Windows 7 BSOD Page fault error

mikekollar

New Member
I purchased an Acer 5552-7803 laptop for my son to take to college. I have had it for a week but it seems to randomly crash with a BSOD, if I can get any help, advice, assistance I would greatly appreciate it.
 

Attachments

  • Seven Forums.zip
    760.7 KB · Views: 446

050311-19827-01.dmp
BugCheck A, {28, 2, 0, fffff80002ed3628}
Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )

050311-20888-01.dmp
BugCheck 3B, {c0000005, fffff88002828608, fffff8800835b850, 0}
Probably caused by : eamonm.sys ( eamonm+4608 )

050311-22573-01.dmp
BugCheck 4A, {732f2e09, 2, 0, fffff880085efca0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

050211-20576-01.dmp
BugCheck 1A, {41287, 38, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46585 )




1. Attach as requested in this thread, CPU/MEMORY/SPD:

http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html


2. Update drivers:

Pure Networks, Inc. Network Magic NDIS Relay Driver
purendis.sys Wed Jan 02 19:39:32 2008

Fingerprint Biometrics
mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009
mwlPSDNServ.sys Tue Jun 02 06:07:39 2009



3. Uninstall Eset (for now) since it caused one of your crashes. Replace with MSE.



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050211-20576-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`03047e90
Debug session time: Mon May  2 21:52:16.621 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:28.400
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 38, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46585 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  iTunesHelper.e

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88003316900 -- (.trap 0xfffff88003316900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005e201f8 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8a000107238 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f7fdf7 rsp=fffff88003316a90 rbp=0000000000000000
 r8=fffffa8006610006  r9=fffffa8003b2c048 r10=fffffa80055bbe60
r11=fffffa80055bab60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiEmptyPageAccessLog+0xe7:
fffff800`02f7fdf7 8b4138          mov     eax,dword ptr [rcx+38h] ds:ca60:00000000`00000038=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e1562e to fffff80002e82640

STACK_TEXT:  
fffff880`03316798 fffff800`02e1562e : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : nt!KeBugCheckEx
fffff880`033167a0 fffff800`02e8076e : 00000000`00000000 00000000`00000038 00000000`00000000 00000000`00162406 : nt! ?? ::FNODOBFM::`string'+0x46585
fffff880`03316900 fffff800`02f7fdf7 : fffffa80`066140e0 fffffa80`055bbea0 00000000`00000002 fffff880`02f637f0 : nt!KiPageFault+0x16e
fffff880`03316a90 fffff800`02efb6d3 : fffffa80`066140e0 00000003`00000000 00000000`00000000 fffffa80`05e201f8 : nt!MiEmptyPageAccessLog+0xe7
fffff880`03316b00 fffff800`02e6d206 : 00000000`00000239 00000000`00000000 fffffa80`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4d8db
fffff880`03316b80 fffff800`02e6d6c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316bd0 fffff800`0311fcce : fffffa80`033eca60 00000000`00000080 fffffa80`033c7040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d40 fffff800`02e73fe6 : fffff880`02f63180 fffffa80`033eca60 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03316d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+46585
fffff800`02e1562e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+46585

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+46585

BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+46585

Followup: MachineOwner
---------






Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050311-19827-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`03051e90
Debug session time: Wed May  4 01:44:22.631 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:51.410
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {28, 2, 0, fffff80002ed3628}

Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ed3628, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bd0e8
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiFindNodeOrParent+0
fffff800`02ed3628 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  mscorsvw.exe

TRAP_FRAME:  fffff88003316810 -- (.trap 0xfffff88003316810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed3628 rsp=fffff880033169a8 rbp=0000000000000000
 r8=fffff880033169f0  r9=0000000000000000 r10=fffffa80053bf6d0
r11=fffffa80053bb4c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiFindNodeOrParent:
fffff800`02ed3628 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:00000000`00000028=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e8bbe9 to fffff80002e8c640

