New EliteBook 8540p keeps Blue Screening..

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by djsax, May 13, 2011.

  1. djsax

    djsax New Member

    Joined:
    May 13, 2011
    Messages:
    8
    Likes Received:
    0
    Firstly, I would just like to say hi to everyone. Also that I am new and would really appreciate some help with BSOD's on my new Laptop.

    I've had quite BSOD's in the last week or so and can attach a .ZIP file of the last 4..

    I've tried my best to read the forum rules so there is also a couple of screen captures of CPU-Z that might also help..

    I would really appreciate any help anyone could give on this..

    Thanks in advance

    DJ CPUcap.PNG SPDcap.PNG
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Uninstall Avira, uninstall Zone Alarm.

    Install Microsoft Security Essentials.

    http://www.microsoft.com/en-us/security_essentials/default.aspx



    Update drivers
    :

    Intel Mangement Engine
    HECIx64.sys Thu Sep 17 15:54:16 2009
    IntelĀ® Driver Update Utility

    Intel Turbo Boost - update and disable it for now

    USB 3.0 Controller
    nusb3xhc.sys Fri Nov 20 05:16:01 2009

    Ricoh Memory Card Reader
    rimmpx64.sys Thu Jun 25 04:04:18 2009


    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051111-23774-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02e1a000 PsLoadedModuleList = 0xfffff800`03057e50
    Debug session time: Wed May 11 15:37:56.020 2011 (UTC - 4:00)
    System Uptime: 0 days 1:32:52.644
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    ..................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002e52eb0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002e52eb0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002e89ca9 to fffff80002e8a740
    
    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02e89ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02e88172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff800`02e52eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0b68dad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02e88172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050711-22464-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02e58000 PsLoadedModuleList = 0xfffff800`03095e50
    Debug session time: Sat May  7 07:12:29.524 2011 (UTC - 4:00)
    System Uptime: 0 days 0:09:34.163
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002e90eb0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002e90eb0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002ec7ca9 to fffff80002ec8740
    
    STACK_TEXT:  
    fffff880`02fd9ce8 fffff800`02ec7ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02fd9cf0 fffff800`02ec6172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02fd9e30 fffff800`02e90eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`02ff5bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02ec6172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\050711-23275-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02e0e000 PsLoadedModuleList = 0xfffff800`0304be50
    Debug session time: Sat May  7 07:25:59.959 2011 (UTC - 4:00)
    System Uptime: 0 days 0:13:08.223
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002e46eb0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002e46eb0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002e7dca9 to fffff80002e7e740
    
    STACK_TEXT:  
    fffff880`009efce8 fffff800`02e7dca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`009efcf0 fffff800`02e7c172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009efe30 fffff800`02e46eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`02f15bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02e7c172 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051211-20295-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`02e0f000 PsLoadedModuleList = 0xfffff800`0304ce50
    Debug session time: Thu May 12 12:39:03.630 2011 (UTC - 4:00)
    System Uptime: 0 days 0:28:28.269
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 6f8, fffff80002e47e88}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000006f8
    Arg4: fffff80002e47e88
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002e7ec69 to fffff80002e7f700
    
    STACK_TEXT:  
    fffff880`02fd9ce8 fffff800`02e7ec69 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02fd9cf0 fffff800`02e7d132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02fd9e30 fffff800`02e47e88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`02ff5b70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b2
    fffff800`02e7d132 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    BUCKET_ID:  X64_0x7f_8_nt!KiDoubleFaultAbort+b2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Followup: MachineOwner
    ---------
    
