BSOD Win Acer Laptop Model aspire 7745g

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by matrixgeek, Oct 5, 2010.

  1. matrixgeek

    matrixgeek New Member

    Joined:
    Oct 5, 2010
    Messages:
    2
    Likes Received:
    0
    I have an Acer Aspire 7745g Core i7 8gb ram, that Started Giving me a BSOD shortly after I received it. I updated the bios and drivers but to no avail. I am attaching my minidump files in a zipped archive. I contacted Acer they suggested I reformat but would like to see if there is another option since most BSOD's seem to be hardware related. Any Help would be greatly appreciated.
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321


    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    X64_0x7f_8_nt!KiDoubleFault



    Get updates for your notebook Acer.com Worldwide - Select your local country or region


    Code:
    fffff880`021e7de8 fffff800`01ccaca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`021e7df0 fffff800`01cc9172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`021e7f30 fffff800`01c93ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0abb4a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    Update these drivers:

    Acer.com Worldwide - Select your local country or region

    PxHlpa64.sys Tue Dec 11 01:49:01 2007
    Sonic CD/DVD driver (used by many different CD/DVD programs)
    pxHelp20.sys programs

    speedfan.sys Sun Sep 24 16:26:48 2006
    Speedfan
    SpeedFan - Access temperature sensor in your computer

    adfs.SYS Thu Jun 26 23:52:37 2008
    Adobe

    iaStor.sys Thu Dec 17 20:41:59 2009
    Intel Storage
    HECIx64.sys Thu Sep 17 22:54:16 2009
    Intel(R) Management Engine
    http://downloadcenter.intel.com/Default.aspx

    mwlPSDFilter.sys Tue Jun 02 13:07:30 2009
    mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 13:15:29 2009
    mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 13:07:39 2009
    My Winlocker by EgisTec PrivateSafe
    EgisTec Inc. - Data Security & Fingerprint Biometrics Solutions

    UBHelper.sys Mon Apr 27 11:48:19 2009
    NTI CD & DVD-Maker or NTI Backup NOW! or NTI CD-Maker by NewTech Infosystems (usually in Acer Empowering Technology)
    NTI - Support - OEM Resources - DVD Burning Software, Data Backup Software, CD Burning, Blu-ray Burning Software - Official Site

    NTIDrvr.sys Wed Mar 25 05:09:39 2009
    NTI CD-ROM Filter Driver by NewTech Infosystems (likely a part of Acer Empowering Technology)
    NTI - Support - OEM Resources - DVD Burning Software, Data Backup Software, CD Burning, Blu-ray Burning Software - Official Site

    000.fcl Fri Sep 26 16:11:22 2008
    Video editing software, Multimedia Software and Blu-ray playback software by CyberLink

    TurboB.sys Mon Nov 02 22:47:34 2009
    Some utility I guess, not sure

    GEARAspiWDM.sys Mon May 18 15:17:04 2009
    iTunes and the like, CD-ROM Class Filter Driver by Gear Software
    GEAR Software - DVD Mastering Software & CD Burning Software & GEAR PRO Mastering




    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\100310-26005-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`01c64000 PsLoadedModuleList = 0xfffff800`01ea1e50
    System Uptime: 1 days 13:36:16.557
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80001c9cec0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80001c9cec0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80001cd3ca9 to fffff80001cd4740
    
    STACK_TEXT:  
    fffff880`02145de8 fffff800`01cd3ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02145df0 fffff800`01cd2172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02145f30 fffff800`01c9cec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`02369a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`01cd2172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\100310-17472-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`01c5b000 PsLoadedModuleList = 0xfffff800`01e98e50
    System Uptime: 0 days 2:18:08.329
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80001c93ec0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80001c93ec0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80001ccaca9 to fffff80001ccb740
    
    STACK_TEXT:  
    fffff880`021e7de8 fffff800`01ccaca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`021e7df0 fffff800`01cc9172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`021e7f30 fffff800`01c93ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0abb4a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`01cc9172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\100310-17799-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`01c16000 PsLoadedModuleList = 0xfffff800`01e53e50
    System Uptime: 0 days 2:11:36.297
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80001c4eec0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80001c4eec0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80001c85ca9 to fffff80001c86740
    
