Frequent BSOD driving me insane on new year's eve :(

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Jamaica1937, Dec 31, 2010.

  1. Jamaica1937

    Jamaica1937 New Member

    Joined:
    Dec 31, 2010
    Messages:
    2
    Likes Received:
    0
    So this BSOD happens everytime I try and boot up my computer (Like 3 out of every 4 times), this computer is three months old but it never happened before like.. last wednesday

    here are the files you ask for

    Is Windows 7 . . .
    - x86 (32-bit) or x64 ? 64bit
    - the original installed OS on the system? Dos
    - an OEM or full retail version? Full retail
    - OEM = came pre-installed on system
    - Full Retail = you purchased it from retailer

    - What is the age of system (hardware)? 3months old
    - What is the age of OS installation (have you re-installed the OS?) Never

    Here's my dump files
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Hello and Welcome to windows7forums. : )

    1. http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html

    2. Drivers to update :

    RimSerial_AMD64.sys Mon Nov 24 12:01:01 2008
    RIM Modem
    Research in Motion Ltd


    Rt64win7.sys Thu Feb 26 04:04:13 2009
    Realtek 8136/8168/8169 PCI/PCIe


    nvlddmkm.sys Thu May 14 16:48:07 2009
    NVIDIA








    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\123110-25256-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
    Debug session time: Fri Dec 31 11:58:15.774 2010 (UTC - 5:00)
    System Uptime: 0 days 0:00:56.522
    Loading Kernel Symbols
    ..
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    .............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002a99448, 0, ffffffffffffffff}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002a99448, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c85
    fffff800`02a99448 488908          mov     qword ptr [rax],rcx
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  taskhost.exe
    
    CURRENT_IRQL:  2
    
    IRP_ADDRESS:  40c6fe40427387c8
    
    EXCEPTION_RECORD:  fffff88006280ec8 -- (.exr 0xfffff88006280ec8)
    ExceptionAddress: fffff80002a99448 (nt!IopCompleteRequest+0x0000000000000c85)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88006280f70 -- (.trap 0xfffff88006280f70)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=026b894466437388 rbx=0000000000000000 rcx=40c6fe4042738840
    rdx=fffff80002a888b1 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a99448 rsp=fffff88006281100 rbp=fffff88006281250
     r8=fffffa8004150c30  r9=fffff88006281200 r10=0000000000000002
    r11=fffffa8003f3a900 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po cy
    nt!IopCompleteRequest+0xc85:
    fffff800`02a99448 488908          mov     qword ptr [rax],rcx ds:026b8944`66437388=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab3a39 to fffff80002a79740
    
    STACK_TEXT:  
    fffff880`062806f8 fffff800`02ab3a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a99448 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06280700 fffff800`02a78d82 : fffff880`06280ec8 fffffa80`04102d30 fffff880`06280f70 00000000`00000000 : nt!KiDispatchException+0x1b9
    fffff880`06280d90 fffff800`02a7768a : 0000007f`fffffff8 fffff8a0`01f5503e fffff880`06281100 fffff800`02a95ca2 : nt!KiExceptionDispatch+0xc2
    fffff880`06280f70 fffff800`02a99448 : 00000015`00000000 fffffa80`018486a8 fffffa80`029fe3f8 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
    fffff880`06281100 fffff800`02a560c7 : 40c6fe40`42738840 fffffa80`029fe440 fffffa80`01848600 fffff880`00000000 : nt!IopCompleteRequest+0xc85
    fffff880`062811d0 fffff800`02a56487 : fffffa80`029b1810 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`06281250 fffff800`02a7b910 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
    fffff880`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0x80
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDispatchException+1b9
    fffff800`02ab3a39 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiDispatchException+1b9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiDispatchException+1b9
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!KiDispatchException+1b9
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\123110-24211-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
    Debug session time: Fri Dec 31 11:48:54.171 2010 (UTC - 5:00)
    System Uptime: 0 days 0:00:31.794
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ...............................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002aed448, fffff88003495ad0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002aed448, Address of the instruction which caused the bugcheck
    Arg3: fffff88003495ad0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c85
    fffff800`02aed448 488908          mov     qword ptr [rax],rcx
    
    CONTEXT:  fffff88003495ad0 -- (.cxr 0xfffff88003495ad0)
    rax=f88b41b7eb07e783 rbx=fffffa8002c07ee0 rcx=30245c8b48f30348
    rdx=fffff80002ae568f rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aed448 rsp=fffff880034964a0 rbp=fffff880034965f0
     r8=fffffa8002b62140  r9=fffff880034965a0 r10=0000000000000002
    r11=fffffa8003925850 r12=fffff880034963e0 r13=0000000000000000
    r14=fffffa8003bb9a60 r15=fffff80002c47e80
    iopl=0         nv up ei ng nz na pe cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010283
    nt!IopCompleteRequest+0xc85:
    fffff800`02aed448 488908          mov     qword ptr [rax],rcx ds:002b:f88b41b7`eb07e783=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  AtBroker.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002aed448
    
