BSODs everyday and random shutdowns

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Cigaweedz, Mar 21, 2011.

  1. Cigaweedz

    Cigaweedz New Member

    Joined:
    Mar 20, 2011
    Messages:
    4
    Likes Received:
    0
    Thank you for taking the time to read my thread.

    My problem started after I installed Windows 7 Ultimate x64. I'm constantly getting BSODs everyday. I've gotten more BSODs in the last week than I have in a life of owning a PC. I'm getting random shutdowns as well.

    My Specs:

    Core Duo E6600 2.4GHz, Socket 775
    4x 1gb DDR2 kingston 333MHz
    Nvidia GTS-250
    Coolmaster rs-550 PSU
    5 SATA HDDs

    Everything is stock. No over-clocking. I've included everything I think is needs to diagnose the situation as I am unable to find out what the problem is, and it's feels like I'm finding a needle in a haystack. Thanks in advance.

    CPU-Z.

    View attachment Seven Forums.rar
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    0x7f_8_nvlddmkm
    0x7f_8_nt!KiDoubleFaultAbort
    0xD1_CODE_AV_BAD_IP_ataport!IdeProcessPortNotification
    0x7f_8_nvlddmkm




    Update drivers:


    ASUS ATK0110 ACPI Utility
    ASACPI.sys Sun Mar 27 22:30:36 2005

    Silicon Image SiI 3112 SATARaid Controller driver
    SiWinAcc.sys Thu Jun 14 20:02:02 2007
    SI3112r.sys Thu Aug 16 22:04:38 2007


    Western Digital SCSI
    wdcsam64.sys Wed Apr 16 04:39:08 2008








    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032011-26520-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c59e90
    Debug session time: Sun Mar 20 01:22:14.511 2011 (UTC - 4:00)
    System Uptime: 0 days 16:52:32.212
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff8800f46c4d1}
    
    Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : nvlddmkm.sys ( nvlddmkm+1c34d1 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff8800f46c4d1
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'nvlddmkm' and 'nvlddmkm.sys' overlap
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  5
    
    LAST_CONTROL_TRANSFER:  from fffff80002a93be9 to fffff80002a94640
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02a93be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02a920b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff880`0f46c4d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`05f53fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x1c34d1
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nvlddmkm+1c34d1
    fffff880`0f46c4d1 ff5378          call    qword ptr [rbx+78h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nvlddmkm+1c34d1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nvlddmkm
    
    IMAGE_NAME:  nvlddmkm.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d64bb6c
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nvlddmkm+1c34d1
    
    BUCKET_ID:  X64_0x7f_8_nvlddmkm+1c34d1
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032011-28282-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c54e90
    Debug session time: Sun Mar 20 06:57:09.140 2011 (UTC - 4:00)
    System Uptime: 0 days 5:33:47.841
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {b, 2, 8, b}
    
    Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for sptd.sys
    *** ERROR: Module load completed but symbols could not be loaded for sptd.sys
    Probably caused by : ataport.SYS ( ataport!IdeProcessPortNotification+30d )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 000000000000000b, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
    Arg4: 000000000000000b, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e8
     000000000000000b 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    +3238656131643539
    00000000`0000000b ??              ???
    
    PROCESS_NAME:  System
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    TRAP_FRAME:  fffff80000b9cbf0 -- (.trap 0xfffff80000b9cbf0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
    rdx=0000000000187000 rsi=0000000000000000 rdi=0000000000000000
    rip=000000000000000b rsp=fffff80000b9cd80 rbp=fffff80000b97000
     r8=fffffa80048f20c8  r9=0000000000000000 r10=fffffffffffffffe
    r11=fffff80002c01e00 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    00000000`0000000b ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a8ebe9 to fffff80002a8f640
    
    FAILED_INSTRUCTION_ADDRESS: 
    +3238656131643539
    00000000`0000000b ??              ???
    