    STACK_TEXT:  
    fffff880`021b6de8 fffff800`01c85ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`021b6df0 fffff800`01c84172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`021b6f30 fffff800`01c4eec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`02370a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`01c84172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\100310-18626-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`01c1b000 PsLoadedModuleList = 0xfffff800`01e58e50
    System Uptime: 0 days 0:28:38.646
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80001c53ec0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80001c53ec0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80001c8aca9 to fffff80001c8b740
    
    STACK_TEXT:  
    fffff880`02145de8 fffff800`01c8aca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02145df0 fffff800`01c89172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02145f30 fffff800`01c53ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0235ba30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`01c89172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    fffff800`01a3c000 fffff800`01a46000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
    fffff800`01c1b000 fffff800`021f7000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
    fffff800`021f7000 fffff800`02240000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
    fffff880`00c62000 fffff880`00ca6000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
    fffff880`00ca6000 fffff880`00cba000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
    fffff880`00cba000 fffff880`00d18000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00d18000 fffff880`00dd8000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
    fffff880`00dd8000 fffff880`00df2000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
    fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00e1a000 fffff880`00e3b000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
    fffff880`00e4b000 fffff880`00eef000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
    fffff880`00eef000 fffff880`00efe000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00efe000 fffff880`00f55000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
    fffff880`00f55000 fffff880`00f5e000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00f5e000 fffff880`00f68000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
    fffff880`00f68000 fffff880`00f9b000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00f9b000 fffff880`00fa8000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
    fffff880`00fa8000 fffff880`00fbd000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`00fbd000 fffff880`00fc6000   compbatt compbatt.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
    fffff880`00fc6000 fffff880`00fd2000   BATTC    BATTC.SYS    Tue Jul 14 02:31:01 2009 (4A5BC3B5)
    fffff880`00fd2000 fffff880`00fe7000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
    fffff880`0104c000 fffff880`01067000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
    fffff880`01078000 fffff880`01280000   iaStor   iaStor.sys   Thu Dec 17 20:41:59 2009 (4B2A7B77)
    fffff880`01280000 fffff880`01289000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`01289000 fffff880`012b3000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
    fffff880`012b3000 fffff880`012be000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
    fffff880`012be000 fffff880`0130a000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
    fffff880`0130a000 fffff880`0131e000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
    fffff880`0131e000 fffff880`01329ae0   PxHlpa64 PxHlpa64.sys Tue Dec 11 01:49:01 2007 (475DD06D)
    fffff880`0132a000 fffff880`01388000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
    fffff880`01388000 fffff880`013fb000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
    fffff880`01400000 fffff880`01414000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
    fffff880`01419000 fffff880`015bc000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
    fffff880`015bc000 fffff880`015d6000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
    fffff880`015d6000 fffff880`015e7000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
    fffff880`015e7000 fffff880`015f1000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
    fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
    fffff880`0164a000 fffff880`01652000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
    fffff880`01652000 fffff880`01659000   speedfan speedfan.sys Sun Sep 24 16:26:48 2006 (45168798)
    fffff880`01659000 fffff880`01674000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
    fffff880`01677000 fffff880`01769000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`01769000 fffff880`017c9000   NETIO    NETIO.SYS    Fri Apr 09 05:43:59 2010 (4BBE946F)
    fffff880`017c9000 fffff880`017f4000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
    fffff880`01a00000 fffff880`01a16000   vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
    fffff880`01a16000 fffff880`01a52000   SAFsFilter SAFsFilter.sys Fri Sep 10 04:30:37 2010 (4C898A3D)
    fffff880`01a61000 fffff880`01a9b000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
