Windows 7 BSOD Assistance

csaapproved

New Member
Joined
Apr 14, 2011
Periodic blue screens occurring. Most seem to occur when the machine has been left on for several hours (idling for the most part).

Windows 7 64 bit O/S. Athlon III 3.1 CPU. I believe that I have attached the requisite information, but if not, just let me know.

Thanks.
Fabio
CPUZMemory.PNG
CPUZSPD3.PNGCPUZSPD1.PNGCPUZSPD4.PNGCPUZSPD2.PNG
View attachment RAMMon - SPD Info.txt
View attachment Seven Forums.zip
 
You got a typical memory error:


040811-10077-01.dmp
BugCheck 50, {ffffe8a0002a9024, 1, fffff880012bd043, 7}
PROCESS_NAME: System
FAULTING_IP:
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff lock add dword ptr [rcx+24h],0FFFFFFFFh
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteFcb+233 )

040111-10389-01.dmp
BugCheck 50, {ffffe8a0100f0960, 0, fffff80002ffab13, 7}
PROCESS_NAME: System
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e8 ffffe8a0100f0960
Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+257 )

041411-10140-01.dmp
BugCheck 50, {ffffe8a000231050, 0, fffff880012a8f17, 7}
PROCESS_NAME: rundll32.exe
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030cb0e8 ffffe8a000231050
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsOpenExistingPrefixFcb+67 )


Your blue screens come from mismatched memory sticks:

2 Patriots 1600Mhz 9-9-9-24
2 Kingstons 1333Mhz 9-9-9-24

You could try 1333Mhz 9-9-9-24, but if blue screens reoccur then remove the Kingston sticks from slots 1 & 2, and set the Patriots to their rated specs 1600Mhz 9-9-9-24.


It's a good idea to update Cisco anyway:

Citrix Deterministic Network Enhancer Miniport or Cisco Systems VPN Client
dne64x.sys Mon Nov 10 20:01:24 2008
Cisco Systems, Inc


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040811-10077-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e12000 PsLoadedModuleList = 0xfffff800`03057e90
Debug session time: Fri Apr  8 01:11:09.426 2011 (UTC - 4:00)
System Uptime: 0 days 4:26:55.862
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a0002a9024, 1, fffff880012bd043, 7}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteFcb+233 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a0002a9024, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880012bd043, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c30e8
 ffffe8a0002a9024 

FAULTING_IP: 
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff      lock add dword ptr [rcx+24h],0FFFFFFFFh

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800334d7d0 -- (.trap 0xfffff8800334d7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a003e8b010 rbx=0000000000000000 rcx=ffffe8a0002a9000
rdx=0000000000000723 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012bd043 rsp=fffff8800334d960 rbp=fffff8000302f600
 r8=fffff8a003e8b010  r9=0000000000000000 r10=fffffa800a18f420
r11=fffff8a003e8b010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
Ntfs!NtfsDeleteFcb+0x233:
fffff880`012bd043 f0834124ff      lock add dword ptr [rcx+24h],0FFFFFFFFh ds:c180:ffffe8a0`002a9024=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e3cbf7 to fffff80002e92640

