Win 7 Pro x64 SYSTEM_SERVICE_EXCEPTION (ntoskrnl.exe)

Joined
Apr 15, 2011
Messages
2
Reaction score
0
Hello!

I would like to ask your help in finding the cause of BSODs I'm experiencing.

From time to time I get SYSTEM_SERVICE_EXCEPTION screen without clear reason. However as I have observed it almost always is related to sound output (music, games, win sounds and etc.). The second argument on sound problems is that I frequently get "The Audio Service is not running." message on task-bar (volume mixer near the clock), especially when navigating in file system ("click"-like sound). I have configured 5.1 sound output. I believe I have latest VIA audio drivers installed (updated them recently).

BlueScreenView utility shows ntoskrnl.exe file in every minidump record.
I would be grateful if someone could "read" my dumps and clarify at least the dirrection where to look for the cause of the BSODs.

The specs of my hardware are in profile. The minidump files and CPU-Z screens are in attachments.

Thanks!
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Some hardware issue here, likely bad RAM, faulty motherboard, or might be some setting in the bios.


1. Attach Passmark RAMMon HTML report
2. CPUZ CPU tab
3. Run 10 passes of www.memtest.org

Also,

4. Uninstall Comodo
5. Uninstall Daemon Tools
6. Try to update these two drivers:

Atheros LAN
L1C62x64.sys Wed Apr 01 01:09:17 2009

Realtek RTL8187 Wireless USB 2.0 Adapter
rtl8187.sys Wed Dec 09 04:16:39 2009



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040211-16239-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Apr  2 14:04:46.141 2011 (UTC - 4:00)
System Uptime: 0 days 11:33:28.105
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff880043b6507, fffff880071abc30, 0}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880043b6507, Address of the instruction which caused the bugcheck
Arg3: fffff880071abc30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`043b6507 488908          mov     qword ptr [rax],rcx

CONTEXT:  fffff880071abc30 -- (.cxr 0xfffff880071abc30)
rax=fffdf8a00878e2c8 rbx=fffffa80041fa010 rcx=fffff8a00878e2c8
rdx=fffffa80061f5000 rsi=fffff8a003cfd9b0 rdi=fffffa80061b3000
rip=fffff880043b6507 rsp=fffff880071ac610 rbp=0000000000000001
 r8=fffffa80061b43e0  r9=0000000000000001 r10=0000000000000038
r11=fffff880071ac5e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff8a00ac33120
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f:
fffff880`043b6507 488908          mov     qword ptr [rax],rcx ds:002b:fffdf8a0`0878e2c8=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880043b6507

STACK_TEXT:  
fffff880`071ac610 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f


FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`043b6507 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799c1

STACK_COMMAND:  .cxr 0xfffff880071abc30 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f

BUCKET_ID:  X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041311-16255-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`0305be90
Debug session time: Tue Apr 12 16:12:09.501 2011 (UTC - 4:00)
System Uptime: 0 days 13:10:12.374
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff800031acb20, fffff88003397928, fffff88003397180}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800031acb20, The address that the exception occurred at
Arg3: fffff88003397928, Exception Record Address
Arg4: fffff88003397180, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`031acb20 8b4610          mov     eax,dword ptr [rsi+10h]

EXCEPTION_RECORD:  fffff88003397928 -- (.exr 0xfffff88003397928)
ExceptionAddress: fffff800031acb20 (nt!ObDereferenceSecurityDescriptor+0x0000000000000020)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88003397180 -- (.cxr 0xfffff88003397180)
rax=fffff88003397b88 rbx=0000000000000000 rcx=fffdf8a00b3c9750
rdx=000000000000000e rsi=fffdf8a00b3c9730 rdi=0000000000000000
rip=fffff800031acb20 rsp=fffff88003397b60 rbp=fffffa8003ff2060
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=000000000000000e r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`031acb20 8b4610          mov     eax,dword ptr [rsi+10h] ds:002b:fffdf8a0`0b3c9740=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c70e8
 ffffffffffffffff 

FOLLOWUP_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`031acb20 8b4610          mov     eax,dword ptr [rsi+10h]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80003180698 to fffff800031acb20