    STACK_TEXT:  
    fffff880`03495208 fffff800`02accca9 : 00000000`0000003b 00000000`c0000005 fffff800`02aed448 fffff880`03495ad0 : nt!KeBugCheckEx
    fffff880`03495210 fffff800`02acc5fc : fffff880`03496268 fffff880`03495ad0 00000000`00000000 fffff800`02afbc90 : nt!KiBugCheckDispatch+0x69
    fffff880`03495350 fffff800`02af340d : fffff800`02cd8b4c fffff800`02c1cb2c fffff800`02a5d000 fffff880`03496268 : nt!KiSystemServiceHandler+0x7c
    fffff880`03495390 fffff800`02afaa90 : fffff800`02c1d1a0 fffff880`03495408 fffff880`03496268 fffff800`02a5d000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`034953c0 fffff800`02b079ef : fffff880`03496268 fffff880`03495ad0 fffff880`00000000 00000000`00000004 : nt!RtlDispatchException+0x410
    fffff880`03495aa0 fffff800`02accd82 : fffff880`03496268 fffffa80`02c07ee0 fffff880`03496310 00000000`00000000 : nt!KiDispatchException+0x16f
    fffff880`03496130 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemServiceHandler+7c
    fffff800`02acc5fc b801000000      mov     eax,1
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiSystemServiceHandler+7c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c
    
    BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\123110-25256-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
    Debug session time: Fri Dec 31 11:58:15.774 2010 (UTC - 5:00)
    System Uptime: 0 days 0:00:56.522
    Loading Kernel Symbols
    ..
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    .............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002a99448, 0, ffffffffffffffff}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002a99448, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c85
    fffff800`02a99448 488908          mov     qword ptr [rax],rcx
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  taskhost.exe
    
    CURRENT_IRQL:  2
    
    IRP_ADDRESS:  40c6fe40427387c8
    
    EXCEPTION_RECORD:  fffff88006280ec8 -- (.exr 0xfffff88006280ec8)
    ExceptionAddress: fffff80002a99448 (nt!IopCompleteRequest+0x0000000000000c85)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88006280f70 -- (.trap 0xfffff88006280f70)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=026b894466437388 rbx=0000000000000000 rcx=40c6fe4042738840
    rdx=fffff80002a888b1 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a99448 rsp=fffff88006281100 rbp=fffff88006281250
     r8=fffffa8004150c30  r9=fffff88006281200 r10=0000000000000002
    r11=fffffa8003f3a900 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po cy
    nt!IopCompleteRequest+0xc85:
    fffff800`02a99448 488908          mov     qword ptr [rax],rcx ds:026b8944`66437388=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab3a39 to fffff80002a79740
    
    STACK_TEXT:  
    fffff880`062806f8 fffff800`02ab3a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a99448 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06280700 fffff800`02a78d82 : fffff880`06280ec8 fffffa80`04102d30 fffff880`06280f70 00000000`00000000 : nt!KiDispatchException+0x1b9
    fffff880`06280d90 fffff800`02a7768a : 0000007f`fffffff8 fffff8a0`01f5503e fffff880`06281100 fffff800`02a95ca2 : nt!KiExceptionDispatch+0xc2
    fffff880`06280f70 fffff800`02a99448 : 00000015`00000000 fffffa80`018486a8 fffffa80`029fe3f8 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
    fffff880`06281100 fffff800`02a560c7 : 40c6fe40`42738840 fffffa80`029fe440 fffffa80`01848600 fffff880`00000000 : nt!IopCompleteRequest+0xc85
    fffff880`062811d0 fffff800`02a56487 : fffffa80`029b1810 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`06281250 fffff800`02a7b910 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
    fffff880`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0x80
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDispatchException+1b9
    fffff800`02ab3a39 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiDispatchException+1b9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiDispatchException+1b9
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!KiDispatchException+1b9
    