STACK_TEXT:  
fffff880`033166c8 fffff800`02e8bbe9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033166d0 fffff800`02e8a860 : 00000000`00000049 00000000`00000001 fffff880`02fd3180 fffffa80`053bf718 : nt!KiBugCheckDispatch+0x69
fffff880`03316810 fffff800`02ed3628 : fffff800`02ed5807 fffff880`00000000 00000000`00000000 fffff880`02fd3180 : nt!KiPageFault+0x260
fffff880`033169a8 fffff800`02ed5807 : fffff880`00000000 00000000`00000000 fffff880`02fd3180 00000000`00000000 : nt!MiFindNodeOrParent
fffff880`033169b0 fffff800`02ed58dd : fffffa80`03406a60 fffff880`00000000 fffff880`03316a60 00000000`00000000 : nt!MiLocateAddressInTree+0x17
fffff880`033169e0 fffff800`02ed5958 : 00000000`00000000 fffffa80`03457000 fffffa80`0452b048 fffffa80`053bf750 : nt!MiGetSharedProtosAtDpcLevel+0xbd
fffff880`03316a30 fffff800`02e2397b : fffffa80`06a91060 fffff800`00000003 fffff880`03316ba0 00000000`00000000 : nt!MiGetSharedProtos+0x18
fffff880`03316a60 fffff800`02f89e70 : 00000000`00000000 fffffa80`053bf710 00000000`00000002 fffff880`02fd37f0 : nt! ?? ::FNODOBFM::`string'+0x938b
fffff880`03316a90 fffff800`02f056d3 : fffffa80`06a91060 00000003`00000000 fffffa80`053bf6d0 fffffa80`053bf750 : nt!MiEmptyPageAccessLog+0x160
fffff880`03316b00 fffff800`02e77206 : 00000000`000000e8 00000000`00000000 fffffa80`00000000 00000000`00000003 : nt! ?? ::FNODOBFM::`string'+0x4d8db
fffff880`03316b80 fffff800`02e776c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316bd0 fffff800`03129cce : fffffa80`03406a60 00000000`00000080 fffffa80`033e1040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d40 fffff800`02e7dfe6 : fffff880`02f63180 fffffa80`03406a60 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03316d80 00000000`00000000 : fffff880`03317000 fffff880`03311000 fffff880`03316700 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiFindNodeOrParent+0
fffff800`02ed3628 48f7412800ffffff test    qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiFindNodeOrParent+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0

BUCKET_ID:  X64_0xA_nt!MiFindNodeOrParent+0

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050311-20888-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03049e90
Debug session time: Wed May  4 00:54:43.283 2011 (UTC - 4:00)
System Uptime: 0 days 0:12:19.062
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88002828608, fffff8800835b850, 0}

Probably caused by : eamonm.sys ( eamonm+4608 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88002828608, Address of the instruction which caused the bugcheck
Arg3: fffff8800835b850, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
eamonm+4608
fffff880`02828608 418d5010        lea     edx,[r8+10h]

CONTEXT:  fffff8800835b850 -- (.cxr 0xfffff8800835b850)
rax=0001000000027d68 rbx=0000000000010000 rcx=fffff8800835c2a0
rdx=fffff8800835cc01 rsi=0000000000000000 rdi=0000000000027d68
rip=fffff88002828608 rsp=fffff8800835c230 rbp=fffffa8006620d10
 r8=0000000000000000  r9=fffff880009e8180 r10=fffffa8003400e00
r11=fffffa80033ed800 r12=0000000000000100 r13=fffff8800835c500
r14=0000000000000160 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
eamonm+0x4608:
fffff880`02828608 418d5010        lea     edx,[r8+10h]
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WmiPrvSE.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88002828608

STACK_TEXT:  
fffff880`0835c230 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : eamonm+0x4608


FOLLOWUP_IP: 
eamonm+4608
fffff880`02828608 418d5010        lea     edx,[r8+10h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  eamonm+4608

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: eamonm

IMAGE_NAME:  eamonm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d006930

STACK_COMMAND:  .cxr 0xfffff8800835b850 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_eamonm+4608

BUCKET_ID:  X64_0x3B_eamonm+4608

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050311-22573-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
Debug session time: Wed May  4 01:46:47.828 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:32.607
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4A, {732f2e09, 2, 0, fffff880085efca0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a)
Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL.
Arguments:
Arg1: 00000000732f2e09, Address of system function (system call routine)
Arg2: 0000000000000002, Current IRQL
Arg3: 0000000000000000, 0
Arg4: fffff880085efca0, 0

Debugging Details:
------------------


PROCESS_NAME:  firefox.exe

BUGCHECK_STR:  RAISED_IRQL_FAULT

FAULTING_IP: 
+3465333639643035
00000000`732f2e09 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002ee7be9 to fffff80002ee8640