STACK_TEXT:  
fffff880`03397b60 fffff800`03180698 : 00000000`00000000 fffffa80`03ff2060 fffffa80`03973af0 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`03397b90 fffff800`0316b4c8 : fffffa80`03ff2030 fffffa80`03ff2060 fffffa80`03973af0 00000000`00000000 : nt!SeDefaultObjectMethod+0xa8
fffff880`03397be0 fffff800`02e82a93 : 00000000`00000000 00000000`00000000 fffffa80`03ff2060 00000000`00000001 : nt!ObpRemoveObjectRoutine+0xac
fffff880`03397c40 fffff800`02e7634d : 00000000`00000000 fffffa80`03ac4b60 fffffa80`03ff23f0 fffffa80`03ac4b60 : nt!ObfDereferenceObjectWithTag+0x93
fffff880`03397c80 fffff800`02ea0a21 : fffff800`02e762b4 fffff800`030336b0 fffffa80`03ac4b60 00000000`00000000 : nt!PspReaper+0x99
fffff880`03397cb0 fffff800`03133cce : 00000000`00000000 fffffa80`03ac4b60 00000000`00000080 fffffa80`039d4040 : nt!ExpWorkerThread+0x111
fffff880`03397d40 fffff800`02e87fe6 : fffff880`03287180 fffffa80`03ac4b60 fffff880`03292040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03397d80 00000000`00000000 : fffff880`03398000 fffff880`03392000 fffff880`033979e0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObDereferenceSecurityDescriptor+20

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88003397180 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_nt!ObDereferenceSecurityDescriptor+20

BUCKET_ID:  X64_0x7E_nt!ObDereferenceSecurityDescriptor+20

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041011-21262-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e18000 PsLoadedModuleList = 0xfffff800`0305de90
Debug session time: Sun Apr 10 08:00:38.133 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:33.005
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8800194cab6, fffff8800635cb40, 0}

Probably caused by : tcpip.sys ( tcpip!IpGetAllSubInterfaceParameters+1d6 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800194cab6, Address of the instruction which caused the bugcheck
Arg3: fffff8800635cb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
tcpip!IpGetAllSubInterfaceParameters+1d6
fffff880`0194cab6 488b5018        mov     rdx,qword ptr [rax+18h]

CONTEXT:  fffff8800635cb40 -- (.cxr 0xfffff8800635cb40)
rax=fffdfa800485eaa0 rbx=0000000000000005 rcx=fffff8800635d540
rdx=0000000000000000 rsi=fffffa80067a8b40 rdi=fffff8800635d670
rip=fffff8800194cab6 rsp=fffff8800635d520 rbp=fffffa8003c004c8
 r8=00000000fc01020a  r9=fffffa80067f2010 r10=0000000000000000
r11=fffff8800635d4f0 r12=0000000000000006 r13=ffffffffffffffff
r14=fffff88001a2e800 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
tcpip!IpGetAllSubInterfaceParameters+0x1d6:
fffff880`0194cab6 488b5018        mov     rdx,qword ptr [rax+18h] ds:002b:fffdfa80`0485eab8=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8800194cab6

STACK_TEXT:  
fffff880`0635d520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IpGetAllSubInterfaceParameters+0x1d6


FOLLOWUP_IP: 
tcpip!IpGetAllSubInterfaceParameters+1d6
fffff880`0194cab6 488b5018        mov     rdx,qword ptr [rax+18h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  tcpip!IpGetAllSubInterfaceParameters+1d6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79420

STACK_COMMAND:  .cxr 0xfffff8800635cb40 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_tcpip!IpGetAllSubInterfaceParameters+1d6

BUCKET_ID:  X64_0x3B_tcpip!IpGetAllSubInterfaceParameters+1d6

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041511-17316-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e54000 PsLoadedModuleList = 0xfffff800`03099e90
Debug session time: Fri Apr 15 14:25:49.413 2011 (UTC - 4:00)
System Uptime: 0 days 11:17:40.646
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800031eab20, fffff88009167080, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031eab20, Address of the instruction which caused the bugcheck
Arg3: fffff88009167080, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`031eab20 8b4610          mov     eax,dword ptr [rsi+10h]

CONTEXT:  fffff88009167080 -- (.cxr 0xfffff88009167080)
rax=fffff88009167a88 rbx=0000000000000000 rcx=fffdf8a00956b760
rdx=000000000000000e rsi=fffdf8a00956b740 rdi=0000000000000000
rip=fffff800031eab20 rsp=fffff88009167a60 rbp=fffffa800716a060
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff88009167b38 r12=000000000000000e r13=fffffa800745c340
r14=000000000009e500 r15=fffff8a003cb84d0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`031eab20 8b4610          mov     eax,dword ptr [rsi+10h] ds:002b:fffdf8a0`0956b750=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800031be698 to fffff800031eab20

