BSODs everyday and random shutdowns

#1
Thank you for taking the time to read my thread.

My problem started after I installed Windows 7 Ultimate x64. I'm constantly getting BSODs everyday. I've gotten more BSODs in the last week than I have in a life of owning a PC. I'm getting random shutdowns as well.

My Specs:

Core Duo E6600 2.4GHz, Socket 775
4x 1gb DDR2 kingston 333MHz
Nvidia GTS-250
Coolmaster rs-550 PSU
5 SATA HDDs

Everything is stock. No over-clocking. I've included everything I think is needs to diagnose the situation as I am unable to find out what the problem is, and it's feels like I'm finding a needle in a haystack. Thanks in advance.

CPU-Z.png

View attachment Seven Forums.rar
 


#2
0x7f_8_nvlddmkm
0x7f_8_nt!KiDoubleFaultAbort
0xD1_CODE_AV_BAD_IP_ataport!IdeProcessPortNotification
0x7f_8_nvlddmkm




Update drivers:


ASUS ATK0110 ACPI Utility
ASACPI.sys Sun Mar 27 22:30:36 2005

Silicon Image SiI 3112 SATARaid Controller driver
SiWinAcc.sys Thu Jun 14 20:02:02 2007
SI3112r.sys Thu Aug 16 22:04:38 2007


Western Digital SCSI
wdcsam64.sys Wed Apr 16 04:39:08 2008








CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-26520-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c59e90
Debug session time: Sun Mar 20 01:22:14.511 2011 (UTC - 4:00)
System Uptime: 0 days 16:52:32.212
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff8800f46c4d1}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1c34d1 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8800f46c4d1

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'nvlddmkm' and 'nvlddmkm.sys' overlap

BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  5

LAST_CONTROL_TRANSFER:  from fffff80002a93be9 to fffff80002a94640

STACK_TEXT:  
fffff800`00ba4d28 fffff800`02a93be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02a920b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff880`0f46c4d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`05f53fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x1c34d1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nvlddmkm+1c34d1
fffff880`0f46c4d1 ff5378          call    qword ptr [rbx+78h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nvlddmkm+1c34d1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d64bb6c

FAILURE_BUCKET_ID:  X64_0x7f_8_nvlddmkm+1c34d1

BUCKET_ID:  X64_0x7f_8_nvlddmkm+1c34d1

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-28282-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c54e90
Debug session time: Sun Mar 20 06:57:09.140 2011 (UTC - 4:00)
System Uptime: 0 days 5:33:47.841
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {b, 2, 8, b}

Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeProcessPortNotification+30d )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 000000000000000b, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e8
 000000000000000b 

CURRENT_IRQL:  2

FAULTING_IP: 
+3238656131643539
00000000`0000000b ??              ???

PROCESS_NAME:  System

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

TRAP_FRAME:  fffff80000b9cbf0 -- (.trap 0xfffff80000b9cbf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000187000 rsi=0000000000000000 rdi=0000000000000000
rip=000000000000000b rsp=fffff80000b9cd80 rbp=fffff80000b97000
 r8=fffffa80048f20c8  r9=0000000000000000 r10=fffffffffffffffe
r11=fffff80002c01e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`0000000b ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8ebe9 to fffff80002a8f640

FAILED_INSTRUCTION_ADDRESS: 
+3238656131643539
00000000`0000000b ??              ???

