Windows 7 BSOD help plz

WNxDeMoNiK

New Member
Hi for the last 2 months i have been dealing with a constant and ever changing BSOD, I have re-installed my OS 3 times now and i am still getting this problem, to try and resolve it myself i have used windbg, verifier done disk and memory checks but i'm certainly no pc tech. the pc is only 6 months old and when i ran the verifier for the last DMP result i got a Daemon tools prob but fixed this one myself, as for the rest i'm at a loss so any help would be much appreciated.

Steve.
 

Attachments

  • system info.PNG
    system info.PNG
    273.7 KB · Views: 370
  • rammon.PNG
    rammon.PNG
    168.8 KB · Views: 411
  • minidumps.zip
    267.2 KB · Views: 240
1. Disable Driver Verifier.

2. Your memory looks right, but the CPU should not be overclocked.
--> Disable Intel Turbo Boost.
--> Enable EIST.


3. Update drivers:

Logitech (WingMan)
LGBusEnum.sys Tue Nov 24 03:36:48 2009

Virtual Clone
VClone.sys Mon Aug 10 00:25:45 2009


4. One of your blue screens (the verifier enabled) was caused by Daemon Tools.

First of all disable the Turbo Boost feature in the bios, enable EIST, and update drivers. Then if crashes persist, uninstall Daemon Tools.




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\042711-27409-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03055000 PsLoadedModuleList = 0xfffff800`03292e50
Debug session time: Thu Apr 28 00:49:35.108 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:11.606
Loading Kernel Symbols
...............................................................
................................................
Loading User Symbols
Loading unloaded module list
..
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C9, {23e, fffff88002c2d308, fffff98002484ee0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\dtsoftbus01.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+1308 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000023e, A driver has marked an IRP pending but didn't return STATUS_PENDING.
Arg2: fffff88002c2d308, The address in the driver's code where the error was detected.
Arg3: fffff98002484ee0, IRP address.
Arg4: 0000000000000000, Status code.

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'ks' and 'WUDFRd.sys' overlap

BUGCHECK_STR:  0xc9_23e

DRIVER_VERIFIER_IO_VIOLATION_TYPE:  23e

FAULTING_IP: 
dtsoftbus01+1308
fffff880`02c2d308 4053            push    rbx

FOLLOWUP_IP: 
dtsoftbus01+1308
fffff880`02c2d308 4053            push    rbx

IRP_ADDRESS:  fffff98002484ee0

DEVICE_OBJECT: fffffa8005fc1c40

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  2

LOCK_ADDRESS:  fffff800032c9400 -- (!locks fffff800032c9400)

Resource @ nt!PiEngineLock (0xfffff800032c9400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff800032c9400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff800035503dc to fffff800030c5740