STACK_TEXT:  
fffff880`09167a60 fffff800`031be698 : 00000000`00000000 fffffa80`0716a060 fffffa80`03973af0 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`09167a90 fffff800`02ede54e : 00000000`00000000 fffffa80`0745c340 fffffa80`03973af0 00000000`0009da90 : nt!SeDefaultObjectMethod+0xa8
fffff880`09167ae0 fffff800`031cb484 : fffffa80`0745c340 00000000`00000000 fffffa80`0478bb60 00000000`00000000 : nt!ObfDereferenceObject+0x10e
fffff880`09167b40 fffff800`031cba34 : 00000000`000028b0 fffffa80`0745c340 fffff8a0`03cb84d0 00000000`000028b0 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`09167bd0 fffff800`02ed38d3 : fffffa80`0478bb60 fffff880`09167ca0 00000000`7efdb000 fffffa80`0716a060 : nt!ObpCloseHandle+0x94
fffff880`09167c20 00000000`76f1140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0009dbd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f1140a


FOLLOWUP_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`031eab20 8b4610          mov     eax,dword ptr [rsi+10h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObDereferenceSecurityDescriptor+20

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88009167080 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+20

BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+20

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00f8d000 fffff880`00fe4000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`02e18000 fffff880`02ea1000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`11200000 fffff880`11216000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`11f93000 fffff880`11fdb000   ain55r8k ain55r8k.SYS Sun Nov 28 05:38:44 2010 (4CF23134)
fffff880`047c4000 fffff880`047d9000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`011f4000 fffff880`011ff000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`03fea000 fffff880`03ff2000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`04798000 fffff880`0479e000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`06b27000 fffff880`06b32000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`01047000 fffff880`01050000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d65000 fffff880`00d8f000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`01880000 fffff880`01888000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff960`00810000 fffff960`00871000   ATMFD    ATMFD.DLL    Sat Feb 19 04:00:32 2011 (4D5F86B0)
fffff880`018cf000 fffff880`018d6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04787000 fffff880`04798000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`063c9000 fffff880`063e7000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`017b2000 fffff880`017dc000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00d07000 fffff880`00d65000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`018be000 fffff880`018c6000   cmderd   cmderd.sys   Wed Jan 05 12:09:44 2011 (4D24A5D8)
fffff880`0156e000 fffff880`015b0000   cmdguard cmdguard.sys Wed Jan 05 12:10:43 2011 (4D24A613)
fffff880`015f0000 fffff880`015fc000   cmdhlp   cmdhlp.sys   Wed Jan 05 12:09:59 2011 (4D24A5E7)
fffff880`014e1000 fffff880`01553000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`11fe4000 fffff880`11ff4000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`0537a000 fffff880`05388000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`046e6000 fffff880`04769000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`04769000 fffff880`04787000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`02feb000 fffff880`02ffa000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183a000 fffff880`01850000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`052b4000 fffff880`052d6000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0540d000 fffff880`05416000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05388000 fffff880`05394000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05394000 fffff880`053a7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`053a7000 fffff880`053b3000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ee5000 fffff880`03fd9000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`03e00000 fffff880`03e46000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`00ddb000 fffff880`00def000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00d8f000 fffff880`00ddb000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01564000 fffff880`0156e000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01ae2000 fffff880`01b2c000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`02e0b000 fffff800`02e54000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03e46000 fffff880`03e6a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`052dc000 fffff880`052f5000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`055f7000 fffff880`055ff080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`055e9000 fffff880`055f7000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06300000 fffff880`063c9000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01bdc000 fffff880`01be5000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`11f66000 fffff880`11f84000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02f2b000 fffff880`02f43000   inspect  inspect.sys  Wed Jan 05 12:09:49 2011 (4D24A5DD)
fffff880`11f84000 fffff880`11f93000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bad000 fffff800`00bb7000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`04629000 fffff880`0466c000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`014c6000 fffff880`014e1000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01787000 fffff880`017b2000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`052d6000 fffff880`052db200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03e6a000 fffff880`03e7c000   L1C62x64 L1C62x64.sys Wed Apr 01 01:09:17 2009 (49D2F6FD)
fffff880`05221000 fffff880`05236000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`053c1000 fffff880`053e4000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce6000 fffff880`00cf3000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`053b3000 fffff880`053c1000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`112d6000 fffff880`112e5000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0536d000 fffff880`0537a000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e81000 fffff880`00e9b000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`063e7000 fffff880`063ff000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06200000 fffff880`0622d000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`0622d000 fffff880`0627a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`05236000 fffff880`0525a000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`01625000 fffff880`01630000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011ea000 fffff880`011f4000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01468000 fffff880`014c6000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`02fe0000 fffff880`02feb000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01bca000 fffff880`01bdc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01634000 fffff880`01727000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`1123a000 fffff880`11246000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`062d5000 fffff880`062e8000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`11246000 fffff880`11275000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`047d9000 fffff880`047ee000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02f43000 