STACK_TEXT:  
fffff800`00b9caa8 fffff800`02a8ebe9 : 00000000`0000000a 00000000`0000000b 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`00b9cab0 fffff800`02a8d860 : fffffa80`063833e8 fffffa80`061a11a0 fffffa80`061a11a0 fffff800`02c01e80 : nt!KiBugCheckDispatch+0x69
fffff800`00b9cbf0 00000000`0000000b : fffff800`02c01e80 00000000`00000001 00000000`00000002 00000000`00000201 : nt!KiPageFault+0x260
fffff800`00b9cd80 fffff800`02c01e80 : 00000000`00000001 00000000`00000002 00000000`00000201 fffff800`00b9ce30 : 0xb
fffff800`00b9cd88 00000000`00000001 : 00000000`00000002 00000000`00000201 fffff800`00b9ce30 00000000`00000001 : nt!KiInitialPCR+0x180
fffff800`00b9cd90 00000000`00000002 : 00000000`00000201 fffff800`00b9ce30 00000000`00000001 fffffa80`048601a0 : 0x1
fffff800`00b9cd98 00000000`00000201 : fffff800`00b9ce30 00000000`00000001 fffffa80`048601a0 fffff800`00b97000 : 0x2
fffff800`00b9cda0 fffff800`00b9ce30 : 00000000`00000001 fffffa80`048601a0 fffff800`00b97000 fffff800`00b9cd40 : 0x201
fffff800`00b9cda8 00000000`00000001 : fffffa80`048601a0 fffff800`00b97000 fffff800`00b9cd40 fffff880`00e32731 : 0xfffff800`00b9ce30
fffff800`00b9cdb0 fffffa80`048601a0 : fffff800`00b97000 fffff800`00b9cd40 fffff880`00e32731 fffff800`00b97000 : 0x1
fffff800`00b9cdb8 fffff800`00b97000 : fffff800`00b9cd40 fffff880`00e32731 fffff800`00b97000 00000000`00000000 : 0xfffffa80`048601a0
fffff800`00b9cdc0 fffff800`00b9cd40 : fffff880`00e32731 fffff800`00b97000 00000000`00000000 00000000`00000000 : 0xfffff800`00b97000
fffff800`00b9cdc8 fffff880`00e32731 : fffff800`00b97000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff800`00b9cd40
fffff800`00b9cdd0 fffff880`00e290c5 : 00000000`00000000 fffffa80`04861601 fffffa80`048616a8 00000000`00000000 : ataport!IdeProcessPortNotification+0x30d
fffff800`00b9ce10 fffff880`00e1cb7b : 00000000`0000e400 fffff880`01072742 00000000`00000002 fffff880`00e1b604 : ataport!AtaPortCompleteRequest+0x21
fffff800`00b9ce80 fffff880`00e1ca10 : fffffa80`048b1801 fffffa80`048616a8 fffffa80`0554c758 fffffa80`04861650 : atapi!AtapiCompleteRequest+0x147
fffff800`00b9cec0 fffff880`00e1b83a : fffffa80`048b1850 fffffa80`048b1804 fffffa80`048a5000 fffffa80`0554c758 : atapi!AtapiProcessInterrupt+0x2ac
fffff800`00b9cf20 fffff880`0108c7c8 : 00000000`00000050 fffffa80`048b1810 fffffa80`048a5000 fffffa80`048616a8 : atapi!AtapiHwInterrupt+0x156
fffff800`00b9cf80 00000000`00000050 : fffffa80`048b1810 fffffa80`048a5000 fffffa80`048616a8 00000000`00000000 : sptd+0x457c8
fffff800`00b9cf88 fffffa80`048b1810 : fffffa80`048a5000 fffffa80`048616a8 00000000`00000000 00000000`00000000 : 0x50
fffff800`00b9cf90 fffffa80`048a5000 : fffffa80`048616a8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`048b1810
fffff800`00b9cf98 fffffa80`048616a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`048a5000
fffff800`00b9cfa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`082f2080 : 0xfffffa80`048616a8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdeProcessPortNotification+30d
fffff880`00e32731 488b5c2440      mov     rbx,qword ptr [rsp+40h]

SYMBOL_STACK_INDEX:  d

SYMBOL_NAME:  ataport!IdeProcessPortNotification+30d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79293

FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_ataport!IdeProcessPortNotification+30d

BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_ataport!IdeProcessPortNotification+30d

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-28111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c52e90
Debug session time: Sun Mar 20 07:06:07.973 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:50.674
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff80002a97c5d}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002a97c5d

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  d

LAST_CONTROL_TRANSFER:  from fffff80002a8cbe9 to fffff80002a8d640

STACK_TEXT:  
fffff800`00ba4d28 fffff800`02a8cbe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02a8b0b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02a97c5d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`053e4fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeUpdateSystemTime+0x11d


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDoubleFaultAbort+b2
fffff800`02a8b0b2 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032111-26910-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c4ce90
Debug session time: Sun Mar 20 09:01:43.063 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:42.764
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff8800f4d28f4}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+23d8f4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8800f4d28f4

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  5

LAST_CONTROL_TRANSFER:  from fffff80002a86be9 to fffff80002a87640

STACK_TEXT:  
fffff800`00ba4d28 fffff800`02a86be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02a850b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff880`0f4d28f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0a990000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x23d8f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nvlddmkm+23d8f4
fffff880`0f4d28f4 ff5378          call    qword ptr [rbx+78h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nvlddmkm+23d8f4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d64bb6c