STACK_TEXT:  
fffff880`031c39a8 fffff800`035503dc : 00000000`000000c9 00000000`0000023e fffff880`02c2d308 fffff980`02484ee0 : nt!KeBugCheckEx
fffff880`031c39b0 fffff800`0355a47a : fffff800`0354e9f0 fffff880`02c2d308 fffff980`02484ee0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`031c39f0 fffff800`0355b34e : 00000000`0000023e 00000000`00000000 fffff980`02484ee0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`031c3a40 fffff800`0356671f : fffffa80`063cd130 fffffa80`062e81e0 fffffa80`062e8298 fffff880`02c30dbc : nt!VfErrorReport6+0x6e
fffff880`031c3b10 fffff800`03566b63 : fffffa80`062e81e0 00000000`00000002 fffffa80`05fc1c40 fffff880`02c2d3d8 : nt!IovpCallDriver2+0x13f
fffff880`031c3b70 fffff800`0356cc2e : fffff980`02484ee0 fffff980`02484ee0 00000000`00000002 fffffa80`05fc1c40 : nt!VfAfterCallDriver+0x353
fffff880`031c3bc0 fffff880`00ef70c2 : fffff880`00f707c0 fffffa80`063b0b80 00000000`00000025 fffffa80`062e81e0 : nt!IovCallDriver+0x57e
fffff880`031c3c20 fffff880`00f0c59f : fffffa80`063cf020 00000000`00000000 fffff880`00000000 fffff880`019b15d5 : Wdf01000!FxIoTarget::SubmitSync+0x24a
fffff880`031c3cd0 fffff880`019c5e95 : fffffa80`00000020 fffffa80`063cf020 fffffa80`063b0b80 00000000`00000001 : Wdf01000!imp_WdfRequestSend+0x24b
fffff880`031c3d20 fffff880`019c62f4 : 00000000`00000000 00000000`00000024 00000000`00000001 fffff880`031c3ee0 : cdrom!DeviceSendRequestSynchronously+0xc9
fffff880`031c3d80 fffff880`019c4f04 : 0000057f`f9c51fd8 fffff880`031c3ee0 fffffa80`063f8680 00000000`00000024 : cdrom!DeviceSendSrbSynchronously+0x3ec
fffff880`031c3eb0 fffff880`019c3825 : fffffa80`00000002 fffffa80`063ae390 fffff880`019bb3b8 0000057f`f9c51fd8 : cdrom!DeviceCacheDeviceInquiryData+0xbc
fffff880`031c3f80 fffff880`00f619d4 : 00000000`00000000 fffff880`00000010 00000000`0000000c fffff880`00f6a620 : cdrom!DeviceEvtSelfManagedIoInit+0x105
fffff880`031c3fc0 fffff880`00f6194e : fffffa80`06398930 00000000`0000000c fffff880`00f6a620 fffff880`00f6a600 : Wdf01000!FxSelfManagedIoMachine::Init+0x34
fffff880`031c3ff0 fffff880`00f55b9b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00f6a620 : Wdf01000!FxSelfManagedIoMachine::ProcessEvent+0x14a
fffff880`031c4060 fffff880`00f556eb : 00000000`00000312 00000000`00000000 fffff880`00f6a600 fffff800`0327ca40 : Wdf01000!FxPkgPnp::PowerD0StartingStartSelfManagedIo+0x2f
fffff880`031c4090 fffff880`00f5538e : fffffa80`063aeb60 00000000`00000040 fffff880`00f6a3e0 00000000`00000040 : Wdf01000!FxPkgPnp::PowerEnterNewState+0x1db
fffff880`031c41c0 fffff880`00f5506c : 00000000`00000000 00000000`00000040 00000000`00000501 fffffa80`063aeb60 : Wdf01000!FxPkgPnp::PowerProcessEventInner+0x13e
fffff880`031c4230 fffff880`00f62b5e : 00000000`00000000 00000000`00000501 00000000`00000000 00000000`00000501 : Wdf01000!FxPkgPnp::PowerProcessEvent+0x1d4
fffff880`031c42c0 fffff880`00f62abb : 00000000`00000501 00000000`00000000 00000000`00000500 fffff800`0356b5ec : Wdf01000!FxPkgPnp::NotPowerPolOwnerStarting+0xe
fffff880`031c42f0 fffff880`00f5e950 : fffffa80`063aeb60 00000000`00000001 00000000`00000000 fffff880`00f66ff0 : Wdf01000!FxPkgPnp::NotPowerPolicyOwnerEnterNewState+0x1c7
fffff880`031c4370 fffff880`00f5e372 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`063b0060 : Wdf01000!FxPkgPnp::PowerPolicyProcessEventInner+0x3f8
fffff880`031c43e0 fffff880`00f5aa45 : 00000000`00000000 fffffa80`063b0060 00000000`00000108 00000000`00000000 : Wdf01000!FxPkgPnp::PowerPolicyProcessEvent+0x1e2
fffff880`031c4470 fffff880`00f5a841 : 00000000`00000101 00000000`00000108 00000000`00000108 fffff800`0000000e : Wdf01000!FxPkgPnp::PnpEventHardwareAvailable+0x111
fffff880`031c44b0 fffff880`00f5a4fe : fffffa80`063aeb60 fffff880`031c45e0 00000000`00000004 fffff880`00f69390 : Wdf01000!FxPkgPnp::PnpEnterNewState+0x1a5
fffff880`031c4520 fffff880`00f5a201 : 00000000`00000000 00000000`00000002 00000000`00000000 fffffa80`063aeb60 : Wdf01000!FxPkgPnp::PnpProcessEventInner+0x122
fffff880`031c4590 fffff880`00f51d9c : 00000000`00000000 fffffa80`063aeb60 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp::PnpProcessEvent+0x1b1
fffff880`031c4620 fffff880`00f50dd6 : fffffa80`053809d0 00000000`00000002 00000000`00000000 fffffa80`063aeb60 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x20
fffff880`031c4650 fffff880`00f20245 : fffff980`0668ae50 fffff980`0668ae50 fffffa80`063b0060 00000000`00000000 : Wdf01000!FxPkgPnp::Dispatch+0x1b2
fffff880`031c46c0 fffff880`00f2014b : fffff880`031c47a8 fffff980`0668ae50 00000000`00000002 fffffa80`063b0060 : Wdf01000!FxDevice::Dispatch+0xa9
fffff880`031c46f0 fffff800`0356cc16 : fffff980`0668ae50 00000000`00000002 fffffa80`063b0060 fffffa80`063b0060 : Wdf01000!FxDevice::DispatchWithLock+0x93
fffff880`031c4730 fffff800`034848fe : fffff980`0668ae50 fffffa80`063f8ae0 fffffa80`063b0060 fffffa80`05191f40 : nt!IovCallDriver+0x566
fffff880`031c4790 fffff800`031bf0ed : fffffa80`05fc1c40 fffffa80`063f8ae0 fffff800`031c4d50 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`031c47d0 fffff800`0348f6e6 : fffff800`032c91c0 fffffa80`063a3010 fffffa80`063f8ae0 fffffa80`063a31b8 : nt!PnpStartDevice+0x11d
fffff880`031c4890 fffff800`0348f984 : fffffa80`063a3010 fffffa80`0359002a fffffa80`0359c350 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`031c4920 fffff800`034b2c76 : fffffa80`063a3010 fffffa80`0359c350 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`031c4950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296