STACK_TEXT:  
fffff880`0334d668 fffff800`02e3cbf7 : 00000000`00000050 ffffe8a0`002a9024 00000000`00000001 fffff880`0334d7d0 : nt!KeBugCheckEx
fffff880`0334d670 fffff800`02e9076e : 00000000`00000001 ffffe8a0`002a9024 fffffa80`09c10100 fffff880`0334d9f0 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`0334d7d0 fffff880`012bd043 : fffff880`0334d9f0 fffff880`0334db01 fffffa80`0a18f370 fffffa80`0a18f370 : nt!KiPageFault+0x16e
fffff880`0334d960 fffff880`01239972 : fffff800`0302f600 fffff880`0334db01 fffff880`0334d9e1 fffff8a0`04006670 : Ntfs!NtfsDeleteFcb+0x233
fffff880`0334d9c0 fffff880`012bf63c : fffffa80`0a18f370 fffffa80`0a11c180 fffff8a0`04006670 fffff8a0`04006a08 : Ntfs!NtfsTeardownFromLcb+0x1e2
fffff880`0334da50 fffff880`012410e2 : fffffa80`0a18f370 fffffa80`0a18f370 fffff8a0`04006670 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xcc
fffff880`0334dad0 fffff880`012cf193 : fffffa80`0a18f370 fffff800`0302f600 fffff8a0`04006670 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
fffff880`0334db10 fffff880`012be357 : fffffa80`0a18f370 fffff8a0`040067a0 fffff8a0`04006670 fffffa80`0a11c180 : Ntfs!NtfsCommonClose+0x353
fffff880`0334dbe0 fffff800`02e9ca21 : 00000000`00000000 fffff800`0302f600 fffffa80`09a4f601 00000000`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`0334dcb0 fffff800`0312fcce : 00000000`00000000 fffffa80`09a4f680 00000000`00000080 fffffa80`09a3c5f0 : nt!ExpWorkerThread+0x111
fffff880`0334dd40 fffff800`02e83fe6 : fffff880`03164180 fffffa80`09a4f680 fffff880`0316ef80 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0334dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff      lock add dword ptr [rcx+24h],0FFFFFFFFh

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Ntfs!NtfsDeleteFcb+233

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsDeleteFcb+233

BUCKET_ID:  X64_0x50_Ntfs!NtfsDeleteFcb+233

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040111-10389-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`03093e90
Debug session time: Fri Apr  1 07:49:44.880 2011 (UTC - 4:00)
System Uptime: 0 days 11:02:00.300
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a0100f0960, 0, fffff80002ffab13, 7}


Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+257 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a0100f0960, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ffab13, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e8
 ffffe8a0100f0960 

FAULTING_IP: 
nt!ExDeferredFreePool+257
fffff800`02ffab13 4c3918          cmp     qword ptr [rax],r11

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880057c1840 -- (.trap 0xfffff880057c1840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe8a0100f0960 rbx=0000000000000000 rcx=fffffa80099ca3c0
rdx=fffff8a0141d9000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ffab13 rsp=fffff880057c19d0 rbp=0000000000000000
 r8=fffff8a009127a20  r9=fffff8a0141d9100 r10=0000000000000001
r11=fffff8a0141d9110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExDeferredFreePool+0x257:
fffff800`02ffab13 4c3918          cmp     qword ptr [rax],r11 ds:e170:ffffe8a0`100f0960=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e78bf7 to fffff80002ece640

STACK_TEXT:  
fffff880`057c16d8 fffff800`02e78bf7 : 00000000`00000050 ffffe8a0`100f0960 00000000`00000000 fffff880`057c1840 : nt!KeBugCheckEx
fffff880`057c16e0 fffff800`02ecc76e : 00000000`00000000 ffffe8a0`100f0960 00000000`00000700 00000000`00000003 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`057c1840 fffff800`02ffab13 : fffff880`057c19e1 fffff8a0`041d8010 00000000`01010000 00000000`0c63e100 : nt!KiPageFault+0x16e
fffff880`057c19d0 fffff800`02ffa1a1 : fffff8a0`041d8010 fffff8a0`1555fb30 fffffa80`0c63e170 fffff880`012469f4 : nt!ExDeferredFreePool+0x257
fffff880`057c1a60 fffff880`012d627a : fffffa80`0a13b180 fffff800`0306b600 fffff8a0`6446744e 00000000`00000009 : nt!ExFreePoolWithTag+0x411
fffff880`057c1b10 fffff880`012c5357 : fffffa80`0b503890 fffff8a0`0f656480 fffff8a0`0f656350 fffffa80`0a13b180 : Ntfs!NtfsCommonClose+0x43a
fffff880`057c1be0 fffff800`02ed8a21 : 00000000`00000000 fffff800`031c4f00 fffff800`030cd101 00000000`00000003 : Ntfs!NtfsFspClose+0x15f
fffff880`057c1cb0 fffff800`0316bcce : 00000000`00000001 fffffa80`0ccbb040 00000000`00000080 fffffa80`09a3c6f0 : nt!ExpWorkerThread+0x111
fffff880`057c1d40 fffff800`02ebffe6 : fffff880`009e6180 fffffa80`0ccbb040 fffffa80`0b732b60 00000000`00000246 : nt!PspSystemThreadStartup+0x5a
fffff880`057c1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+257
fffff800`02ffab13 4c3918          cmp     qword ptr [rax],r11