    fffff880`01a9b000 fffff880`01aad000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
    fffff880`01aad000 fffff880`01ab6000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
    fffff880`01ab6000 fffff880`01af0000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
    fffff880`01af0000 fffff880`01b06000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`01b06000 fffff880`01b36000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`01b44000 fffff880`01bd9000   vsdatant vsdatant.sys Sun May 09 19:28:58 2010 (4BE6E2CA)
    fffff880`01bd9000 fffff880`01bff000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
    fffff880`02e00000 fffff880`03008000   dump_iaStor dump_iaStor.sys Thu Dec 17 20:41:59 2009 (4B2A7B77)
    fffff880`0301f000 fffff880`03049000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`03049000 fffff880`03052000   mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 13:07:30 2009 (4A24F9E2)
    fffff880`03052000 fffff880`0305b000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
    fffff880`0305b000 fffff880`03062000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
    fffff880`03062000 fffff880`03070000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
    fffff880`03070000 fffff880`03095000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
    fffff880`03095000 fffff880`030a5000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
    fffff880`030a5000 fffff880`030ae000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`030ae000 fffff880`030b7000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`030b7000 fffff880`030c0000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
    fffff880`030c0000 fffff880`030cb000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`030cb000 fffff880`030dc000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`030dc000 fffff880`030fa000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
    fffff880`030fa000 fffff880`03107000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
    fffff880`03107000 fffff880`0314c000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
    fffff880`0314c000 fffff880`0315c000   IpmSecurityAgent1 IpmSecurityAgent1.sys Fri Sep 10 04:30:22 2010 (4C898A2E)
    fffff880`0315c000 fffff880`031e6000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`031e6000 fffff880`031ef000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`031ef000 fffff880`031fe000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`03200000 fffff880`03224000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`03224000 fffff880`03253000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`03263000 fffff880`032b4000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
    fffff880`032b4000 fffff880`032c0000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
    fffff880`032c0000 fffff880`032d3000   mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 13:15:29 2009 (4A24FBC1)
    fffff880`032d3000 fffff880`032db000   mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 13:07:39 2009 (4A24F9EB)
    fffff880`032db000 fffff880`032e6000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
    fffff880`032e6000 fffff880`032f5000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
    fffff880`032f5000 fffff880`03313000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
    fffff880`03313000 fffff880`03324000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
    fffff880`03324000 fffff880`0334a000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
    fffff880`0334a000 fffff880`0334e500   CmBatt   CmBatt.sys   Tue Jul 14 02:31:03 2009 (4A5BC3B7)
    fffff880`0334f000 fffff880`03358000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
    fffff880`03358000 fffff880`0338c000   atikmpag atikmpag.sys Wed Mar 03 05:07:33 2010 (4B8DD275)
    fffff880`0338c000 fffff880`033e2000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
    fffff880`033e2000 fffff880`033f7000   L1C62x64 L1C62x64.sys Mon Jan 18 08:59:15 2010 (4B5406C3)
    fffff880`03600000 fffff880`03624000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
    fffff880`03624000 fffff880`03635000   HECIx64  HECIx64.sys  Thu Sep 17 22:54:16 2009 (4AB293E8)
    fffff880`03635000 fffff880`03646000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`0364f000 fffff880`03cbe000   atipmdag atipmdag.sys Wed Mar 03 05:47:08 2010 (4B8DDBBC)
    fffff880`03cbe000 fffff880`03db2000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
    fffff880`03db2000 fffff880`03df8000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
    fffff880`0424c000 fffff880`0428f000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
    fffff880`0428f000 fffff880`042a1000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
    fffff880`042a1000 fffff880`042fb000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
    fffff880`042fb000 fffff880`04310000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
    fffff880`04310000 fffff880`04332000   AtiHdmi  AtiHdmi.sys  Fri Jan 29 03:03:36 2010 (4B6233E8)
    fffff880`04332000 fffff880`0436f000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
    fffff880`0436f000 fffff880`04391000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