STACK_COMMAND:  .bugcheck ; kb

SYMBOL_NAME:  dtsoftbus01+1308

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dtsoftbus01

IMAGE_NAME:  dtsoftbus01.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d2eb485

FAILURE_BUCKET_ID:  X64_0xc9_23e_VRF_dtsoftbus01+1308

BUCKET_ID:  X64_0xc9_23e_VRF_dtsoftbus01+1308

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\042711-25849-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a2e50
Debug session time: Wed Apr 27 18:51:30.165 2011 (UTC - 4:00)
System Uptime: 0 days 0:38:21.289
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa800712c290, fffffa800713c290, fffffa800712c290}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+1175 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa800712c290, the pool entry being checked.
Arg3: fffffa800713c290, the read back flink freelist value (should be the same as 2).
Arg4: fffffa800712c290, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80003208598 to fffff800030d5740

STACK_TEXT:  
fffff880`09962798 fffff800`03208598 : 00000000`00000019 00000000`00000003 fffffa80`0712c290 fffffa80`0713c290 : nt!KeBugCheckEx
fffff880`099627a0 fffff880`03eef17e : fffffa80`05e061c0 fffffa80`0619ac80 00000000`42646641 fffffa80`42646641 : nt!ExDeferredFreePool+0x1175
fffff880`09962850 fffff880`03ef28b3 : 00000000`00000000 fffffa80`05ecb4d0 fffffa80`03acece0 fffffa80`05a59010 : afd!AfdReturnBuffer+0x16e
fffff880`09962890 fffff880`01677194 : 00000000`00003488 fffffa80`03acee00 00000000`00000000 00000000`00000000 : afd!AfdTLBufferedSendComplete+0xc3
fffff880`09962930 fffff880`0167b86a : fffffa80`043e7840 fffffa80`0619b200 fffffa80`043bd201 00000000`00000000 : tcpip!TcpTcbReceive+0x4f4
fffff880`09962ae0 fffff880`0167b3b7 : fffff880`076ba9e2 00000000`00000000 00000000`00000000 fffff880`0165e700 : tcpip!TcpMatchReceive+0x1fa
fffff880`09962c30 fffff880`0165d6c7 : fffffa80`04514000 fffffa80`043e6820 fffffa80`043ecacc 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`09962ce0 fffff880`0165d799 : fffff880`09962e60 fffff880`0176b9a0 fffff880`09962e70 fffffa80`043998f0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`09962da0 fffff880`0165dc90 : fffffa80`04514000 00000000`00000000 00000000`00000000 fffff880`09962e60 : tcpip!IppProcessDeliverList+0x59
fffff880`09962e10 fffff880`0165cb21 : 00000000`0100000a fffffa80`04514000 fffff880`0176b9a0 00000000`054da001 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`09962ef0 fffff880`0165b592 : fffffa80`05320bc0 00000000`00000000 fffffa80`054da001 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`099630f0 fffff880`01674e5a : fffffa80`054da010 fffff880`09963220 fffffa80`054da010 fffff880`09960000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`099631d0 fffff800`030e4e5a : fffffa80`056c8610 fffff880`0995e000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`09963220 fffff880`01674882 : fffff880`01674d80 fffff880`09963330 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`09963300 fffff880`014cc0eb : fffffa80`054db010 00000000`00000000 fffffa80`051281a0 fffff880`014cc120 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`09963370 fffff880`01495fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`099633e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+1175
fffff800`03208598 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+1175