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ExDeferredFreePool+257

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+257

BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+257

Followup: Pool_corruption
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041411-10140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1a000 PsLoadedModuleList = 0xfffff800`0305fe90
Debug session time: Thu Apr 14 00:30:01.941 2011 (UTC - 4:00)
System Uptime: 0 days 16:52:33.424
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a000231050, 0, fffff880012a8f17, 7}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsOpenExistingPrefixFcb+67 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a000231050, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012a8f17, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030cb0e8
 ffffe8a000231050 

FAULTING_IP: 
Ntfs!NtfsOpenExistingPrefixFcb+67
fffff880`012a8f17 488b4a50        mov     rcx,qword ptr [rdx+50h]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  rundll32.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88009087da0 -- (.trap 0xfffff88009087da0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00ddde010 rbx=0000000000000000 rcx=fffffa800b409e40
rdx=ffffe8a000231000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012a8f17 rsp=fffff88009087f30 rbp=0000000000000000
 r8=fffff8a00ddde450  r9=0000000000000000 r10=fffffa800b409e40
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!NtfsOpenExistingPrefixFcb+0x67:
fffff880`012a8f17 488b4a50        mov     rcx,qword ptr [rdx+50h] ds:81f0:ffffe8a0`00231050=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e44bf7 to fffff80002e9a640

STACK_TEXT:  
fffff880`09087c38 fffff800`02e44bf7 : 00000000`00000050 ffffe8a0`00231050 00000000`00000000 fffff880`09087da0 : nt!KeBugCheckEx
fffff880`09087c40 fffff800`02e9876e : 00000000`00000000 ffffe8a0`00231050 00000000`00000000 fffff8a0`0ddde450 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`09087da0 fffff880`012a8f17 : 00000008`00000010 00000000`00000000 00000000`03060000 fffff880`09087f48 : nt!KiPageFault+0x16e
fffff880`09087f30 fffff880`012b9166 : fffffa80`0b409e40 fffffa80`0b4b9010 fffff8a0`0ddde450 fffffa80`0bdc5101 : Ntfs!NtfsOpenExistingPrefixFcb+0x67
fffff880`09088020 fffff880`012b6911 : fffffa80`0b409e40 fffffa80`0b4b9010 fffff880`090881f0 fffff880`09088240 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`090880f0 fffff880`0121fa3d : fffffa80`0b409e40 fffffa80`0b4b9010 fffff880`090884a0 fffff880`01134b00 : Ntfs!NtfsCommonCreate+0x3e1
fffff880`090882d0 fffff800`02ea7078 : fffff880`09088410 00000000`00000001 00000000`00000001 00000000`00000001 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`09088300 fffff880`012201bf : fffff880`0121fa20 fffff880`0121f020 fffff880`09088400 fffff880`012c0f00 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`090883e0 fffff880`012b999c : 00000000`00000000 00000000`00000000 fffff880`09088640 fffffa80`0b4b9010 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`09088440 fffff880`01125bcf : fffffa80`0a137030 fffffa80`0b4b9010 00000000`00000000 fffffa80`0a2b6de0 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`090885f0 fffff880`011452b9 : fffffa80`0b4b9010 fffffa80`0a2b65a0 fffffa80`0b4b9000 fffffa80`0a2b6de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09088680 fffff800`03198495 : 00000000`00000005 fffffa80`0bf92cc8 fffffa80`0c1ca010 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`09088730 fffff800`03194d38 : fffffa80`0a13e5f0 fffff800`00000000 fffffa80`0bf92b10 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`090888c0 fffff800`03195f56 : 00000000`00000000 fffffa80`0bf92b10 fffff700`01080000 fffffa80`09a55de0 : nt!ObpLookupObjectName+0x588
fffff880`090889b0 fffff800`0319785c : 00000000`0027bc34 00000000`00000000 00000000`00000001 fffff880`09088ca0 : nt!ObOpenObjectByName+0x306
fffff880`09088a80 fffff800`03183134 : 00000000`0027b5e0 fffff880`00100001 00000000`0027b5f8 00000000`0027b628 : nt!IopCreateFile+0x2bc
fffff880`09088b20 fffff800`02e998d3 : ffffffff`ffffffff 00000000`0027bc70 00000000`0027bbe0 00000980`00000004 : nt!NtOpenFile+0x58
fffff880`09088bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsOpenExistingPrefixFcb+67
fffff880`012a8f17 488b4a50        mov     rcx,qword ptr [rdx+50h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Ntfs!NtfsOpenExistingPrefixFcb+67

