Erratic and confusing BSOD issue

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by DragonSpawn, Dec 29, 2010.

  1. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    I have tried googling and self-solving this issue to no end. My Computer has several BSOD issues that while showing different symptoms all seem to come from the same problem in my opinion.

    This freeze tends to happen once every few days. I run/leave the PC on an average of 10 hours a day. Turning it on in the morning and leaving it on out of convenience. 70% of the time I get the BSOD type 1 is when I am gaming. All of a sudden there is a short freeze, then a buzzing sound in my headset [sound] and the PC restarts. Then it brings me to the menu prompting me to start normally or in safe mode. The other times I get it when either listening to music on a player or watching a movie on a player. I am not sure if it would occur if I let the PC idle and not run anything.

    BSOD type 2 is very specific and only happens with 1 sort of game. I am mentioning this since it might shed light to the BSOD #1 above which is much more serious and bothersome. When I play one specific game, the game runs fine for 30ish minutes then usually freezes and there is an awful chopping/bzzzzzzing sound in my headset. The only way to regain control over my computer is to hard restart it by holding down the on/off button. This game is 5 years old and I should be able to run it twice on highest settings without issue.

    I also included memdumps in a .zip file to show how at the end of the line I am with this. Since I tried everything I could think of. I ran memtests and it didn't show a single error. I reinstalled my audio drivers. Updated my BIOS. Updated my graphic card drivers.

    My specs;
    Windows 7 Ultimate 64bit
    Nvidia 8800 GTX 768mb
    4gb RAM DDR2 @ 1066mhz
    Intel Core Duo E8300 @ 2.83ghz
    320gb Samsung HDD
    2x external HD's connected by USB, 2tb and 1.5tb (Hitachi & Toshiba drive)
     

    Attached Files:

  2. Captain Jack

    Captain Jack Extraordinary Member

    Joined:
    Mar 6, 2010
    Messages:
    1,952
    Likes Received:
    139
    Hello and Welcome !

    Seems like it might be Memory. Run a Hardware Diagnostic (Memory and Hard Drive) follow this link for instructions Hardware Diagnostic !! « Captain Debugger

    Remove the Duplex Driver
    sptd.sys Mon Oct 12 02:25:14 2009 follow this article DuplexSecure - FAQ

    Uninstall AVG
    Download AVG removal Tool for 32bit or Download AVG Removal tool for 64-bit

    Bugcheck:

    Code:
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa7fffffffe0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ca5b7f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS:  fffffa7fffffffe0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReplenishPageSlist+100
    fffff800`02ca5b7f f00fba6b1000    lock bts dword ptr [rbx+10h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff880082916c0 -- (.trap 0xfffff880082916c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffffffffffffff rbx=0000000000000000 rcx=fdffffffffffffff
    rdx=000000000000004f rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ca5b7f rsp=fffff88008291850 rbp=fffffa8003600938
     r8=fffff80002eba400  r9=fffffa8003600000 r10=fffffa8003600958
    r11=fffff880082918a8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiReplenishPageSlist+0x100:
    fffff800`02ca5b7f f00fba6b1000    lock bts dword ptr [rbx+10h],0 ds:00000000`00000010=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c7fca9 to fffff80002c80740
    
    STACK_TEXT:  
    fffff880`08291578 fffff800`02c7fca9 : 00000000`0000000a fffffa7f`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`08291580 fffff800`02c7e920 : 00000000`00000000 fffffa7f`ffffffd0 00000000`00000003 fffff800`02db54c1 : nt!KiBugCheckDispatch+0x69
    fffff880`082916c0 fffff800`02ca5b7f : fffff880`08291940 00000000`00000001 fffffa80`03fdfc80 00000000`000000ae : nt!KiPageFault+0x260
    fffff880`08291850 fffff800`02ca60af : fffff800`02eba400 00000000`0000003b fffffa80`01134b10 fffffa7f`ffffffd0 : nt!MiReplenishPageSlist+0x100
    fffff880`082918b0 fffff800`02c9e2c7 : 00000000`00000002 00000000`00000002 fffffa80`05cdcec8 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
    fffff880`082919d0 fffff800`02c9a9c6 : 00000000`00000001 00000000`00290000 fffff880`08291c20 fffff680`00001480 : nt!MiResolveDemandZeroFault+0x577
    fffff880`08291ac0 fffff800`02c7e82e : 00000000`00000001 00000000`00290008 00000000`0273e101 00000000`00008000 : nt!MmAccessFault+0x5c6
    fffff880`08291c20 000007fe`fd21523b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`0273e060 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd21523b
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiReplenishPageSlist+100
    fffff800`02ca5b7f f00fba6b1000    lock bts dword ptr [rbx+10h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiReplenishPageSlist+100
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReplenishPageSlist+100
    