    STACK_TEXT:  
    fffff800`00b9caa8 fffff800`02a8ebe9 : 00000000`0000000a 00000000`0000000b 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
    fffff800`00b9cab0 fffff800`02a8d860 : fffffa80`063833e8 fffffa80`061a11a0 fffffa80`061a11a0 fffff800`02c01e80 : nt!KiBugCheckDispatch+0x69
    fffff800`00b9cbf0 00000000`0000000b : fffff800`02c01e80 00000000`00000001 00000000`00000002 00000000`00000201 : nt!KiPageFault+0x260
    fffff800`00b9cd80 fffff800`02c01e80 : 00000000`00000001 00000000`00000002 00000000`00000201 fffff800`00b9ce30 : 0xb
    fffff800`00b9cd88 00000000`00000001 : 00000000`00000002 00000000`00000201 fffff800`00b9ce30 00000000`00000001 : nt!KiInitialPCR+0x180
    fffff800`00b9cd90 00000000`00000002 : 00000000`00000201 fffff800`00b9ce30 00000000`00000001 fffffa80`048601a0 : 0x1
    fffff800`00b9cd98 00000000`00000201 : fffff800`00b9ce30 00000000`00000001 fffffa80`048601a0 fffff800`00b97000 : 0x2
    fffff800`00b9cda0 fffff800`00b9ce30 : 00000000`00000001 fffffa80`048601a0 fffff800`00b97000 fffff800`00b9cd40 : 0x201
    fffff800`00b9cda8 00000000`00000001 : fffffa80`048601a0 fffff800`00b97000 fffff800`00b9cd40 fffff880`00e32731 : 0xfffff800`00b9ce30
    fffff800`00b9cdb0 fffffa80`048601a0 : fffff800`00b97000 fffff800`00b9cd40 fffff880`00e32731 fffff800`00b97000 : 0x1
    fffff800`00b9cdb8 fffff800`00b97000 : fffff800`00b9cd40 fffff880`00e32731 fffff800`00b97000 00000000`00000000 : 0xfffffa80`048601a0
    fffff800`00b9cdc0 fffff800`00b9cd40 : fffff880`00e32731 fffff800`00b97000 00000000`00000000 00000000`00000000 : 0xfffff800`00b97000
    fffff800`00b9cdc8 fffff880`00e32731 : fffff800`00b97000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff800`00b9cd40
    fffff800`00b9cdd0 fffff880`00e290c5 : 00000000`00000000 fffffa80`04861601 fffffa80`048616a8 00000000`00000000 : ataport!IdeProcessPortNotification+0x30d
    fffff800`00b9ce10 fffff880`00e1cb7b : 00000000`0000e400 fffff880`01072742 00000000`00000002 fffff880`00e1b604 : ataport!AtaPortCompleteRequest+0x21
    fffff800`00b9ce80 fffff880`00e1ca10 : fffffa80`048b1801 fffffa80`048616a8 fffffa80`0554c758 fffffa80`04861650 : atapi!AtapiCompleteRequest+0x147
    fffff800`00b9cec0 fffff880`00e1b83a : fffffa80`048b1850 fffffa80`048b1804 fffffa80`048a5000 fffffa80`0554c758 : atapi!AtapiProcessInterrupt+0x2ac
    fffff800`00b9cf20 fffff880`0108c7c8 : 00000000`00000050 fffffa80`048b1810 fffffa80`048a5000 fffffa80`048616a8 : atapi!AtapiHwInterrupt+0x156
    fffff800`00b9cf80 00000000`00000050 : fffffa80`048b1810 fffffa80`048a5000 fffffa80`048616a8 00000000`00000000 : sptd+0x457c8
    fffff800`00b9cf88 fffffa80`048b1810 : fffffa80`048a5000 fffffa80`048616a8 00000000`00000000 00000000`00000000 : 0x50
    fffff800`00b9cf90 fffffa80`048a5000 : fffffa80`048616a8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`048b1810
    fffff800`00b9cf98 fffffa80`048616a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`048a5000
    fffff800`00b9cfa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`082f2080 : 0xfffffa80`048616a8
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeProcessPortNotification+30d
    fffff880`00e32731 488b5c2440      mov     rbx,qword ptr [rsp+40h]
    
    SYMBOL_STACK_INDEX:  d
    
    SYMBOL_NAME:  ataport!IdeProcessPortNotification+30d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79293
    
    FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_ataport!IdeProcessPortNotification+30d
    
    BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_ataport!IdeProcessPortNotification+30d
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032011-28111-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c52e90
    Debug session time: Sun Mar 20 07:06:07.973 2011 (UTC - 4:00)
    System Uptime: 0 days 0:07:50.674
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff80002a97c5d}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff80002a97c5d
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  d
    
    LAST_CONTROL_TRANSFER:  from fffff80002a8cbe9 to fffff80002a8d640
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02a8cbe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02a8b0b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff800`02a97c5d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`053e4fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeUpdateSystemTime+0x11d
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02a8b0b2 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032111-26910-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c4ce90
    Debug session time: Sun Mar 20 09:01:43.063 2011 (UTC - 4:00)
    System Uptime: 0 days 0:07:42.764
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050031, 6f8, fffff8800f4d28f4}
    
    Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : nvlddmkm.sys ( nvlddmkm+23d8f4 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff8800f4d28f4
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  5
    