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+1175

BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+1175

Followup: Pool_corruption
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\042711-20155-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03246e50
Debug session time: Wed Apr 27 16:29:39.335 2011 (UTC - 4:00)
System Uptime: 0 days 3:23:13.833
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffff80003209730, fffff80003209730, fffff80003009730}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff80003209730, the pool entry being checked.
Arg3: fffff80003209730, the read back flink freelist value (should be the same as 2).
Arg4: fffff80003009730, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Launcher.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff800031acd6f to fffff80003079740

STACK_TEXT:  
fffff880`07c7c748 fffff800`031acd6f : 00000000`00000019 00000000`00000003 fffff800`03209730 fffff800`03209730 : nt!KeBugCheckEx
fffff880`07c7c750 fffff800`0309a536 : fffffa80`00000000 00000000`00000018 fffffa80`03a01fd0 00000000`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`07c7c840 fffff880`01849371 : fffffa80`06c1d9d0 fffffa80`06c1db78 fffff880`07c7c900 00002000`03a01a40 : nt!ExAllocatePoolWithQuotaTag+0x56
fffff880`07c7c890 fffff880`018626ae : 00000000`00000000 fffff880`07c7c900 00000000`00000000 00000000`00000000 : afd!AfdPollGetInfo+0x21
fffff880`07c7c8d0 fffff880`01852cf5 : fffffa80`04e57c00 00000000`00000000 00000000`00000001 00000000`00000490 : afd!AfdPoll32+0xee
fffff880`07c7c9e0 fffff800`03392547 : fffffa80`061ed7f0 fffff880`07c7cca0 fffffa80`06c1dbc0 fffffa80`06c1d9d0 : afd! ?? ::GFJBLGFE::`string'+0x1e95
fffff880`07c7ca10 fffff800`03392da6 : 00000000`00000000 00000000`0000080c 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`07c7cb40 fffff800`03078993 : fffff880`07c7cca0 fffffa80`05a185f0 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffff880`07c7cbb0 00000000`73772dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73772dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+a56
fffff800`031acd6f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+a56

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56

BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56

Followup: Pool_corruption
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\042711-17394-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03016000 PsLoadedModuleList = 0xfffff800`03253e50
Debug session time: Wed Apr 27 21:10:52.614 2011 (UTC - 4:00)
System Uptime: 0 days 2:11:41.738
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 109, {a3a039d898e4a91e, 0, a6a1753f12f0089d, 101}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d898e4a91e, Reserved
Arg2: 0000000000000000, Reserved
Arg3: a6a1753f12f0089d, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
	0 : A generic data region
	1 : Modification of a function or .pdata
	2 : A processor IDT
	3 : A processor GDT
	4 : Type 1 process list corruption
	5 : Type 2 process list corruption
	6 : Debug routine modification
	7 : Critical MSR modification

Debugging Details:
------------------


BUGCHECK_STR:  0x109

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80003086740

STACK_TEXT:  
fffff880`031cb5d8 00000000`00000000 : 00000000`00000109 a3a039d8`98e4a91e 00000000`00000000 a6a1753f`12f0089d : nt!KeBugCheckEx


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  BAD_STACK

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\042711-16957-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0301e000 PsLoadedModuleList = 0xfffff800`0325be50
Debug session time: Wed Apr 27 13:05:43.829 2011 (UTC - 4:00)
System Uptime: 0 days 7:19:33.953
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C5, {0, 2, 0, fffff800031c10f7}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+c67 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is
caused by drivers that have corrupted the system pool.  Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800031c10f7, address which referenced memory

Debugging Details:
------------------


BUGCHECK_STR:  0xC5_2

CURRENT_IRQL:  2

FAULTING_IP: 
nt!ExDeferredFreePool+c67
fffff800`031c10f7 488b00          mov     rax,qword ptr [rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

