heyyyyyyyyyyyyy...my pc again restarted......
i have attached the latest dumps
Update SigmaTel Audio driver, it's too old:
sthda64.sys Wed Nov 16 14:49:04 2005
Update the Broadcom NetXtreme Gigabit Ethernet Driver:
b57nd60a.sys Sun Apr 26 07:14:55 2009
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022111-25147-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
Debug session time: Mon Feb 21 06:51:08.589 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:23.478
Loading Kernel Symbols
...............................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002af2a83}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002af2a83, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02af2a83 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AtBroker.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff880025153e0 -- (.trap 0xfffff880025153e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800251c408 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002af2a83 rsp=fffff88002515570 rbp=0000000000000000
r8=fffffa8002a02c70 r9=fffff88002515670 r10=0000000000000002
r11=fffffa80018d7590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xae3:
fffff800`02af2a83 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad2469 to fffff80002ad2f00
STACK_TEXT:
fffff880`02515298 fffff800`02ad2469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`025152a0 fffff800`02ad10e0 : 00000000`00000000 fffffa80`03842ee0 00000000`00000aa4 00000000`00000003 : nt!KiBugCheckDispatch+0x69
fffff880`025153e0 fffff800`02af2a83 : fffffa80`0390b060 fffff800`02ad8dda fffff8a0`00000000 fffff8a0`00283000 : nt!KiPageFault+0x260
fffff880`02515570 fffff800`02aaf92f : 00000000`00000001 00000000`00000000 fffff8a0`078fed00 fffffa80`00000000 : nt!IopCompleteRequest+0xae3
fffff880`02515640 fffff800`02ada25d : fffff880`02f025a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`025156c0 fffff800`02adc1af : 00000000`00000001 fffffa80`037697d0 00000000`00000001 fffffa80`01b51550 : nt!KiCommitThreadWait+0x3dd
fffff880`02515750 fffff800`02a9bb1e : fffffa80`029b8600 00000000`0000001b 00000000`00000000 fffff880`02f00100 : nt!KeWaitForSingleObject+0x19f
fffff880`025157f0 fffff800`02adb1bc : ffffffff`ffb3b4c0 fffffa80`02ac0d10 fffffa80`029b86a0 fffffa80`018e0b60 : nt!ExpWaitForResource+0xae
fffff880`02515860 fffff880`012335d3 : 00000000`c00000d8 fffff8a0`0012b5c0 fffff880`0251c390 fffff800`02b13ddc : nt!ExAcquireResourceExclusiveLite+0x14f
fffff880`025158d0 fffff880`012c78a1 : fffff8a0`0012b5c0 fffff880`0251c5e0 fffff8a0`0012b6f0 00000000`00000004 : Ntfs!NtfsAcquireExclusiveFcb+0x73
fffff880`02515920 fffff880`01236aa9 : fffff880`02121308 fffffa80`0376a900 fffff880`0251c2f0 fffffa80`0390b060 : Ntfs!NtfsCommonCleanup+0x271
fffff880`02515d30 fffff800`02acad87 : fffff880`0251c2f0 006e0069`0057005c 00730077`006f0064 00730079`0073005c : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`02515d60 fffff800`02acad41 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`0251c1c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ad10e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022111-25350-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50
Debug session time: Mon Feb 21 11:00:53.210 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:36.098
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002a9fc06}
Probably caused by : win32k.sys ( win32k!GreLockVisRgn+19 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a9fc06, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb60e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02a9fc06 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: nwiz.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880025a4320 -- (.trap 0xfffff880025a4320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880025a4408 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a9fc06 rsp=fffff880025a44b0 rbp=0000000000000000
r8=fffffa8002da2e10 r9=fffff880025a45b0 r10=0000000000000002
r11=fffffa8002da4dd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xc73:
fffff800`02a9fc06 488b09 mov rcx,qword ptr [rcx] ds:0009:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7f469 to fffff80002a7ff00
STACK_TEXT:
fffff880`025a41d8 fffff800`02a7f469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`025a41e0 fffff800`02a7e0e0 : 00000000`00000000 fffffa80`03c8aee0 fffff8a0`00000228 00000000`000e360e : nt!KiBugCheckDispatch+0x69
fffff880`025a4320 fffff800`02a9fc06 : 00000000`000007ff fffff800`02a0e000 00000000`00007e00 00000000`00000008 : nt!KiPageFault+0x260
fffff880`025a44b0 fffff800`02a5c92f : 00000000`00000000 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!IopCompleteRequest+0xc73
fffff880`025a4580 fffff800`02a8725d : fffff880`02f02ac0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`025a4600 fffff800`02a891af : 00000000`00000000 fffffa80`03c90b30 fffffa80`0000002a fffffa80`0193a9a0 : nt!KiCommitThreadWait+0x3dd
fffff880`025a4690 fffff800`02a48b1e : fffffa80`0345de00 00000000`0000001b 00000000`ffffff00 fffff880`02f00100 : nt!KeWaitForSingleObject+0x19f
fffff880`025a4730 fffff800`02a76ad1 : ffffffff`ffb3b4c0 fffffa80`0383e800 fffffa80`0345de50 00000000`00000000 : nt!ExpWaitForResource+0xae
fffff880`025a47a0 fffff800`02a8bcab : 00000000`00000030 fffffa80`03a3f060 fffff880`025a4c20 00000000`00000000 : nt!ExAcquireResourceSharedLite+0x2c6
fffff880`025a4810 fffff960`001b67d1 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!ExEnterPriorityRegionAndAcquireResourceShared+0x23
fffff880`025a4840 fffff960`000f3f93 : fffff900`c2693900 fffff880`025a4c20 00000000`ffffffff fffffa80`03c90b30 : win32k!GreLockVisRgn+0x19
fffff880`025a4870 fffff960`000f4046 : fffffa80`03639900 fffff900`c2693900 00020508`00000000 fffff880`025a4a30 : win32k!xxxUserProcessCallout+0x1a7
fffff880`025a48c0 fffff800`02d625e1 : fffffa80`03639940 00000000`00000000 00000000`00000000 fffffa80`03a3f060 : win32k!W32pProcessCallout+0x4e
fffff880`025a48f0 fffff800`02d3cb3d : 00000000`00000000 fffffa80`018dc001 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x2b1