    LAST_CONTROL_TRANSFER:  from fffff80002a86be9 to fffff80002a87640
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02a86be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02a850b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff880`0f4d28f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0a990000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x23d8f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nvlddmkm+23d8f4
    fffff880`0f4d28f4 ff5378          call    qword ptr [rbx+78h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nvlddmkm+23d8f4
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nvlddmkm
    
    IMAGE_NAME:  nvlddmkm.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d64bb6c
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nvlddmkm+23d8f4
    
    BUCKET_ID:  X64_0x7f_8_nvlddmkm+23d8f4
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`01038000 fffff880`0108f000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`01370000 fffff880`013f9000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`03c58000 fffff880`03c6e000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`08cdd000 fffff880`08ce5000   ALSysIO64 ALSysIO64.sys Sun Apr 19 15:41:04 2009 (49EB7E50)
    fffff880`00e64000 fffff880`00e6f000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`03c00000 fffff880`03c48000   an282hoa an282hoa.SYS Sun Nov 28 05:38:44 2010 (4CF23134)
    fffff880`02eeb000 fffff880`02ef4000   anodlwfx anodlwfx.sys Fri Mar 06 05:10:08 2009 (49B0F680)
    fffff880`03db9000 fffff880`03dc1000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
    fffff880`00e31000 fffff880`00e3a000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e3a000 fffff880`00e64000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff960`00930000 fffff960`00991000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`0186f000 fffff880`01876000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`0417f000 fffff880`04190000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`06d64000 fffff880`06d82000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00670000 fffff960`00697000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0168b000 fffff880`016b5000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cf8000 fffff880`00db8000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01800000 fffff880`01830000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c9a000 fffff880`00cf8000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`012dc000 fffff880`0134e000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`03c48000 fffff880`03c58000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`07156000 fffff880`0715f000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`045f2000 fffff880`04600000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`040de000 fffff880`04161000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`04161000 fffff880`0417f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`02fb7000 fffff880`02fc6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01bc4000 fffff880`01bda000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03caa000 fffff880`03d93000   Dnetr28x Dnetr28x.sys Thu Apr 08 23:03:04 2010 (4BBE98E8)
    fffff880`04547000 fffff880`04569000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0fff6000 fffff880`0ffff000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0f288000 fffff880`0f294000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`02fe0000 fffff880`02ff3000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`045ca000 fffff880`045d6000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0fef3000 fffff880`0ffe7000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`0f200000 fffff880`0f246000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`01261000 fffff880`01275000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01215000 fffff880`01261000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`0142c000 fffff880`01436000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01b8a000 fffff880`01bc4000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`01a87000 fffff880`01ad1000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`03da0000 fffff880`03dad000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02ff1000 fffff800`0303a000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`0f264000 fffff880`0f288000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`044ae000 fffff880`0450a000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
    fffff880`04400000 fffff880`04419000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`04419000 fffff880`04421080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`045e4000 fffff880`045f2000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`06c9b000 fffff880`06d64000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`01b81000 fffff880`01b8a000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`00fea000 fffff880`00ff2000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`041b6000 fffff880`041cc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`0ffe7000 fffff880`0fff6000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08d74000 fffff880`08d82000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
    fffff800`00bcb000 fffff800`00bd5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`02e00000 fffff880`02e43000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`01400000 fffff880`0141b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`04569000 fffff880`0456e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`01200000 fffff880`01215000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0183e000 fffff880`01861000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c37000 fffff880`00c86000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
    fffff880`045d6000 fffff880`045e4000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`041ed000 fffff880`041fc000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08d02000 fffff880`08d0f000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e17000 fffff880`00e31000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`06d82000 fffff880`06d9a000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`06d9a000 fffff880`06dc7000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
    fffff880`070e5000 fffff880`07132000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
    fffff880`07132000 fffff880`07156000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
    fffff880`016b5000 fffff880`016c0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0108f000 fffff880`01099000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0127e000 fffff880`012dc000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`02fac000 fffff880`02fb7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01b6f000 fffff880`01b81000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`016d0000 fffff880`017c3000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`03c92000 fffff880`03c9e000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06c70000 fffff880`06c83000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`040ac000 fffff880`040db000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`04499000 fffff880`044ae000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`02ef4000 fffff880`02f03000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02e61000 fffff880`02ea6000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`01436000 fffff880`01447000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02fa0000 fffff880`02fac000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a07000 fffff800`02ff1000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01449000 fffff880`015ec000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`01866000 fffff880`0186f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0fef1000 fffff880`0fef2180   nvBridge nvBridge.kmd Wed Feb 23 02:34:23 2011 (4D64B87F)