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsOpenExistingPrefixFcb+67

BUCKET_ID:  X64_0x50_Ntfs!NtfsOpenExistingPrefixFcb+67

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`03e00000 fffff880`03e3e000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00e38000 fffff880`00e8f000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`02c00000 fffff880`02c89000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`0364f000 fffff880`03665000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`037bf000 fffff880`037d4000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`010a1000 fffff880`010b5000   amdsata  amdsata.sys  Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`01118000 fffff880`01123000   amdxata  amdxata.sys  Wed Oct 07 16:13:10 2009 (4ACCF656)
fffff880`06bf1000 fffff880`06bfc000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fe9000 fffff880`00ff2000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`0480b000 fffff880`05132000   atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03600000 fffff880`0364f000   atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff880`019ab000 fffff880`019b3000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`02d04000 fffff880`02d0b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03788000 fffff880`03799000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06400000 fffff880`0641e000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`007d0000 fffff960`007f7000   cdd      cdd.dll      unavailable (00000000)
fffff880`0148b000 fffff880`014b5000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00d27000 fffff880`00de7000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`0197b000 fffff880`019ab000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00cc9000 fffff880`00d27000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`03fe2000 fffff880`03ff2000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`067e4000 fffff880`067ed000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`066bc000 fffff880`066ca000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`036e7000 fffff880`0376a000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`06a00000 fffff880`06a8d000   CVPNDRVA CVPNDRVA.sys Tue Feb 16 09:36:01 2010 (4B7AAD51)
fffff880`0376a000 fffff880`03788000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`036d8000 fffff880`036e7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01965000 fffff880`0197b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01072000 fffff880`0109e000   dne64x   dne64x.sys   Mon Nov 10 20:01:24 2008 (4918D964)
fffff880`060eb000 fffff880`0610d000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`066d4000 fffff880`066e8000   dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`066ca000 fffff880`066d4000   dump_diskdump dump_diskdump.sys Sat Nov 20 05:33:56 2010 (4CE7A414)
fffff880`066e8000 fffff880`066fb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`066b0000 fffff880`066bc000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e42000 fffff880`03f36000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`03f36000 fffff880`03f7c000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`0116f000 fffff880`01183000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01123000 fffff880`0116f000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`013e0000 fffff880`013ea000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0192b000 fffff880`01965000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`0180b000 fffff880`01855000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`03fa0000 fffff880`03fad000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03404000 fffff800`0344d000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03f7c000 fffff880`03fa0000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`06728000 fffff880`06741000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06741000 fffff880`06749080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0671a000 fffff880`06728000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06113000 fffff880`061dc000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01922000 fffff880`0192b000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04380000 fffff880`0438f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0674a000 fffff880`06758000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bb4000 fffff800`00bbe000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`043a0000 fffff880`043e3000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013b4000 fffff880`013cf000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`0610d000 fffff880`06112200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`067b7000 fffff880`067cc000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06773000 fffff880`06796000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ca8000 fffff880`00cb5000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06765000 fffff880`06773000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0438f000 fffff880`0439e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06758000 fffff880`06765000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00f7f000 fffff880`00f99000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`02cca000 fffff880`02cfb000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`06a8d000 fffff880`06a9d000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`0641e000 fffff880`06436000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06000000 fffff880`0602d000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`0602d000 fffff880`0607a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`06436000 fffff880`0645a000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`00e2a000 fffff880`00e35000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`02d69000 fffff880`02d74000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e98000 fffff880`00ea2000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01183000 fffff880`011e1000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`036cd000 fffff880`036d8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01910000 fffff880`01922000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014dd000 fffff880`015d0000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`042e4000 fffff880`042f0000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`042f0000 