fffff880`025a49c0 fffff800`02a5ca43 : fffffa80`03b0fb10 fffffa80`03b0fcc8 fffff880`025a4a10 fffffa80`03c90630 : nt!PsExitSpecialApc+0x1d
fffff880`025a49f0 fffff800`02a5ce80 : 00000000`001c1170 fffff880`025a4a70 fffff800`02d3d710 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`025a4a70 fffff800`02a7f1f7 : 00000000`00000372 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`025a4bb0 00000000`770701ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0215f508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770701ea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GreLockVisRgn+19
fffff960`001b67d1 488b1568391500 mov rdx,qword ptr [win32k!ghsemDynamicModeChange (fffff960`0030a140)]
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: win32k!GreLockVisRgn+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19
BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19
Followup: MachineOwner
---------
start end module name
fffff880`0107b000 fffff880`010d2000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03f6c000 fffff880`03faf000 ae6sdfso ae6sdfso.SYS Fri Aug 07 09:30:20 2009 (4A7C2C6C)
fffff880`03d42000 fffff880`03dcc000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fde4000 fffff880`0fdfa000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0102a000 fffff880`01035000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`011d4000 fffff880`011dd000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0102a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00820000 fffff960`00881000 ATMFD ATMFD.DLL Mon Jul 13 19:38:13 2009 (4A5BC565)
fffff880`02c6a000 fffff880`02cb2000 b57nd60a b57nd60a.sys Sun Apr 26 07:14:55 2009 (49F4422F)
fffff880`0121c000 fffff880`01223000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f1f000 fffff880`03f30000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02765000 fffff880`02783000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00750000 fffff960`00777000 cdd cdd.dll Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`04400000 fffff880`0442a000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cd0000 fffff880`00d90000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00dbf000 fffff880`00def000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c72000 fffff880`00cd0000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012e6000 fffff880`01359000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fdd4000 fffff880`0fde4000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02670000 fffff880`02679000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`041d2000 fffff880`041e0000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e7e000 fffff880`03f01000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f01000 fffff880`03f1f000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03e6f000 fffff880`03e7e000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01435000 fffff880`0144b000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045d5000 fffff880`045f7000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0445c000 fffff880`04465000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041e0000 fffff880`041ec000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041ec000 fffff880`041ff000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04000000 fffff880`0400c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`02ce5000 fffff880`02dd9000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`02c00000 fffff880`02c46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0fd92000 fffff880`0fdc8000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`02cd0000 fffff880`02cdd000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`01274000 fffff880`01288000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01228000 fffff880`01274000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0142b000 fffff880`01435000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01035000 fffff880`0106f000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0162b000 fffff880`01675000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02feb000 fffff800`03034000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`02c46000 fffff880`02c6a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04438000 fffff880`04451000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04451000 fffff880`04459080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0442a000 fffff880`04438000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0269d000 fffff880`02765000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017f3000 fffff880`017fc000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`011a2000 fffff880`011aa000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03f56000 fffff880`03f6c000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`040d3000 fffff880`040e2000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041b7000 fffff880`041c5000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba0000 fffff800`00ba3000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040f3000 fffff880`04136000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01400000 fffff880`0141a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01600000 fffff880`0162b000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`045f7000 fffff880`045fc200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`013df000 fffff880`013f4000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0401a000 fffff880`0403d000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c1a000 fffff880`00c5e000 mcupdate mcupdate.