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`0530a000 fffff880`05348000   1394ohci 1394ohci.sys Wed Oct 14 23:35:12 2009 (4AD69870)
    fffff880`03c26000 fffff880`03c33000   Accelerometer Accelerometer.sys Wed Apr 20 14:54:26 2011 (4DAF2BE2)
    fffff880`00d58000 fffff880`00daf000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cc6000 fffff880`02d50000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03c51000 fffff880`03c67000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`06e0f000 fffff880`06f40000   agrsm64  agrsm64.sys  Tue Jul 21 14:03:31 2009 (4A6602F3)
    fffff880`011d0000 fffff880`011db000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`01182000 fffff880`0118b000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0118b000 fffff880`011b5000   ataport  ataport.SYS  Mon Aug 09 22:37:02 2010 (4C60BB4E)
    fffff880`06fad000 fffff880`06fca000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
    fffff880`04548000 fffff880`0456a000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
    fffff880`00fe5000 fffff880`00ff1000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`03bb4000 fffff880`03bbb000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`04537000 fffff880`04548000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02b4b000 fffff880`02b69000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
    fffff960`00710000 fffff960`00737000   cdd      cdd.dll      unavailable (00000000)
    fffff880`03b81000 fffff880`03bab000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00efa000 fffff880`00fba000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`013c6000 fffff880`013f6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cfa000 fffff880`00d58000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03c33000 fffff880`03c37500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`014e3000 fffff880`01556000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fdc000 fffff880`00fe5000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`03c41000 fffff880`03c51000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`06f5b000 fffff880`06f69000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04496000 fffff880`04519000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`04519000 fffff880`04537000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`04487000 fffff880`04496000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01444000 fffff880`0145a000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`067dd000 fffff880`067ff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06f69000 fffff880`06f7c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`03a44000 fffff880`03b60000   dump_iaStor dump_iaStor.sys Mon Apr 05 12:30:59 2010 (4BBA1043)
    fffff880`06f4f000 fffff880`06f5b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`042d3000 fffff880`043c7000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`04200000 fffff880`04246000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`0427b000 fffff880`042c7000   e1k62x64 e1k62x64.sys Tue Apr 06 03:37:39 2010 (4BBAE4C3)
    fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01567000 fffff880`01571000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    fffff880`0140a000 fffff880`01444000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0179a000 fffff880`017e4000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`033eb000 fffff800`03434000   hal      hal.dll      Tue Sep 01 02:16:34 2009 (4A9CBC42)
    fffff880`04246000 fffff880`0426a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`0426a000 fffff880`0427b000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`01400000 fffff880`0140a000   hpdskflt hpdskflt.sys Wed Apr 20 14:54:27 2011 (4DAF2BE3)
    fffff880`043d8000 fffff880`043e4000   HpqKbFiltr HpqKbFiltr.sys Wed Apr 29 09:48:30 2009 (49F85AAE)
    fffff880`02a83000 fffff880`02b4b000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01612000 fffff880`0161b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04a37000 fffff880`04a55000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01066000 fffff880`01182000   iaStor   iaStor.sys   Mon Apr 05 12:30:59 2010 (4BBA1043)
    fffff880`03c00000 fffff880`03c25180   Impcd    Impcd.sys    Mon Oct 26 16:39:41 2009 (4AE6090D)
    fffff880`04590000 fffff880`045a6000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`06e00000 fffff880`06e0b000   ISWKL    ISWKL.sys    Mon Jun 14 12:12:22 2010 (4C1654E6)
    fffff880`043e4000 fffff880`043f3000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00b9b000 fffff800`00ba5000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
    fffff880`06788000 fffff880`067cb000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`014c9000 fffff880`014e3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`0176f000 fffff880`0179a000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`066e6000 fffff880`066eb200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`06feb000 fffff880`07000000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06f8a000 fffff880`06fad000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00ca2000 fffff880`00ce6000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`06f40000 fffff880`06f4f000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
    fffff880`06f7c000 fffff880`06f8a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03de3000 fffff880`03df2000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00dc4000 fffff880`00dde000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02b69000 fffff880`02b81000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02b81000 fffff880`02bae000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
    fffff880`02bae000 fffff880`02bfc000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
    fffff880`02a00000 fffff880`02a23000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
    fffff880`011b5000 fffff880`011c0000   msahci   msahci.sys   Mon Aug 09 23:23:00 2010 (4C60C614)
    fffff880`03a1b000 fffff880`03a26000   Msfs     Msfs.SYS     unavailable (00000000)
    fffff880`00ebc000 fffff880`00ec6000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0146b000 fffff880`014c9000   msrpc    msrpc.sys    unavailable (00000000)
    fffff880`0447c000 fffff880`04487000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01600000 fffff880`01612000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0161d000 fffff880`0170f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03df2000 fffff880`03dfe000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06d4a000 fffff880`06d5d000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`066f6000 fffff880`06725000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`06671000 fffff880`06686000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02dab000 fffff880`02dba000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d50000 fffff880`02d95000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0170f000 fffff880`0176f000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`04a5f000 fffff880`052cb000   NETwNs64 NETwNs64.sys Tue Jan 04 14:29:41 2011 (4D237525)