    BUCKET_ID:  X64_0xA_nt!MiReplenishPageSlist+100
    
    Followup: MachineOwner
     
  3. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    Thanks for the quick feedback.

    I already tested with memtest86+ overnight, letting it run for 8 hours. Absolutely no errors, apparently my RAM is the definition of perfect according to the test. Also I don't use AVG, I use avira antivir. Could this be the issue?

    I'll try this. Can I ask why this would help though? Does this driver cause many issues and conflicts, and would it's removal cause any other instability?
     
  4. Captain Jack

    Captain Jack Extraordinary Member

    Joined:
    Mar 6, 2010
    Messages:
    1,952
    Likes Received:
    139
    Yes sptd.sys is well known for problem it comes with Virtual disk software just Google it you'll find bunch of threads. Uninstall Avira then completely. If your Overclocking go to BIOS and reset all the settings to default settings.
     
  5. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    No overclocking so no need. Also I removed the duplex driver. I will remove avira, however can you possibly recommend an alternative antivirus? From what I can deduce from your post AVG and Avira are both suspect in BSOD activity. I am kind of nervous to run my system without any protection.
     
  6. Captain Jack

    Captain Jack Extraordinary Member

    Joined:
    Mar 6, 2010
    Messages:
    1,952
    Likes Received:
    139
    You could use Microsoft Security Essentials
     
  7. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    I removed Avira and installed ESET Nod antivirus after seeing that it's compatible/supported with Windows 7 (avira wasn't on the compatible/supported list) because my uncle still has a working subscription with them.

    Again thanks for all the support. If any future BSOD's continue to happen I'll stay in contact.
     
  8. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    I did everything recommended in this thread so far. But in the last 2 days I had 2 more BSOD's after having had a grace period of almost a week with no BSOD despite having the PC on for almost 10+ hours a day on all those days as well.

    Is anything new showing up on the new memdumps? ;/ Any further recommendations? I even ran another memory test and it shows absolutely no corruption/issues with the memory.
     

    Attached Files:

  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    BugCheck A, {fffffa7fffffdaf0, 2, 1, fffff80002d08349}
    Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )


    Run memtest 10 passes overnight Memtest86+ - Advanced Memory Diagnostic Tool.


    You might benefit from updating these drivers:

    LGBusEnum.sys Mon Nov 23 20:36:48 2009
    LGVirHid.sys Mon Nov 23 20:36:48 2009
    Logitech WingMan GamePanel

    Rt64win7.sys Wed Jun 23 05:10:45 2010
    Realtek PCI/Ex LAN

    RTKVHD64.sys Fri Mar 26 06:30:50 2010
    Realtek Audio




    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\010511-17082-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c51000 PsLoadedModuleList = 0xfffff800`02e8ee50
    Debug session time: Wed Jan  5 10:00:49.620 2011 (UTC - 5:00)
    System Uptime: 0 days 6:11:44.181
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa7fffffdaf0, 2, 1, fffff80002d08349}
    
    Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa7fffffdaf0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002d08349, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef90e0
     fffffa7fffffdaf0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MmZeroPageThread+3d4
    fffff800`02d08349 f0410fba6d1000  lock bts dword ptr [r13+10h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880009a9a80 -- (.trap 0xfffff880009a9a80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000003a rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002d08349 rsp=fffff880009a9c10 rbp=000000000000003f
     r8=0000000000000000  r9=0000058000000000 r10=0000000000000002
    r11=fffff880009a9c08 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MmZeroPageThread+0x3d4:
    fffff800`02d08349 f0410fba6d1000  lock bts dword ptr [r13+10h],0 ds:a040:00000000`00000010=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cc0ca9 to fffff80002cc1740
    