STACK_TEXT:  
fffff880`085efad8 fffff800`02ee7be9 : 00000000`0000004a 00000000`732f2e09 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`085efae0 fffff800`02ee7b20 : fffffa80`0699ba10 00000000`00000000 00000000`00000000 00000000`04500101 : nt!KiBugCheckDispatch+0x69
fffff880`085efc20 00000000`732f2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`000ce948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x732f2e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceExit+245
fffff800`02ee7b20 4883ec50        sub     rsp,50h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceExit+245

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_RAISED_IRQL_FAULT_firefox.exe_nt!KiSystemServiceExit+245

BUCKET_ID:  X64_RAISED_IRQL_FAULT_firefox.exe_nt!KiSystemServiceExit+245

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00ee0000 fffff880`00f37000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`02c9e000 fffff880`02d27000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`045c8000 fffff880`045de000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`011d0000 fffff880`011e5000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e14000 fffff880`00e1f000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`0424e000 fffff880`04474000   athrx    athrx.sys    Thu May 06 20:00:58 2010 (4BE3583A)
fffff880`041b4000 fffff880`041d4000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`04818000 fffff880`04fec000   atikmdag atikmdag.sys Thu Oct 28 11:34:12 2010 (4CC997F4)
fffff880`03e66000 fffff880`03eb1000   atikmpag atikmpag.sys Thu Oct 28 11:03:39 2010 (4CC990CB)
fffff880`019a4000 fffff880`019ac000   AtiPcie64 AtiPcie64.sys Wed Mar 10 09:33:45 2010 (4B97ADC9)
fffff880`00fa8000 fffff880`00fb4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`019f6000 fffff880`019fd000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c5f000 fffff880`02c70000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0283a000 fffff880`02858000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`01600000 fffff880`0162a000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cd7000 fffff880`00d97000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01974000 fffff880`019a4000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c79000 fffff880`00cd7000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045b3000 fffff880`045b7500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`010ea000 fffff880`0115c000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`00f9f000 fffff880`00fa8000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`045b8000 fffff880`045c8000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`05ed8000 fffff880`05ee6000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c41000 fffff880`02c5f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`02c32000 fffff880`02c41000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0195e000 fffff880`01974000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`041d4000 fffff880`041f6000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05ee6000 fffff880`05ef2000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05efd000 fffff880`05f10000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05ef2000 fffff880`05efd000   dump_msahci dump_msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`05e73000 fffff880`05e7f000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eb1000 fffff880`03fa5000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`03fa5000 fffff880`03feb000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`02880000 fffff880`02959000   eamonm   eamonm.sys   Thu Dec 09 00:29:20 2010 (4D006930)
fffff880`01581000 fffff880`015a6000   ehdrv    ehdrv.sys    Thu Dec 09 00:29:58 2010 (4D006956)
fffff880`0467e000 fffff880`0469f000   epfwwfpr epfwwfpr.sys Thu Dec 09 00:26:09 2010 (4D006871)
fffff880`01078000 fffff880`0108c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0102c000 fffff880`01078000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01924000 fffff880`0195e000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01831000 fffff880`0187b000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`04491000 fffff880`0449e000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02e1f000 fffff800`02e68000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`05f33000 fffff880`05ffc000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`0191b000 fffff880`01924000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`0451d000 fffff880`0453b000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04046000 fffff880`040a7000   k57nd60a k57nd60a.sys Sat May 15 08:51:06 2010 (4BEE98BA)
fffff880`0453b000 fffff880`0454a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bbd000 fffff800`00bc7000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`040f0000 fffff880`04133000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013e4000 fffff880`013ff000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01556000 fffff880`01581000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`041f6000 fffff880`041fb200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0297a000 fffff880`0298f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05f10000 fffff880`05f33000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c58000 fffff880`00c65000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05eca000 fffff880`05ed8000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0459b000 fffff880`045aa000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00fe0000 fffff880`00ffa000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`02858000 fffff880`02870000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03e24000 fffff880`03e51000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`0460d000 fffff880`0465a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0465a000 fffff880`0467e000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`00e09000 fffff880`00e14000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`01224000 fffff880`0122f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f40000 fffff880`00f4a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0108c000 fffff880`010ea000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`02c27000 fffff880`02c32000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01909000 fffff880`0191b000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`019e4000 fffff880`019ed000   mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:07:30 2009 (4A24F9E2)
fffff880`02c1f000 fffff880`02c27000   mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:07:39 2009 (4A24F9EB)
fffff880`02c0c000 fffff880`02c1f000   mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009 (4A24FBC1)