FAILURE_BUCKET_ID:  X64_0x7f_8_nvlddmkm+23d8f4

BUCKET_ID:  X64_0x7f_8_nvlddmkm+23d8f4

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`01038000 fffff880`0108f000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`01370000 fffff880`013f9000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`03c58000 fffff880`03c6e000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`08cdd000 fffff880`08ce5000   ALSysIO64 ALSysIO64.sys Sun Apr 19 15:41:04 2009 (49EB7E50)
fffff880`00e64000 fffff880`00e6f000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`03c00000 fffff880`03c48000   an282hoa an282hoa.SYS Sun Nov 28 05:38:44 2010 (4CF23134)
fffff880`02eeb000 fffff880`02ef4000   anodlwfx anodlwfx.sys Fri Mar 06 05:10:08 2009 (49B0F680)
fffff880`03db9000 fffff880`03dc1000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
fffff880`00e31000 fffff880`00e3a000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e3a000 fffff880`00e64000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff960`00930000 fffff960`00991000   ATMFD    ATMFD.DLL    unavailable (00000000)
fffff880`0186f000 fffff880`01876000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0417f000 fffff880`04190000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06d64000 fffff880`06d82000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      unavailable (00000000)
fffff880`0168b000 fffff880`016b5000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cf8000 fffff880`00db8000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01800000 fffff880`01830000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c9a000 fffff880`00cf8000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012dc000 fffff880`0134e000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`03c48000 fffff880`03c58000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`07156000 fffff880`0715f000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`045f2000 fffff880`04600000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`040de000 fffff880`04161000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`04161000 fffff880`0417f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`02fb7000 fffff880`02fc6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01bc4000 fffff880`01bda000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03caa000 fffff880`03d93000   Dnetr28x Dnetr28x.sys Thu Apr 08 23:03:04 2010 (4BBE98E8)
fffff880`04547000 fffff880`04569000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0fff6000 fffff880`0ffff000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0f288000 fffff880`0f294000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02fe0000 fffff880`02ff3000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`045ca000 fffff880`045d6000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0fef3000 fffff880`0ffe7000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`0f200000 fffff880`0f246000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`01261000 fffff880`01275000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01215000 fffff880`01261000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0142c000 fffff880`01436000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01b8a000 fffff880`01bc4000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01a87000 fffff880`01ad1000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`03da0000 fffff880`03dad000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02ff1000 fffff800`0303a000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`0f264000 fffff880`0f288000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`044ae000 fffff880`0450a000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`04400000 fffff880`04419000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`04419000 fffff880`04421080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`045e4000 fffff880`045f2000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06c9b000 fffff880`06d64000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01b81000 fffff880`01b8a000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`00fea000 fffff880`00ff2000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`041b6000 fffff880`041cc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0ffe7000 fffff880`0fff6000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08d74000 fffff880`08d82000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bcb000 fffff800`00bd5000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`02e00000 fffff880`02e43000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01400000 fffff880`0141b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04569000 fffff880`0456e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`01200000 fffff880`01215000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0183e000 fffff880`01861000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c37000 fffff880`00c86000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`045d6000 fffff880`045e4000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`041ed000 fffff880`041fc000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08d02000 fffff880`08d0f000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e17000 fffff880`00e31000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`06d82000 fffff880`06d9a000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06d9a000 fffff880`06dc7000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`070e5000 fffff880`07132000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`07132000 fffff880`07156000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`016b5000 fffff880`016c0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0108f000 fffff880`01099000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0127e000 fffff880`012dc000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`02fac000 fffff880`02fb7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01b6f000 fffff880`01b81000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016d0000 fffff880`017c3000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`03c92000 fffff880`03c9e000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06c70000 fffff880`06c83000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`040ac000 fffff880`040db000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`04499000 fffff880`044ae000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02ef4000 fffff880`02f03000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02e61000 fffff880`02ea6000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`01436000 fffff880`01447000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02fa0000 fffff880`02fac000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a07000 fffff800`02ff1000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01449000 fffff880`015ec000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`01866000 fffff880`0186f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fef1000 fffff880`0fef2180   nvBridge nvBridge.kmd Wed Feb 23 02:34:23 2011 (4D64B87F)
fffff880`0f295000 fffff880`0fef0180   nvlddmkm nvlddmkm.sys Wed Feb 23 02:46:52 2011 (4D64BB6C)