fffff880`02f52000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ea1000 fffff880`02ee6000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01727000 fffff880`01787000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`015b0000 fffff880`015c1000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02fd4000 fffff880`02fe0000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e54000 fffff800`0343e000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`0122f000 fffff880`013d2000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`018c6000 fffff880`018cf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`11f47000 fffff880`11f48180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`013d2000 fffff880`013fb000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`112ec000 fffff880`11f46d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`06282000 fffff880`062d5000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02eef000 fffff880`02f15000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`11f49000 fffff880`11f66000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fe4000 fffff880`00ff9000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`0100d000 fffff880`01040000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`01040000 fffff880`01047000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e71000 fffff880`00e81000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01553000 fffff880`01564000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0682f000 fffff880`068d5000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05277000 fffff880`052b4000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf3000 fffff880`00d07000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`11216000 fffff880`1123a000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`11275000 fffff880`11290000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`11290000 fffff880`112b1000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`112b1000 fffff880`112cb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`01400000 fffff880`01451000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`112cb000 fffff880`112d6000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01bf3000 fffff880`01bfc000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`017ec000 fffff880`017f5000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`017f5000 fffff880`017fe000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01b90000 fffff880`01bca000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`062e8000 fffff880`06300000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`052f5000 fffff880`0536d000   rtl8187  rtl8187.sys  Wed Dec 09 04:16:39 2009 (4B1F6AF7)
fffff880`011bb000 fffff880`011ea000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`068d5000 fffff880`068e0000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03ff2000 fffff880`03ffe000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02f52000 fffff880`02f6f000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01b88000 fffff880`01b90000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01050000 fffff880`011b2000   sptd     sptd.sys     Tue Nov 23 06:47:37 2010 (4CEBA9D9)
fffff880`06a1e000 fffff880`06ab6000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`06923000 fffff880`0698d000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`068e0000 fffff880`06911000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`03ffe000 fffff880`03fff480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`018de000 fffff880`01ae2000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`06911000 fffff880`06923000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`015e3000 fffff880`015f0000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`015c1000 fffff880`015e3000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`02fc0000 fffff880`02fd4000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`004d0000 fffff960`004da000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`0479e000 fffff880`047c4000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`06b4d000 fffff880`06ba2000   udfs     udfs.sys     Sat Nov 20 04:26:11 2010 (4CE79433)
fffff880`0466c000 fffff880`0467e000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`055e7000 fffff880`055e8f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fd9000 fffff880`03fea000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0467e000 fffff880`046d8000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`03e7c000 fffff880`03e87000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e87000 fffff880`03edd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`055db000 fffff880`055e7000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`02f8a000 fffff880`02fbfa80   VBoxDrv  VBoxDrv.sys  Thu Feb 17 11:21:07 2011 (4D5D4AF3)
fffff880`04600000 fffff880`04628d00   VBoxNetFlt VBoxNetFlt.sys Thu Feb 17 11:21:06 2011 (4D5D4AF2)
fffff880`01000000 fffff880`0100d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01be5000 fffff880`01bf3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`05418000 fffff880`055db000   viahduaa viahduaa.sys Tue Sep 28 05:53:08 2010 (4CA1BB04)
fffff880`01600000 fffff880`01625000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e9b000 fffff880`00ed7000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01b2c000 fffff880`01b3c000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01b3c000 fffff880`01b88000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`05400000 fffff880`0540d000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02f15000 fffff880`02f2b000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02f6f000 fffff880`02f8a000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`017dc000 fffff880`017ec000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eda000 fffff880`00f7e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f7e000 fffff880`00f8d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ee6000 fffff880`02eef000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003c2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00cc0000 fffff880`00cd4000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`11fdb000 fffff880`11fe4000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`011b2000 fffff880`011bb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05200000 fffff880`05221000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`06b32000 fffff880`06b4d000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`06ab6000 fffff880`06b27000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01888000 fffff880`01896000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01896000 fffff880`018a2000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018a2000 fffff880`018ab000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018ab000 fffff880`018be000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Apr 15, 2011
Messages
2
Reaction score
0
Thank you for information!

Passmark RAMMon and CPU tab are in attachements, as you requested. I'm using ASUS EPU-4 Engine utility, it reduces CPU multiplier when idle. Under the load it goes up to x15.

Memtest reported no errors.

4. Uninstall Comodo
5. Uninstall Daemon Tools
Yes, these two conflict with each other a lot. :) I had to put Daemon drivers to ignored files in order to get it working.

I also will try to update LAN and WiFi drivers.

Hope your advices will help. I will report the results.
 

Attachments

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top