since then, I've got no BSODs (couple hours ago). Nevertheless, I installed SP1 and changed my firewall to Comodo. The antivirus is still Avira, but I intend to change back to McAfee, as I acquired an year license.
    Thank you very much for your attention!!!
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    You are welcome.

    Feel free to use any antivirus that you like, but do not mix different brands in one system.
    If you get more crashes, adjust your memory settings according to its rated specs.
     

Share This Page

Loading...