    STACK_TEXT:  
    fffff880`009a9938 fffff800`02cc0ca9 : 00000000`0000000a fffffa7f`ffffdaf0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`009a9940 fffff800`02cbf920 : 00000000`00000000 ffffffff`ffffff3a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009a9a80 fffff800`02d08349 : 00000000`0000003f 00000000`00000032 00000000`00000004 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`009a9c10 fffff800`02f65c06 : fffffa80`036ca040 00000000`00000080 fffffa80`0366b9e0 fffff800`02c9fc19 : nt!MmZeroPageThread+0x3d4
    fffff880`009a9d40 fffff800`02c9fc26 : fffff800`02e3be80 fffffa80`036ca040 fffff800`02e49c40 4127733c`5d3b0000 : nt!PspSystemThreadStartup+0x5a
    fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MmZeroPageThread+3d4
    fffff800`02d08349 f0410fba6d1000  lock bts dword ptr [r13+10h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MmZeroPageThread+3d4
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4
    
    BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\010611-19484-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c01000 PsLoadedModuleList = 0xfffff800`02e3ee50
    Debug session time: Thu Jan  6 08:54:26.440 2011 (UTC - 5:00)
    System Uptime: 0 days 4:52:49.126
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa7fffffd7f0, 2, 1, fffff80002cb8349}
    
    Probably caused by : memory_corruption ( nt!MmZeroPageThread+3d4 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa7fffffd7f0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002cb8349, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ea90e0
     fffffa7fffffd7f0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MmZeroPageThread+3d4
    fffff800`02cb8349 f0410fba6d1000  lock bts dword ptr [r13+10h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880009a9a80 -- (.trap 0xfffff880009a9a80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000002a rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cb8349 rsp=fffff880009a9c10 rbp=000000000000003f
     r8=0000000000000000  r9=0000058000000000 r10=0000000000000002
    r11=fffff880009a9c08 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MmZeroPageThread+0x3d4:
    fffff800`02cb8349 f0410fba6d1000  lock bts dword ptr [r13+10h],0 ds:a040:00000000`00000010=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c70ca9 to fffff80002c71740
    
    STACK_TEXT:  
    fffff880`009a9938 fffff800`02c70ca9 : 00000000`0000000a fffffa7f`ffffd7f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`009a9940 fffff800`02c6f920 : 00000000`00000000 ffffffff`ffffff2a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009a9a80 fffff800`02cb8349 : 00000000`0000003f 00000000`00000016 00000000`00000008 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`009a9c10 fffff800`02f15c06 : fffffa80`036ca040 00000000`00000080 fffffa80`0366b9e0 fffff800`02c4fc19 : nt!MmZeroPageThread+0x3d4
    fffff880`009a9d40 fffff800`02c4fc26 : fffff800`02debe80 fffffa80`036ca040 fffff800`02df9c40 dedae6ff`ff6ecfb9 : nt!PspSystemThreadStartup+0x5a
    fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MmZeroPageThread+3d4
    fffff800`02cb8349 f0410fba6d1000  lock bts dword ptr [r13+10h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MmZeroPageThread+3d4
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4
    