    fffff880`03a26000 fffff880`03a37000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04470000 fffff880`0447c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e0f000 fffff800`033eb000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
    fffff880`01224000 fffff880`013c6000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
    fffff880`03bab000 fffff880`03bb4000   Null     Null.SYS     unavailable (00000000)
    fffff880`0665a000 fffff880`06671000   nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
    fffff880`052d8000 fffff880`05308000   nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
    fffff880`061f0000 fffff880`061f1180   nvBridge nvBridge.kmd Sat Dec 04 05:43:33 2010 (4CFA1B55)
    fffff880`06686000 fffff880`066a9000   nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D)
    fffff880`05600000 fffff880`061efd00   nvlddmkm nvlddmkm.sys Sat Dec 04 05:46:15 2010 (4CFA1BF7)
    fffff880`06cf7000 fffff880`06d4a000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02c9c000 fffff880`02cc2000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`04a1a000 fffff880`04a37000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00fc7000 fffff880`00fdc000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00ec6000 fffff880`00ef9000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`011c0000 fffff880`011d0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`00c5c000 fffff880`00c95000   pcmcia   pcmcia.sys   Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01556000 fffff880`01567000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`08068000 fffff880`0810e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`066a9000 fffff880`066e6000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00ce6000 fffff880`00cfa000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03c67000 fffff880`03c8b000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`06725000 fffff880`06740000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`06740000 fffff880`06761000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`06761000 fffff880`0677b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0441f000 fffff880`04470000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0677b000 fffff880`06786000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`03a00000 fffff880`03a09000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03a09000 fffff880`03a12000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03a12000 fffff880`03a1b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015bd000 fffff880`015f7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05368000 fffff880`0537e000   rimmpx64 rimmpx64.sys Thu Jun 25 04:04:18 2009 (4A432F82)
    fffff880`0537e000 fffff880`05395000   rimspx64 rimspx64.sys Thu Jun 25 03:13:43 2009 (4A4323A7)
    fffff880`053ec000 fffff880`053fa680   rismcx64 rismcx64.sys Mon Jul 20 05:30:52 2009 (4A64394C)
    fffff880`05395000 fffff880`053ec000   rixdpx64 rixdpx64.sys Thu Jun 25 03:38:50 2009 (4A43298A)
    fffff880`06d5d000 fffff880`06d75000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04a0c000 fffff880`04a1a000   scfilter scfilter.sys Mon Jul 13 19:50:17 2009 (4A5BC839)
    fffff880`05348000 fffff880`05368000   sdbus    sdbus.sys    Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0810e000 fffff880`08119000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`04a00000 fffff880`04a0c000   SMCLIB   SMCLIB.SYS   Mon Jul 13 20:00:35 2009 (4A5BCAA3)
    fffff880`017f4000 fffff880`017fc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`084dd000 fffff880`08572000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
    fffff880`08158000 fffff880`081bf000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
    fffff880`08119000 fffff880`08146000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
    fffff880`06c75000 fffff880`06cf7000   stwrt64  stwrt64.sys  Thu Sep 09 03:12:10 2010 (4C8888CA)
    fffff880`06786000 fffff880`06787480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`03c8c000 fffff880`03de3000   SynTP    SynTP.sys    Thu Jun 03 21:27:13 2010 (4C085671)
    fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`08146000 fffff880`08158000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`03a37000 fffff880`03a44000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01200000 fffff880`0121e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02dd5000 fffff880`02de9000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005c0000 fffff960`005ca000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`0456a000 fffff880`04590000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`067cb000 fffff880`067dd000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05308000 fffff880`05309f00   USBD     USBD.SYS     Mon Mar 28 23:32:09 2011 (4D9152B9)
    fffff880`043c7000 fffff880`043d8000   usbehci  usbehci.sys  Mon Mar 28 23:32:16 2011 (4D9152C0)
    fffff880`06600000 fffff880`0665a000   usbhub   usbhub.sys   Mon Mar 28 23:32:44 2011 (4D9152DC)
    fffff880`045a6000 fffff880`045fc000   USBPORT  USBPORT.SYS  Mon Mar 28 23:32:20 2011 (4D9152C4)
    fffff880`00fba000 fffff880`00fc7000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`03bbb000 fffff880`03bc9000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`03bc9000 fffff880`03bee000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`017e4000 fffff880`017f4000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00daf000 fffff880`00dc4000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  unavailable (00000000)
    fffff880`01571000 fffff880`015bd000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02c00000 fffff880`02c93000   vsdatant vsdatant.sys Mon May 03 13:44:42 2010 (4BDF0B8A)
    fffff880`052cb000 fffff880`052d8000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02d95000 fffff880`02dab000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02dba000 fffff880`02dd5000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`03bee000 fffff880`03bfe000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e00000 fffff880`00ea4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ea4000 fffff880`00eb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02c93000 fffff880`02c9c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00040000 fffff960`00352000   win32k   win32k.sys   unavailable (00000000)
    fffff880`03c38000 fffff880`03c41000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00eb3000 fffff880`00ebc000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`06fca000 fffff880`06feb000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`08572000 fffff880`085e3000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0145a000 fffff880`01468000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`03a52000 fffff880`03b6e000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0011C000
    fffff880`03b6e000 fffff880`03b81000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. djsax