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0400c000 fffff880`0401a000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`040e2000 fffff880`040f1000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041c5000 fffff880`041d2000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`011ba000 fffff880`011d4000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02783000 fffff880`0279b000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0279b000 fffff880`027c7000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`02600000 fffff880`0264d000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`0264d000 fffff880`02670000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`03cfb000 fffff880`03d06000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`010d2000 fffff880`010dc000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01288000 fffff880`012e6000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03e64000 fffff880`03e6f000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0168d000 fffff880`0169f000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016a1000 fffff880`01793000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03fd3000 fffff880`03fdf000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04043000 fffff880`04072000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041a2000 fffff880`041b7000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03c74000 fffff880`03c83000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03c00000 fffff880`03c45000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01793000 fffff880`017f3000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`03d06000 fffff880`03d17000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03e58000 fffff880`03e64000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a0e000 fffff800`02feb000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0145a000 fffff880`015fd000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01213000 fffff880`0121c000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0fd90000 fffff880`0fd91180 nvBridge nvBridge.kmd Tue Mar 23 19:11:12 2010 (4BA94A90)
fffff880`0f059000 fffff880`0fd8fc80 nvlddmkm nvlddmkm.sys Tue Mar 23 19:33:35 2010 (4BA94FCF)
fffff880`03c4e000 fffff880`03c74000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`02dd9000 fffff880`02df6000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0111c000 fffff880`01131000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`010e9000 fffff880`0111c000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011aa000 fffff880`011ba000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0141a000 fffff880`0142b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04598000 fffff880`045d5000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5e000 fffff880`00c72000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03faf000 fffff880`03fd3000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04072000 fffff880`0408d000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0408d000 fffff880`040ae000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`040ae000 fffff880`040c8000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03e07000 fffff880`03e58000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`040c8000 fffff880`040d3000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`03ce0000 fffff880`03ce9000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03ce9000 fffff880`03cf2000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03cf2000 fffff880`03cfb000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`013a5000 fffff880`013df000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`00fe2000 fffff880`00ffa000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`00d90000 fffff880`00dbf000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`0fdc8000 fffff880`0fdd4000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03c83000 fffff880`03ca0000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01685000 fffff880`0168d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`00eb3000 fffff880`00fd9000 spva spva.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`04465000 fffff880`04598000 sthda64 sthda64.sys Wed Nov 16 14:49:04 2005 (437B8D30)
fffff880`040f1000 fffff880`040f2480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01801000 fffff880`019fe000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`03d35000 fffff880`03d42000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`03d17000 fffff880`03d35000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03de7000 fffff880`03dfb000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00490000 fffff960`0049a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03f30000 fffff880`03f56000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04136000 fffff880`04148000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0445a000 fffff880`0445bf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02cbf000 fffff880`02cd0000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04148000 fffff880`041a2000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0f000000 fffff880`0f056000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`02cb2000 fffff880`02cbf000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`010dc000 fffff880`010e9000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`011dd000 fffff880`011eb000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`03cab000 fffff880`03cd0000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01675000 fffff880`01685000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`01131000 fffff880`01146000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01146000 fffff880`011a2000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01359000 fffff880`013a5000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03dcc000 fffff880`03de7000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`03cd0000 fffff880`03ce0000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03c45000 fffff880`03c4e000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00030000 fffff960`0033f000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00fd9000 fffff880`00fe2000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03fdf000 fffff880`04000000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`0144b000 fffff880`01459000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`013df000 fffff880`013eb000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`013eb000 fffff880`013f4000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01200000 fffff880`01213000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`03ccb000 fffff880`03cf5000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002A000
Hi,
I have got this error in my Hd.What should I do now?