    fffff880`0f295000 fffff880`0fef0180   nvlddmkm nvlddmkm.sys Wed Feb 23 02:46:52 2011 (4D64BB6C)
    fffff880`06c1d000 fffff880`06c70000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02eaf000 fffff880`02ed5000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`03dc1000 fffff880`03dde000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f64000 fffff880`00f79000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f31000 fffff880`00f64000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00e10000 fffff880`00e17000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e00000 fffff880`00e10000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0141b000 fffff880`0142c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`07000000 fffff880`070a6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`08d0f000 fffff880`08d1f000   point64  point64.sys  Tue Dec 14 06:09:25 2010 (4D075065)
    fffff880`0450a000 fffff880`04547000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c86000 fffff880`00c9a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03c6e000 fffff880`03c92000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`03dde000 fffff880`03df9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`041cc000 fffff880`041ed000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`02fc6000 fffff880`02fe0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02f4f000 fffff880`02fa0000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`03c9e000 fffff880`03ca9000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01876000 fffff880`0187f000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`017e8000 fffff880`017f1000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`017f1000 fffff880`017fa000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01b35000 fffff880`01b6f000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`06c83000 fffff880`06c9b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04056000 fffff880`040ac000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`01009000 fffff880`01038000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
    fffff880`070a6000 fffff880`070b1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03dad000 fffff880`03db9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02f03000 fffff880`02f20000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00db8000 fffff880`00ddc000   SI3112r  SI3112r.sys  Thu Aug 16 22:04:38 2007 (46C50236)
    fffff880`01275000 fffff880`0127e000   SiWinAcc SiWinAcc.sys Thu Jun 14 20:02:02 2007 (4671D6FA)
    fffff880`01b2d000 fffff880`01b35000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`08d82000 fffff880`08df3000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`0109c000 fffff880`011fe000   sptd     sptd.sys     Tue Nov 23 06:47:37 2010 (4CEBA9D9)
    fffff880`08c13000 fffff880`08cac000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
    fffff880`07171000 fffff880`071dc000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
    fffff880`070b1000 fffff880`070e2000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
    fffff880`03df9000 fffff880`03dfa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01883000 fffff880`01a87000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`0715f000 fffff880`07171000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`016c0000 fffff880`016cd000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`0134e000 fffff880`01370000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`02f3b000 fffff880`02f4f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`005d0000 fffff960`005da000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04190000 fffff880`041b6000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`08d1f000 fffff880`08d74000   udfs     udfs.sys     Sat Nov 20 04:26:11 2010 (4CE79433)
    fffff880`02e43000 fffff880`02e55000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`0456f000 fffff880`0458c000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`0458c000 fffff880`0458df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`0f253000 fffff880`0f264000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
    fffff880`0443f000 fffff880`04499000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
    fffff880`0459f000 fffff880`045ab000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
    fffff880`0458e000 fffff880`0459f000   usbscan  usbscan.sys  Mon Jul 13 20:35:32 2009 (4A5BD2D4)
    fffff880`045ab000 fffff880`045c6000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
    fffff880`0f246000 fffff880`0f253000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00f24000 fffff880`00f31000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01bda000 fffff880`01be8000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`017c3000 fffff880`017e8000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01ad1000 fffff880`01ae1000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`00f79000 fffff880`00f8e000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00f8e000 fffff880`00fea000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01ae1000 fffff880`01b2d000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`03d93000 fffff880`03da0000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02ed5000 fffff880`02eeb000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02f20000 fffff880`02f3b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`01be8000 fffff880`01bf8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`045c6000 fffff880`045c9880   wdcsam64 wdcsam64.sys Wed Apr 16 04:39:08 2008 (4805BB2C)
    fffff880`00e71000 fffff880`00f15000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f15000 fffff880`00f24000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02ea6000 fffff880`02eaf000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00010000 fffff960`00321000   win32k   win32k.sys   unavailable (00000000)
    fffff880`01000000 fffff880`01009000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00ddc000 fffff880`00dfd000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    fffff880`08cac000 fffff880`08cdd000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)
    
    Unloaded modules:
    fffff880`01830000 fffff880`0183e000   kbdhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`08cf2000 fffff880`08d02000   point64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00010000
    fffff880`08ce5000 fffff880`08cf2000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`0442f000 fffff880`0443f000   point64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00010000
    fffff880`04422000 fffff880`0442f000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`01830000 fffff880`0183e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0183e000 fffff880`0184a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0184a000 fffff880`01853000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01853000 fffff880`01866000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. Cigaweedz

    Cigaweedz New Member

    Joined:
    Mar 20, 2011
    Messages:
    4
    Likes Received:
    0
    Still getting BSODs and I'm getting tired of them *sigh*.

    Those apparently are the latest drivers that I could find.
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    They are not compattible with Windows 7. This is the only reason you should update them.
     

Share This Page

Loading...