fffff880`01403000 fffff880`014f6000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`04224000 fffff880`04230000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`029e2000 fffff880`029f5000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`040a7000 fffff880`040d6000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0419f000 fffff880`041b4000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02d6c000 fffff880`02d7b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0118b000 fffff880`011d0000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`014f6000 fffff880`01556000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0122f000 fffff880`01240000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c00000 fffff880`02c0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e68000 fffff800`03452000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01241000 fffff880`013e4000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
fffff880`04489000 fffff880`04491000   NTIDrvr  NTIDrvr.sys  Mon Apr 19 21:37:59 2010 (4BCD0577)
fffff880`019ed000 fffff880`019f6000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0298f000 fffff880`029e2000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d30000 fffff880`02d56000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00f8a000 fffff880`00f9f000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f4a000 fffff880`00f7d000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fc9000 fffff880`00fd0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fd0000 fffff880`00fe0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0469f000 fffff880`04745000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`02800000 fffff880`0280c000   pnarp    pnarp.sys    Tue Apr 01 04:44:59 2008 (47F1F60B)
fffff880`04000000 fffff880`0403d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c65000 fffff880`00c79000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0280c000 fffff880`02818000   purendis purendis.sys Wed Jan 02 19:39:32 2008 (477C2EC4)
fffff880`04200000 fffff880`04224000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`04230000 fffff880`0424b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`045de000 fffff880`045ff000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`040d6000 fffff880`040f0000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02daa000 fffff880`02dfb000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`015e9000 fffff880`015f2000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015f2000 fffff880`015fb000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0121b000 fffff880`01224000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018cf000 fffff880`01909000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`02818000 fffff880`02830000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c13000 fffff880`05e72400   RTKVHD64 RTKVHD64.sys Tue Sep 21 04:09:43 2010 (4C986847)
fffff880`04745000 fffff880`04750000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`018c7000 fffff880`018cf000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06239000 fffff880`062d1000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`04793000 fffff880`047fd000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`04750000 fffff880`04781000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`0424b000 fffff880`0424c480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0454a000 fffff880`04599000   SynTP    SynTP.sys    Thu Dec 10 21:30:38 2009 (4B21AECE)
fffff880`0162d000 fffff880`01831000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`04781000 fffff880`04793000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`0117e000 fffff880`0118b000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0115c000 fffff880`0117e000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`02d96000 fffff880`02daa000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02c70000 fffff880`02c96000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04481000 fffff880`04489000   UBHelper UBHelper.sys Tue Jul 06 00:19:26 2010 (4C32AECE)
fffff880`04133000 fffff880`04145000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`05e7f000 fffff880`05e9c000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`04599000 fffff880`0459af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0450c000 fffff880`0451d000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
fffff880`044ff000 fffff880`0450c000   usbfilter usbfilter.sys Thu Apr 29 06:43:06 2010 (4BD962BA)
fffff880`04145000 fffff880`0419f000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`0449e000 fffff880`044a9000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044a9000 fffff880`044ff000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05e9c000 fffff880`05ec9280   usbvideo usbvideo.sys Sat Nov 20 05:44:34 2010 (4CE7A692)
fffff880`00f7d000 fffff880`00f8a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`015a6000 fffff880`015b4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015b4000 fffff880`015d9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fb4000 fffff880`00fc9000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00d97000 fffff880`00df3000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`0187b000 fffff880`018c7000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`04474000 fffff880`04481000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d56000 fffff880`02d6c000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02830000 fffff880`0283a000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`02d7b000 fffff880`02d96000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`015d9000 fffff880`015e9000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e2d000 fffff880`00ed1000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed1000 fffff880`00ee0000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d27000 fffff880`02d30000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00372000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`045aa000 fffff880`045b3000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f37000 fffff880`00f40000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02959000 fffff880`0297a000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`019ac000 fffff880`019ba000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019ba000 fffff880`019c6000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019c6000 fffff880`019d1000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`019d1000 fffff880`019e4000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
My apologies, here are the screen shots for the CPU and SPD.
 

Attachments

  • CPU and SPD.PNG
    CPU and SPD.PNG
    213.3 KB · Views: 569
Back
Top