    djsax New Member

    Joined:
    May 13, 2011
    Messages:
    8
    Likes Received:
    0
    Hi cybercore :)) Thanks so much for the unbelieveable quick reply..

    I have uninstalled the 2 offenders, installed the MS security essentials and updated the drivers as you suggested..

    My question now is, I'm not running any external Firewall or Antivirus software on the OS.....is this ok or can you suggest some others that won't contribute towards a Blue Screen?

    Also, something else that is screaming for an answer is, why is it that Avira and Zone Alarm cause these problems when they are both supposed to be 64 bit compliant on 7?

    If there is another forum that deals with these questions, sorry for posting the questions here...

    So cybercore, thanks again and I'll monitor what happens with the laptop and report back if anything changes..

    All the best
    DJ
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

    Avira is not a good idea alongside ZoneAlarm, more than one real-time protection systems are a frequent causer of UNEXPECTED_KERNEL_MODE_TRAP error - your crash dumps are all about this error with nt!KiDoubleFaultAbort. Microsoft Security Essentials does not cause blue screens and is always recommended whenever the causer is not completely clear.
     
  5. djsax

    djsax New Member

    Joined:
    May 13, 2011
    Messages:
    8
    Likes Received:
    0
    Just a quick update to cybercore..My notebook hasn't crashed once since I took your advice. Very stable, very happy thanks very much for the help. :)
     
  6. Captain Jack

    Captain Jack Extraordinary Member

    Joined:
    Mar 6, 2010
    Messages:
    1,952
    Likes Received:
    139
    Thanks for the update.
     
  7. BEASTFlo

    BEASTFlo New Member

    Joined:
    Apr 13, 2012
    Messages:
    2
    Likes Received:
    0
    Hi all,

    I have the same problems with the Elitebook 8540p. When playing movies or sometimes Flash, my laptop is crashing (my laptop doesn't respond, hard reboot needed). The problem always occurs when im playing movies and sometimes I get BlueScreen.

    I have attached my last error file dump :

    When I connect a projector (VGA connector, Samsung LCD display, 17"), I don't get theses crashes (I also don't get crashes in Ubuntu distribution).

    I have this problem since 6months and any help would be really appreciated.


    For information, my antivirus is BitDefender Internet Security 2012, and it is up to date.


    Ps: Sorry for my English, Im French.


    Thanks in advance!
     

Share This Page

Loading...