TRAP_FRAME:  fffff88008afc590 -- (.trap 0xfffff88008afc590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8000321dfb0
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c10f7 rsp=fffff88008afc720 rbp=0000000000000002
 r8=fffffa80071ccc10  r9=fffffa80071cca40 r10=fffffa80071ccc10
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!ExDeferredFreePool+0xc67:
fffff800`031c10f7 488b00          mov     rax,qword ptr [rax] ds:66c0:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000308dca9 to fffff8000308e740

STACK_TEXT:  
fffff880`08afc448 fffff800`0308dca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08afc450 fffff800`0308c920 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`08afc590 fffff800`031c10f7 : fffffa80`05b64000 fffff880`105e912b fffff880`105e382c fffffa80`05f23700 : nt!KiPageFault+0x260
fffff880`08afc720 fffff800`031c34c1 : fffffa80`0612d1e0 fffffa80`06f57410 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0xc67
fffff880`08afc7b0 fffff880`1001036d : 00000000`00000001 00000000`00000000 fffffa80`4d52564e 00000000`00000001 : nt!ExFreePoolWithTag+0x411
fffff880`08afc860 00000000`00000001 : 00000000`00000000 fffffa80`4d52564e 00000000`00000001 fffffa80`06f57420 : nvlddmkm+0x1df36d
fffff880`08afc868 00000000`00000000 : fffffa80`4d52564e 00000000`00000001 fffffa80`06f57420 fffff880`10038f62 : 0x1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+c67
fffff800`031c10f7 488b00          mov     rax,qword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ExDeferredFreePool+c67

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xC5_2_nt!ExDeferredFreePool+c67