    fffff880`04391000 fffff880`04396200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
    fffff880`04400000 fffff880`0444d000   SynTP    SynTP.sys    Fri Sep 18 05:30:41 2009 (4AB2F0D1)
    fffff880`0444d000 fffff880`0444ef00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
    fffff880`0444f000 fffff880`0445e000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`0445e000 fffff880`0446d000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`0446d000 fffff880`04475000   UBHelper UBHelper.sys Mon Apr 27 11:48:19 2009 (49F57153)
    fffff880`04475000 fffff880`0447d000   NTIDrvr  NTIDrvr.sys  Wed Mar 25 05:09:39 2009 (49C9A073)
    fffff880`0447d000 fffff880`0448a000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
    fffff880`0448a000 fffff880`044a0000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    fffff880`044a0000 fffff880`044b0000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`044b4000 fffff880`047a3000   bcmwl664 bcmwl664.sys Tue Mar 23 05:08:39 2010 (4BA830B7)
    fffff880`047a3000 fffff880`047b0000   vwifibus vwifibus.sys Tue Jul 14 03:07:21 2009 (4A5BCC39)
    fffff880`047b0000 fffff880`047ce000   i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`047ce000 fffff880`047e4000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
    fffff880`047e4000 fffff880`047f0000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
    fffff880`047f0000 fffff880`047f1480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
    fffff880`04a00000 fffff880`04a53000   nwifi    nwifi.sys    Tue Jul 14 03:07:23 2009 (4A5BCC3B)
    fffff880`04a53000 fffff880`04a66000   ndisuio  ndisuio.sys  Tue Jul 14 03:09:25 2009 (4A5BCCB5)
    fffff880`04a66000 fffff880`04a7e000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`04a7e000 fffff880`04a85000   TurboB   TurboB.sys   Mon Nov 02 22:47:34 2009 (4AEF4566)
    fffff880`04a85000 fffff880`04a91000   ISWKL    ISWKL.sys    Thu Sep 02 13:48:35 2010 (4C7F8103)
    fffff880`04a9e000 fffff880`04cc6f80   RTKVHD64 RTKVHD64.sys Mon Feb 22 11:26:08 2010 (4B824DB0)
    fffff880`04cc7000 fffff880`04ce4000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
    fffff880`04ce4000 fffff880`04d11200   usbvideo usbvideo.sys Thu Mar 04 06:40:57 2010 (4B8F39D9)
    fffff880`04d12000 fffff880`04d2f000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
    fffff880`04d2f000 fffff880`04d3d000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
    fffff880`04d3d000 fffff880`04d50000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    fffff880`04d50000 fffff880`04d5c000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
    fffff880`04d5c000 fffff880`04d6a000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
    fffff880`04d6a000 fffff880`04d8d000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
    fffff880`04d8d000 fffff880`04dae000   WudfPf   WudfPf.sys   Tue Jul 14 03:05:37 2009 (4A5BCBD1)
    fffff880`04dae000 fffff880`04dc3000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`06c00000 fffff880`06c4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
    fffff880`06c4e000 fffff880`06c71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
    fffff880`06c71000 fffff880`06c89000   adfs     adfs.SYS     Thu Jun 26 23:52:37 2008 (48640195)
    fffff880`06c97000 fffff880`06d5f000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
    fffff880`06d5f000 fffff880`06d7d000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
    fffff880`06d7d000 fffff880`06d95000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
    fffff880`06d95000 fffff880`06dc2000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
    fffff880`07217000 fffff880`072bd000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
    fffff880`072bd000 fffff880`072c8000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
    fffff880`072c8000 fffff880`072f5000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
    fffff880`072f5000 fffff880`07307000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
    fffff880`07307000 fffff880`07332000   000      000.fcl      Fri Sep 26 16:11:22 2008 (48DCDF7A)
    fffff880`07332000 fffff880`0739a000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
    fffff880`0764a000 fffff880`076e0000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
    fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   unavailable (00000000)
    fffff960`00430000 fffff960`0043a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff960`007c0000 fffff960`007e7000   cdd      cdd.dll      unavailable (00000000)
    fffff960`00870000 fffff960`008d1000   ATMFD    ATMFD.DLL    unavailable (00000000)
    
    Unloaded modules:
    fffff880`076e0000 fffff880`07751000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01b36000 fffff880`01b44000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`02e04000 fffff880`0300c000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0300c000 fffff880`0301f000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    
    
     
  3. TorrentG

    TorrentG Banned

    Joined:
    May 31, 2010
    Messages:
    7,814
    Likes Received:
    372
    Yep, good post Cybercore, as usual. :)

    Speedfan is alright to keep as it's latest and stable.

    Delete the adfs.sys from C:\Windows\System32\drivers and reboot.
     

Share This Page

Loading...