    BUCKET_ID:  X64_0xA_nt!MmZeroPageThread+3d4
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00eba000 fffff880`00f11000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cf1000 fffff880`02d7b000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03a00000 fffff880`03a16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00ff1000 fffff880`00ffa000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`01975000 fffff880`0197c000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03b36000 fffff880`03b47000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`05ee1000 fffff880`05eff000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`01942000 fffff880`0196c000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cf2000 fffff880`00db2000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018dc000 fffff880`0190c000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c94000 fffff880`00cf2000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0112c000 fffff880`0119f000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`053ed000 fffff880`053fd000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`062fc000 fffff880`0630a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03a95000 fffff880`03b18000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03b18000 fffff880`03b36000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02cb4000 fffff880`02cc3000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018c6000 fffff880`018dc000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05cf4000 fffff880`05d16000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06316000 fffff880`0631f000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0630a000 fffff880`06316000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0631f000 fffff880`06332000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05d39000 fffff880`05d45000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03c87000 fffff880`03d7b000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03d7b000 fffff880`03dc1000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`03efe000 fffff880`03fd5000   eamonm   eamonm.sys   Wed Jul 14 04:13:43 2010 (4C3D71B7)
    fffff880`0197c000 fffff880`019a1000   ehdrv    ehdrv.sys    Wed Jul 14 04:14:21 2010 (4C3D71DD)
    fffff880`06332000 fffff880`06353000   epfwwfpr epfwwfpr.sys Wed Jul 14 04:10:34 2010 (4C3D70FA)
    fffff880`069ac000 fffff880`069e2000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`03df2000 fffff880`03dff000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`010ba000 fffff880`010ce000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`03ede000 fffff880`03ee9000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`0106e000 fffff880`010ba000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0188c000 fffff880`018c6000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`03c73000 fffff880`03c80000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`031dd000 fffff800`03226000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03dce000 fffff880`03df2000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05dc2000 fffff880`05ddb000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05ddb000 fffff880`05de3080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05db4000 fffff880`05dc2000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`05e19000 fffff880`05ee1000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`0121b000 fffff880`01224000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03b6d000 fffff880`03b83000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`01861000 fffff880`01870000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05df1000 fffff880`05dff000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b97000 fffff800`00ba1000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`03e2b000 fffff880`03e6e000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05d16000 fffff880`05d1b200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`03e6e000 fffff880`03e71d80   LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
    fffff880`069a9000 fffff880`069ab480   LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
    fffff880`05a31000 fffff880`05a46000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05d53000 fffff880`05d76000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c3c000 fffff880`00c80000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05d45000 fffff880`05d53000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`01870000 fffff880`0187f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05de4000 fffff880`05df1000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00dc2000 fffff880`00ddc000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`05eff000 fffff880`05f17000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`05f17000 fffff880`05f44000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`05f44000 fffff880`05f92000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`05f92000 fffff880`05fb5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f1a000 fffff880`00f24000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010ce000 fffff880`0112c000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02ca9000 fffff880`02cb4000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0148d000 fffff880`0149f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014a6000 fffff880`01598000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04800000 fffff880`0480c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03a3a000 fffff880`03a69000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03ee9000 fffff880`03efe000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02def000 fffff880`02dfe000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d7b000 fffff880`02dc0000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01598000 fffff880`015f8000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c9d000 fffff880`02ca9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c01000 fffff800`031dd000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0196c000 fffff880`01975000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`053eb000 fffff880`053ec180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
    fffff880`04811000 fffff880`053eaa80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
    fffff880`02dc9000 fffff880`02def000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`03bd9000 fffff880`03bf6000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f64000 fffff880`00f79000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f31000 fffff880`00f64000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fea000 fffff880`00ff1000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00db2000 fffff880`00dc2000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06353000 fffff880`063f9000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05cb7000 fffff880`05cf4000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c80000 fffff880`00c94000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03a16000 fffff880`03a3a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03a69000 fffff880`03a84000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`02cc3000 fffff880`02ce4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`01847000 fffff880`01861000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c4c000 fffff880`02c9d000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03a84000 fffff880`03a8f000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019e4000 fffff880`019ed000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019ed000 fffff880`019f6000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019f6000 fffff880`019ff000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05a46000 fffff880`05a5e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03b83000 fffff880`03bd9000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`05a85000 fffff880`05cb6c00   RTKVHD64 RTKVHD64.sys Fri Mar 26 06:30:50 2010 (4BAC8CDA)
    fffff880`06200000 fffff880`0620b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03c67000 fffff880`03c73000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02c00000 fffff880`02c1d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`06913000 fffff880`069a9000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`068ac000 fffff880`06913000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`0620b000 fffff880`06238000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`03c80000 fffff880`03c81480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06238000 fffff880`0624a000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02c38000 fffff880`02c4c000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03b47000 fffff880`03b6d000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`062a8000 fffff880`062fc000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`03e72000 fffff880`03e84000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05d97000 fffff880`05db4000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05d37000 fffff880`05d38f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03c56000 fffff880`03c67000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e84000 fffff880`03ede000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03c00000 fffff880`03c56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05d1c000 fffff880`05d37000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`03dc1000 fffff880`03dce000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00f24000 fffff880`00f31000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019a1000 fffff880`019af000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019af000 fffff880`019d4000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f79000 fffff880`00f8e000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f8e000 fffff880`00fea000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0119f000 fffff880`011eb000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02c1d000 fffff880`02c38000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019d4000 fffff880`019e4000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e07000 fffff880`00eab000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eab000 fffff880`00eba000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02dc0000 fffff880`02dc9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00080000 fffff960`00390000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00f11000 fffff880`00f1a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05d76000 fffff880`05d97000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`05a00000 fffff880`05a31000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`069e2000 fffff880`069ee000   hiber_atapor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`069ee000 fffff880`069f7000   hiber_atapi.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`06800000 fffff880`06813000   hiber_dumpfv
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`0190c000 fffff880`0191a000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0191a000 fffff880`01926000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01926000 fffff880`0192f000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`0192f000 fffff880`01942000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`0103a000 fffff880`0106b000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00031000
    fffff880`0103a000 fffff880`0106b000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00031000
    
