1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Hourly spontaneous reboots

Discussion in 'Windows XP' started by MetalMan, 2008/02/13.

  1. 2008/02/13
    MetalMan

    MetalMan Inactive Thread Starter

    Joined:
    2008/02/13
    Messages:
    2
    Likes Received:
    0
    Although this may be a hardware issue, the symptoms seem to be software related.

    For the second time in two weeks arrived at work to find my computer had rebooted during the night (machine is left running to receive faxes). Event Viewer log shows 3:56am as the first instance and repeating every hour (w/in 60 seconds). No alerts are listed before the reboot. No BOSDs. No OS messages upon reboot.

    Two weeks ago I performed all of the hardware tests, HDD, memory, installed a temp and voltage monitoring program. Device Manager shows no problems. Found info w/ Google search about "Haxdoor" virus, found none of its files on HDD (do have virus protection).

    Anyone have advice?
    thanks
     
  2. 2008/02/15
    mailman Lifetime Subscription

    mailman Geek Member

    Joined:
    2004/01/17
    Messages:
    1,901
    Likes Received:
    11
    Hi, MetalMan. Welcome to Windows BBS! :)

    Do you have any scheduled tasks that are scheduled to run around that time?
    • Click Start > All Programs > Accessories > System Tools > Scheduled Tasks

    • Specifically what virus protection?
      • Do you have more than one anti-virus application installed?
      • Do you have two or more anti-virus applications running resident in memory ( "real-time ", "guard ", "watch ", or similar protection) at the same time?

    Perhaps you are having system crashes but your computer is configured to automatically reboot instead of displaying a BSOD for a system crash.

    Do you have any .DMP files listed in any of the following locations that are time-stamped during the early morning hours (around 3:56AM, for example)? In Windows Explorer, hover you mouse cursor over the file name to view the date/time-stamp of the file.
    • C:\MEMORY.DMP
    • C:\WINDOWS\MEMORY.DMP
    • C:\WINDOWS\Minidump\Minixxxxxx-yy.dmp
    When browsing the C:\WINDOWS\Minidump\ folder, look for dump files that are named as follows.

    EDIT: Please carefully follow all the instructions in this link. Then paste a few of your most recent DebugWiz-generated BSOD dump log analysis reports in this thread.

    The DebugWiz application should be run while connected to the Internet so your Windows Debugging Tools can retrieve the proper "symbols ". The additional information the DebugWiz-generated reports provide might help us identify the culprit more quickly.

    NOTE:
     
    Last edited: 2008/02/15

  3. to hide this advert.

  4. 2008/02/15
    MetalMan

    MetalMan Inactive Thread Starter

    Joined:
    2008/02/13
    Messages:
    2
    Likes Received:
    0
    Thanks for your time mailman.

    No scheduled tasks.

    CA anti-virus/spyware

    System Failure is set to: "Write an event to system log "
    "Send admin. alert "
    not: "Auto. restart

    No .DMP files associated with these reboots.

    One thing common to both events, I ran chkdsk from Windows on the first occasion and on the second there was a Windows Update install both required a cold boot. Following the cold boot the spontaneous reboots stopped.

    With only a few exceptions the software configuration of this machine is identical to another one built at the same time for the company owner and except for peripherals, hardware is identical.
     
  5. 2008/02/15
    mailman Lifetime Subscription

    mailman Geek Member

    Joined:
    2004/01/17
    Messages:
    1,901
    Likes Received:
    11
    You're welcome. :) Thanks for your feedback.
    Are you saying your issue is now resolved?
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.