fffff880`06c1d000 fffff880`06c70000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02eaf000 fffff880`02ed5000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`03dc1000 fffff880`03dde000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f64000 fffff880`00f79000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f31000 fffff880`00f64000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00e10000 fffff880`00e17000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e00000 fffff880`00e10000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0141b000 fffff880`0142c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`07000000 fffff880`070a6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`08d0f000 fffff880`08d1f000   point64  point64.sys  Tue Dec 14 06:09:25 2010 (4D075065)
fffff880`0450a000 fffff880`04547000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c86000 fffff880`00c9a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03c6e000 fffff880`03c92000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`03dde000 fffff880`03df9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`041cc000 fffff880`041ed000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`02fc6000 fffff880`02fe0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02f4f000 fffff880`02fa0000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`03c9e000 fffff880`03ca9000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01876000 fffff880`0187f000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`017e8000 fffff880`017f1000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`017f1000 fffff880`017fa000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01b35000 fffff880`01b6f000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`06c83000 fffff880`06c9b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04056000 fffff880`040ac000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`01009000 fffff880`01038000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`070a6000 fffff880`070b1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03dad000 fffff880`03db9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02f03000 fffff880`02f20000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00db8000 fffff880`00ddc000   SI3112r  SI3112r.sys  Thu Aug 16 22:04:38 2007 (46C50236)
fffff880`01275000 fffff880`0127e000   SiWinAcc SiWinAcc.sys Thu Jun 14 20:02:02 2007 (4671D6FA)
fffff880`01b2d000 fffff880`01b35000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`08d82000 fffff880`08df3000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0109c000 fffff880`011fe000   sptd     sptd.sys     Tue Nov 23 06:47:37 2010 (4CEBA9D9)
fffff880`08c13000 fffff880`08cac000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`07171000 fffff880`071dc000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`070b1000 fffff880`070e2000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`03df9000 fffff880`03dfa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01883000 fffff880`01a87000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`0715f000 fffff880`07171000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`016c0000 fffff880`016cd000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0134e000 fffff880`01370000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`02f3b000 fffff880`02f4f000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`005d0000 fffff960`005da000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`04190000 fffff880`041b6000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`08d1f000 fffff880`08d74000   udfs     udfs.sys     Sat Nov 20 04:26:11 2010 (4CE79433)
fffff880`02e43000 fffff880`02e55000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0456f000 fffff880`0458c000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`0458c000 fffff880`0458df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0f253000 fffff880`0f264000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
fffff880`0443f000 fffff880`04499000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
fffff880`0459f000 fffff880`045ab000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`0458e000 fffff880`0459f000   usbscan  usbscan.sys  Mon Jul 13 20:35:32 2009 (4A5BD2D4)
fffff880`045ab000 fffff880`045c6000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
fffff880`0f246000 fffff880`0f253000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f24000 fffff880`00f31000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01bda000 fffff880`01be8000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`017c3000 fffff880`017e8000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01ad1000 fffff880`01ae1000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00f79000 fffff880`00f8e000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00f8e000 fffff880`00fea000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01ae1000 fffff880`01b2d000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`03d93000 fffff880`03da0000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02ed5000 fffff880`02eeb000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02f20000 fffff880`02f3b000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01be8000 fffff880`01bf8000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`045c6000 fffff880`045c9880   wdcsam64 wdcsam64.sys Wed Apr 16 04:39:08 2008 (4805BB2C)
fffff880`00e71000 fffff880`00f15000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f15000 fffff880`00f24000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ea6000 fffff880`02eaf000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00321000   win32k   win32k.sys   unavailable (00000000)
fffff880`01000000 fffff880`01009000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ddc000 fffff880`00dfd000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`08cac000 fffff880`08cdd000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)

Unloaded modules:
fffff880`01830000 fffff880`0183e000   kbdhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`08cf2000 fffff880`08d02000   point64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00010000
fffff880`08ce5000 fffff880`08cf2000   mouhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`0442f000 fffff880`0443f000   point64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00010000
fffff880`04422000 fffff880`0442f000   mouhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`01830000 fffff880`0183e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0183e000 fffff880`0184a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0184a000 fffff880`01853000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01853000 fffff880`01866000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


#3
Still getting BSODs and I'm getting tired of them *sigh*.

Those apparently are the latest drivers that I could find.
 


#4
Those apparently are the latest drivers that I could find.

They are not compattible with Windows 7. This is the only reason you should update them.
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.