    Followup: MachineOwner
    ---------
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00f9d000 fffff880`00ff4000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03a64000 fffff880`03aee000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`05600000 fffff880`05616000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00c00000 fffff880`00c0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00dc8000 fffff880`00dd1000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dd1000 fffff880`00dfb000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0198f000 fffff880`01996000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03d17000 fffff880`03d28000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`038da000 fffff880`038f8000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00750000 fffff960`00777000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0195c000 fffff880`01986000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cee000 fffff880`00dae000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018f6000 fffff880`01926000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c90000 fffff880`00cee000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`061ec000 fffff880`061fc000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0418c000 fffff880`0419a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03c76000 fffff880`03cf9000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03cf9000 fffff880`03d17000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03bc8000 fffff880`03bd7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018e0000 fffff880`018f6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04110000 fffff880`04132000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`041a6000 fffff880`041af000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0419a000 fffff880`041a6000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`041af000 fffff880`041c2000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`041c2000 fffff880`041ce000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03ef9000 fffff880`03fed000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03e00000 fffff880`03e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`01129000 fffff880`0113d000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010dd000 fffff880`01129000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`018a6000 fffff880`018e0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02fe5000 fffff800`0302e000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03e46000 fffff880`03e6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04077000 fffff880`040d3000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`041dc000 fffff880`041f5000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`041f5000 fffff880`041fd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`041ce000 fffff880`041dc000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`03812000 fffff880`038da000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`014ed000 fffff880`014f6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`061ce000 fffff880`061ec000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`039ae000 fffff880`039d3000   idmwfp   idmwfp.sys   Fri Nov 12 16:11:10 2010 (4CDDAD6E)
    fffff880`00ed0000 fffff880`00ed8000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03d4e000 fffff880`03d64000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`03fed000 fffff880`03ffc000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00baf000 fffff800`00bb2000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
    fffff880`0183c000 fffff880`0187f000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`04132000 fffff880`04137200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`01926000 fffff880`0193b000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03bd7000 fffff880`03bfa000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`03c00000 fffff880`03c3c880   mcdbus   mcdbus.sys   Tue Feb 24 05:34:07 2009 (49A3CD1F)
    fffff880`00c38000 fffff880`00c7c000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`03deb000 fffff880`03df9000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03ee3000 fffff880`03ef2000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00dae000 fffff880`00dc8000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`038f8000 fffff880`03910000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03910000 fffff880`0393d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0393d000 fffff880`0398b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0398b000 fffff880`039ae000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`019f4000 fffff880`019ff000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0113d000 fffff880`0119b000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03bbd000 fffff880`03bc8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015ec000 fffff880`015fe000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014fa000 fffff880`015ec000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0563a000 fffff880`05646000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03d64000 fffff880`03d93000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04062000 fffff880`04077000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03b62000 fffff880`03b71000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03aee000 fffff880`03b33000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01800000 fffff880`01811000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03a51000 fffff880`03a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a09000 fffff800`02fe5000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01245000 fffff880`013e8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01986000 fffff880`0198f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`05670000 fffff880`06177b00   nvlddmkm nvlddmkm.sys Thu May 14 16:48:07 2009 (4A0C8387)
    fffff880`03b3c000 fffff880`03b62000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`03ec6000 fffff880`03ee3000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00ed8000 fffff880`00ee8000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05092000 fffff880`05138000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`040d3000 fffff880`04110000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c7c000 fffff880`00c90000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`05616000 fffff880`0563a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05646000 fffff880`05661000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03d93000 fffff880`03db4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03db4000 fffff880`03dce000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03a00000 fffff880`03a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03dce000 fffff880`03dd9000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019d9000 fffff880`019e2000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019e2000 fffff880`019eb000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019eb000 fffff880`019f4000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0119b000 fffff880`011d5000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05661000 fffff880`05668c00   RimSerial_AMD64 RimSerial_AMD64.sys Mon Nov 24 12:01:01 2008 (492ADDCD)
    fffff880`0193b000 fffff880`01953000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03e6a000 fffff880`03e9c000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
    fffff880`03c3d000 fffff880`03c6c000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`05138000 fffff880`05143000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`03eba000 fffff880`03ec6000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`03b71000 fffff880`03b8e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`014e5000 fffff880`014ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`054da000 fffff880`05570000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`05182000 fffff880`051e9000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`05143000 fffff880`05170000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`03ffc000 fffff880`03ffd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`05170000 fffff880`05182000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0182f000 fffff880`0183c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01811000 fffff880`0182f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03ba9000 fffff880`03bbd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03d28000 fffff880`03d4e000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`04138000 fffff880`0418c000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`03dd9000 fffff880`03deb000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`041fe000 fffff880`041fff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03ea9000 fffff880`03eba000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04008000 fffff880`04062000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`06178000 fffff880`061ce000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`03e9c000 fffff880`03ea9000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01996000 fffff880`019a4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019a4000 fffff880`019c9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`014d5000 fffff880`014e5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03b8e000 fffff880`03ba9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019c9000 fffff880`019d9000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03b33000 fffff880`03b3c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
    fffff880`00ff4000 fffff880`00ffd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0187f000 fffff880`018a0000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`01926000 fffff880`01934000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01934000 fffff880`01940000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01940000 fffff880`01949000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01949000 fffff880`0195c000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     

Share This Page

Loading...