BUCKET_ID:  X64_0xC5_2_nt!ExDeferredFreePool+c67

Followup: Pool_corruption
---------



DRIVERS

Code:
start             end                 module name
fffff880`00f9c000 fffff880`00ff3000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`02cfb000 fffff880`02d85000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`03b68000 fffff880`03b7e000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`00dc9000 fffff880`00dd4000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00d96000 fffff880`00d9f000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00d9f000 fffff880`00dc9000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`019df000 fffff880`019e6000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`018da000 fffff880`018eb000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`019ac000 fffff880`019d6000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cbc000 fffff880`00d7c000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`01946000 fffff880`01976000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00c5e000 fffff880`00cbc000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01115000 fffff880`01188000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`03b58000 fffff880`03b68000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`01976000 fffff880`01984000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`018bc000 fffff880`018da000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`018ad000 fffff880`018bc000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`01930000 fffff880`01946000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`06b67000 fffff880`06b89000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`02c2c000 fffff880`02c6f000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 10:15:01 2011 (4D2EB485)
fffff880`01990000 fffff880`01999000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01984000 fffff880`01990000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01999000 fffff880`019ac000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`10a9a000 fffff880`10b8e000   dxgkrnl  dxgkrnl.sys  Wed Jan 26 06:22:56 2011 (4D3FA1A0)
fffff880`10b8e000 fffff880`10bd4000   dxgmms1  dxgmms1.sys  Wed Jan 26 06:22:12 2011 (4D3FA174)
fffff880`018a2000 fffff880`018ad000   ElbyCDIO ElbyCDIO.sys Fri Dec 18 00:25:16 2009 (4B2AAFCC)
fffff880`010a3000 fffff880`010b7000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01057000 fffff880`010a3000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`018f6000 fffff880`01930000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff800`0300c000 fffff800`03055000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`10bd4000 fffff880`10bf8000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`015e3000 fffff880`015ec000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01235000 fffff880`0124b000   intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03a3b000 fffff880`03a4a000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff800`00bc4000 fffff800`00bce000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff880`06a39000 fffff880`06a7c000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0159e000 fffff880`015c9000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`06b89000 fffff880`06b8e200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`06a7c000 fffff880`06a7fd80   LGBusEnum LGBusEnum.sys Tue Nov 24 03:36:48 2009 (4B0B38B0)
fffff880`00c06000 fffff880`00c4a000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`03a4a000 fffff880`03a59000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`00d7c000 fffff880`00d96000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`01850000 fffff880`0185b000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`010b7000 fffff880`01115000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01897000 fffff880`018a2000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`015d1000 fffff880`015e3000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`0144c000 fffff880`0153e000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`03ba2000 fffff880`03bae000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`03bae000 fffff880`03bdd000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`06aec000 fffff880`06b01000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`02c00000 fffff880`02c0f000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d85000 fffff880`02dca000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`0153e000 fffff880`0159e000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02cef000 fffff880`02cfb000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff800`03055000 fffff800`03632000   nt       ntkrnlmp.exe Wed Oct 27 05:43:09 2010 (4CC791BD)
fffff880`0124b000 fffff880`013ee000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`019d6000 fffff880`019df000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`10a98000 fffff880`10a99180   nvBridge nvBridge.kmd Wed Feb 23 09:34:23 2011 (4D64B87F)
fffff880`06b01000 fffff880`06b2a000   nvhda64v nvhda64v.sys Fri Nov 12 01:10:36 2010 (4CDC77EC)
fffff880`0fe3c000 fffff880`10a97180   nvlddmkm nvlddmkm.sys Wed Feb 23 09:46:52 2011 (4D64BB6C)
fffff880`02dd3000 fffff880`02df9000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00ed7000 fffff880`00ee7000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`06b2a000 fffff880`06b67000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`00c4a000 fffff880`00c5e000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`03b7e000 fffff880`03ba2000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03bdd000 fffff880`03bf8000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`03a00000 fffff880`03a21000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`03a21000 fffff880`03a3b000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`02c9e000 fffff880`02cef000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`01835000 fffff880`0183e000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`0183e000 fffff880`01847000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`03ae5000 fffff880`03b4c000   Rt64win7 Rt64win7.sys Thu Jan 13 13:57:19 2011 (4D2EE89F)
fffff880`07ad4000 fffff880`07d27700   RTKVHD64 RTKVHD64.sys Wed Jul 28 13:01:36 2010 (4C500000)
fffff880`0fe0d000 fffff880`0fe3c000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`03b4c000 fffff880`03b58000   serenum  serenum.sys  Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`02c0f000 fffff880`02c2c000   serial   serial.sys   Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`015c9000 fffff880`015d1000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`03a68000 fffff880`03a69480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`0188a000 fffff880`01897000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`0186c000 fffff880`0188a000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02c8a000 fffff880`02c9e000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`011d4000 fffff880`011fa000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`06a80000 fffff880`06a92000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`03ad4000 fffff880`03ae5000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`06a92000 fffff880`06aec000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`03a7e000 fffff880`03ad4000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`0fe00000 fffff880`0fe0d000   usbuhci  usbuhci.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`03a59000 fffff880`03a68000   VClone   VClone.sys   Mon Aug 10 00:25:45 2009 (4A7F3ED9)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`019e6000 fffff880`019f4000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`01188000 fffff880`011d4000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`02c6f000 fffff880`02c8a000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`00ee9000 fffff880`00f8d000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f8d000 fffff880`00f9c000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02dca000 fffff880`02dd3000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`00ff3000 fffff880`00ffc000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`06a41000 fffff880`06a72000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`06aed000 fffff880`06b1e000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
 
1. Driver Verifier already been disabled


2. turbo boost disabled and EIST enabled


3. drivers sorted


4. as i said in original post i had already uninstalled daemon tools and Virtual clone drive


I have followed your directions and after doing so still got a BSOD 15 min later, sometimes i can using the PC for hours without a problem, when the PC is left at idle or not being used it crashes, I will add the new minidump files since changes were made thanks.
 

Attachments

  • minidumps.zip
    48.2 KB · Views: 189
Driver Verifier already been disabled

Your most recent crash dump was recorded with it on.



as i said in original post i had already uninstalled daemon tools and Virtual clone drive

Their drivers were still present in your system.


Try to update Logitech
LGVirHid.sys Mon Nov 23 20:36:48 2009



turbo boost disabled and EIST enabled

Good, attach cpu-z CPU and MEMORY tabs again.




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042811-14866-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a2e50
Debug session time: Thu Apr 28 09:26:03.322 2011 (UTC - 4:00)
System Uptime: 0 days 6:52:58.821
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800033af43d, fffff88009065770, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800033af43d, Address of the instruction which caused the bugcheck
Arg3: fffff88009065770, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpKcbCacheLookup+1dd
fffff800`033af43d 418b45f4        mov     eax,dword ptr [r13-0Ch]