fffff880`0431f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0425a000 fffff880`0426f000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02cb8000 fffff880`02cc7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02db4000 fffff880`02df9000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`06a9d000 fffff880`06ab2000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`02d74000 fffff880`02d85000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`036c1000 fffff880`036cd000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e1a000 fffff800`03404000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01211000 fffff880`013b4000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`02cfb000 fffff880`02d04000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02c92000 fffff880`02cb8000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00ee2000 fffff880`00ef7000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00ea2000 fffff880`00ed5000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00f68000 fffff880`00f6f000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f6f000 fffff880`00f7f000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013cf000 fffff880`013e0000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`054f2000 fffff880`05598000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`060ae000 fffff880`060eb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cb5000 fffff880`00cc9000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`042c0000 fffff880`042e4000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`0431f000 fffff880`0433a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0433a000 fffff880`0435b000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`0435b000 fffff880`04375000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03670000 fffff880`036c1000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`04375000 fffff880`04380000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02d4e000 fffff880`02d57000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d57000 fffff880`02d60000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d60000 fffff880`02d69000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018d6000 fffff880`01910000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`067cc000 fffff880`067e4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05132000 fffff880`05199000   Rt64win7 Rt64win7.sys Thu Jan 13 06:57:19 2011 (4D2EE89F)
fffff880`0426f000 fffff880`042ab500   RtHDMIVX RtHDMIVX.sys Mon May 24 08:07:55 2010 (4BFA6C1B)
fffff880`0645c000 fffff880`066af700   RTKVHD64 RTKVHD64.sys Wed Jul 28 06:01:36 2010 (4C500000)
fffff880`018b9000 fffff880`018d6000   sbp2port sbp2port.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`05598000 fffff880`055a3000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03fd6000 fffff880`03fe2000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`014b5000 fffff880`014d2000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018b1000 fffff880`018b9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06ae8000 fffff880`06b80000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`05400000 fffff880`0546a000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`055a3000 fffff880`055d4000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`010b5000 fffff880`01118000   storport storport.sys Sat Nov 20 05:35:02 2010 (4CE7A456)
fffff880`0439e000 fffff880`0439f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01607000 fffff880`0180b000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`055d4000 fffff880`055e6000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`02da7000 fffff880`02db4000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`02d85000 fffff880`02da7000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`015eb000 fffff880`015ff000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03799000 fffff880`037bf000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`043e3000 fffff880`043f5000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`066fb000 fffff880`06718000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`06718000 fffff880`06719f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fc5000 fffff880`03fd6000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03fb8000 fffff880`03fc5000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`04200000 fffff880`0425a000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`03fad000 fffff880`03fb8000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05199000 fffff880`051ef000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00ed5000 fffff880`00ee2000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02d0b000 fffff880`02d19000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02d19000 fffff880`02d3e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f99000 fffff880`00fd5000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01855000 fffff880`01865000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00ef7000 fffff880`00f0c000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00f0c000 fffff880`00f68000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01865000 fffff880`018b1000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`015d0000 fffff880`015eb000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`02d3e000 fffff880`02d4e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de7000 fffff880`00df6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c89000 fffff880`02c92000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00fd5000 fffff880`00fe9000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`037d4000 fffff880`037dd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e8f000 fffff880`00e98000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06796000 fffff880`067b7000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`06b80000 fffff880`06bf1000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019b3000 fffff880`019c1000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019c1000 fffff880`019cb000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`019cb000 fffff880`019df000   dump_amdsata
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00014000
fffff880`019df000 fffff880`019f2000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Back
Top Bottom