    
     
  10. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    I checked the GamePanel for updates and all those drivers are the latest apparently.


    I then checked up on the other drivers you mentioned;

    http://www.gigabyte.us/products/product-page.aspx?pid=2740#dl


    I was unable to find the Realtek PCI/Ex LAN driver in the list. It doesn't seem to offer it for 64bit on my motherboard homepage, or am I overlooking it? :/
     
    #10 DragonSpawn, Jan 7, 2011
    Last edited: Jan 7, 2011
  11. Elmer

    Elmer Extraordinary Member

    Joined:
    Mar 5, 2010
    Messages:
    3,873
    Likes Received:
    284
    Here you go:

    On your MoBo downloads under LAN >> Realtek Lan driver >> Region. It's a multi format installer.

    OR
    Realtek PCI/Ex LAN :wink:

    Wish my mobo's downloads page was as user friendly!!
     
    #11 Elmer, Jan 7, 2011
    Last edited: Jan 7, 2011
  12. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    Thanks buddy. I might be coming off as a bit dumb, but I don't want to install the wrong thing. In this list, which is the right one?

    Realtek


    Even after 5 minutes of looking and guessing I can't reach a conclusive answer and I don't want to mess up my machine with new problems ;/
     
  13. Elmer

    Elmer Extraordinary Member

    Joined:
    Mar 5, 2010
    Messages:
    3,873
    Likes Received:
    284
    I updated my previous post to detail the Gigabyte details. Best to get it from there.

    If you go to Realtek:-
    Win7 and WinServer 2008 R2 Driver OR Win7 and WinServer 2008 R2 Auto Installation Program (SID:1436514) version 7.034
     
    #13 Elmer, Jan 7, 2011
    Last edited: Jan 7, 2011
  14. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321


    No these are not at all the latest:

    Code:
    LGBusEnum.sys Mon Nov 23 20:36:48 2009
    LGVirHid.sys Mon Nov 23 20:36:48 2009
     [B]Logitech WingMan GamePanel
    Support + Downloads


    Realtek LAN:

    Realtek

    [/B]
     
  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    If you can't update Realtek, then at least please take the effort to update LOGITECH. As the driver's old and may be bugging out.
     
  16. DragonSpawn

    DragonSpawn New Member

    Joined:
    May 7, 2010
    Messages:
    40
    Likes Received:
    0
    I updated the realtek "ethernet control driver" which I got off the realtek link Elmer provided, so it's now on version 7.034

    Also downloaded 2 updates for the logitech gamepanel ; "Game panel software (legacy)" and "Logitech Gaming Software (current)." Which I then both installed.

    Now I guess we wait and hope the BSOD's will stop. Thanks for all the support, I hope this solved it.
     
  17. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

Share This Page

Loading...