CONTEXT:  fffff88009065770 -- (.cxr 0xfffff88009065770)
rax=0000000000000040 rbx=0000000000000000 rcx=00000000000008e2
rdx=00000000109ec9ff rsi=fffff8a0004c9608 rdi=fffff88009066320
rip=fffff800033af43d rsp=fffff88009066140 rbp=fffff8a0004c9010
 r8=0000000000000007  r9=0000000000000000 r10=000000000000000d
r11=fffff880090662d8 r12=fffff8a00b9b9130 r13=0808080808080808
r14=0000000000000003 r15=fffff8a00be05008
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!CmpKcbCacheLookup+0x1dd:
fffff800`033af43d 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:002b:08080808`080807fc=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800033af43d

STACK_TEXT:  
fffff880`09066140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpKcbCacheLookup+0x1dd


FOLLOWUP_IP: 
nt!CmpKcbCacheLookup+1dd
fffff800`033af43d 418b45f4        mov     eax,dword ptr [r13-0Ch]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpKcbCacheLookup+1dd

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff88009065770 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd

BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042811-17659-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0300f000 PsLoadedModuleList = 0xfffff800`0324ce50
Debug session time: Thu Apr 28 14:19:05.713 2011 (UTC - 4:00)
System Uptime: 0 days 0:13:24.227
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {22, fffffa80071c4000, 0, 0}

GetPointerFromAddress: unable to read from fffff800032b70e0
GetUlongFromAddress: unable to read from fffff800032251b0
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+72f8 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022, 
Arg2: fffffa80071c4000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff800032251b0

BUGCHECK_STR:  0x19_22

POOL_ADDRESS:  fffffa80071c4000 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff800030d4c80 to fffff8000307f740

STACK_TEXT:  
fffff880`031a1b08 fffff800`030d4c80 : 00000000`00000019 00000000`00000022 fffffa80`071c4000 00000000`00000000 : nt!KeBugCheckEx
fffff880`031a1b10 fffff800`031b4518 : 00000000`00000000 fffff880`031a1c60 fffff880`031a1bd0 fffff800`00000001 : nt! ?? ::FNODOBFM::`string'+0x72f8
fffff880`031a1ba0 fffff800`03494883 : fffffa80`06513ca8 fffffa80`06513b20 fffffa80`42506343 00000000`00000000 : nt!ExFreePoolWithTag+0x468
fffff880`031a1c50 fffff800`03495109 : fffffa80`06513b20 fffffa80`00000002 fffff800`000221b8 fffffa80`03560000 : nt!PfSnCleanupTrace+0x33
fffff880`031a1c80 fffff800`0308c961 : 00000000`00000000 fffff800`034954a0 fffff800`032245f8 fffffa80`03560040 : nt!PfSnEndTrace+0xf9
fffff880`031a1cb0 fffff800`033227c6 : 00000000`00000000 fffffa80`03560040 00000000`00000080 fffffa80`034e9b30 : nt!ExpWorkerThread+0x111
fffff880`031a1d40 fffff800`0305dc26 : fffff880`02fd3180 fffffa80`03560040 fffff880`02fddfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031a1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+72f8
fffff800`030d4c80 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+72f8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x19_22_nt!_??_::FNODOBFM::_string_+72f8

BUCKET_ID:  X64_0x19_22_nt!_??_::FNODOBFM::_string_+72f8

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f7b000 fffff880`00fd2000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cd2000 fffff880`02d5c000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f11000 fffff880`03f27000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00df0000 fffff880`00dfb000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`05dec000 fffff880`05df7000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c86000 fffff880`00c8f000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc6000 fffff880`00df0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`019cf000 fffff880`019d6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`01897000 fffff880`018a8000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05941000 fffff880`0595f000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`0199c000 fffff880`019c6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eac000 fffff880`00f6c000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01936000 fffff880`01966000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d0b000 fffff880`00d69000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01161000 fffff880`011d4000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03f01000 fffff880`03f11000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`052d9000 fffff880`052e7000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02ca6000 fffff880`02cc4000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c97000 fffff880`02ca6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01920000 fffff880`01936000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`041cc000 fffff880`041ee000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`052f3000 fffff880`052fc000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`052e7000 fffff880`052f3000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`052fc000 fffff880`0530f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0530f000 fffff880`0531b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10ac7000 fffff880`10bbb000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0fe00000 fffff880`0fe46000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`010ef000 fffff880`01103000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010a3000 fffff880`010ef000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013f6000 fffff880`01400000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e6000 fffff880`01920000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01595000 fffff880`015df000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`035ec000 fffff800`03635000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10bbb000 fffff880`10bdf000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05329000 fffff880`05342000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05342000 fffff880`0534a080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0531b000 fffff880`05329000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05879000 fffff880`05941000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01400000 fffff880`01409000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`018ce000 fffff880`018e4000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03fdc000 fffff880`03feb000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`053c9000 fffff880`053d7000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb7000 fffff800`00bc1000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0409e000 fffff880`040e1000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013cb000 fffff880`013e5000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0156a000 fffff880`01595000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`041ee000 fffff880`041f3200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`040e1000 fffff880`040e4d80   LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`05df7000 fffff880`05df9480   LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`05031000 fffff880`05046000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05385000 fffff880`053a8000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cb3000 fffff880`00cf7000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0535a000 fffff880`05368000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03feb000 fffff880`03ffa000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0534d000 fffff880`0535a000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c6c000 fffff880`00c86000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0595f000 fffff880`05977000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05977000 fffff880`059a4000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`059a4000 fffff880`059f2000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`05800000 fffff880`05823000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`01850000 fffff880`0185b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fdb000 fffff880`00fe5000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01103000 fffff880`01161000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c8c000 fffff880`02c97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e7000 fffff880`015f9000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01418000 fffff880`0150a000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f4b000 fffff880`03f57000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f57000 fffff880`03f86000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04151000 fffff880`04166000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dd0000 fffff880`02ddf000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d5c000 fffff880`02da1000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0150a000 fffff880`0156a000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0185b000 fffff880`0186c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c80000 fffff880`02c8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0300f000 fffff800`035ec000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01229000 fffff880`013cb000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`019c6000 fffff880`019cf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10ac5000 fffff880`10ac6180   nvBridge nvBridge.kmd Wed Feb 23 02:34:23 2011 (4D64B87F)
fffff880`04166000 fffff880`0418f000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`0fe69000 fffff880`10ac4180   nvlddmkm nvlddmkm.sys Wed Feb 23 02:46:52 2011 (4D64BB6C)
fffff880`02daa000 fffff880`02dd0000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00d9c000 fffff880`00db1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d69000 fffff880`00d9c000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ff2000 fffff880`00ff9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c5c000 fffff880`00c6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013e5000 fffff880`013f6000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05cfc000 fffff880`05da2000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0418f000 fffff880`041cc000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf7000 fffff880`00d0b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f27000 fffff880`03f4b000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03f86000 fffff880`03fa1000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fa1000 fffff880`03fc2000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fc2000 fffff880`03fdc000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c2f000 fffff880`02c80000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01835000 fffff880`0183e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0183e000 fffff880`01847000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01847000 fffff880`01850000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05046000 fffff880`0505e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e8e000 fffff880`03ef5000   Rt64win7 Rt64win7.sys Thu Jan 13 06:57:19 2011 (4D2EE89F)
fffff880`05085000 fffff880`052d8700   RTKVHD64 RTKVHD64.sys Wed Jul 28 06:01:36 2010 (4C500000)
fffff880`05da2000 fffff880`05dad000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03ef5000 fffff880`03f01000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02ddf000 fffff880`02dfc000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015df000 fffff880`015e7000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05c67000 fffff880`05cfc000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`05c00000 fffff880`05c67000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`05dad000 fffff880`05dda000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`03ffa000 fffff880`03ffb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05dda000 fffff880`05dec000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0188a000 fffff880`01897000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0186c000 fffff880`0188a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c1b000 fffff880`02c2f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`018a8000 fffff880`018ce000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`040e5000 fffff880`040f7000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05368000 fffff880`05385000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0534b000 fffff880`0534cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e7d000 fffff880`03e8e000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`040f7000 fffff880`04151000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e27000 fffff880`03e7d000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`10bdf000 fffff880`10bec000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fe5000 fffff880`00ff2000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d6000 fffff880`019e4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01800000 fffff880`01825000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00db1000 fffff880`00dc6000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c00000 fffff880`02c1b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01825000 fffff880`01835000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f6c000 fffff880`00f7b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02da1000 fffff880`02daa000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   unavailable (00000000)
fffff880`00fd2000 fffff880`00fdb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`053a8000 fffff880`053c9000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`05000000 fffff880`05031000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`04000000 fffff880`04071000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01966000 fffff880`01974000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01974000 fffff880`01980000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01980000 fffff880`01989000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01989000 fffff880`0199c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`040e5000 fffff880`04116000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`0409c000 fffff880`040cd000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
 
Back
Top