Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022211-18954-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03066000 PsLoadedModuleList = 0xfffff800`032a3e50
Debug session time: Tue Feb 22 15:59:04.325 2011 (UTC - 5:00)
System Uptime: 0 days 3:28:55.057
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff9600009b068, fffff8801667b320, 0}
Probably caused by : win32k.sys ( win32k!ESTROBJ::vInit+d8 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff9600009b068, Address of the instruction which caused the bugcheck
Arg3: fffff8801667b320, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!ESTROBJ::vInit+d8
fffff960`0009b068 0fbaa33807000012 bt dword ptr [rbx+738h],12h
CONTEXT: fffff8801667b320 -- (.cxr 0xfffff8801667b320)
rax=fffff900c1eae020 rbx=fff7f900c00bf010 rcx=fffff900c00bfe10
rdx=fffff900c0081054 rsi=fffff8801667c000 rdi=0000000041800000
rip=fffff9600009b068 rsp=fffff8801667bcf0 rbp=0000000000000000
r8=0000000000000001 r9=000000000000001e r10=fffff900c0081054
r11=fffff8801667c2b0 r12=0000000000000000 r13=fffff8801667be20
r14=fffff8801667c2b0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!ESTROBJ::vInit+0xd8:
fffff960`0009b068 0fbaa33807000012 bt dword ptr [rbx+738h],12h ds:002b:fff7f900`c00bf748=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960000728de to fffff9600009b068
STACK_TEXT:
fffff880`1667bcf0 fffff960`000728de : fffff900`41800000 00000000`00000000 fffff900`00000001 fffff880`1667c2b0 : win32k!ESTROBJ::vInit+0xd8
fffff880`1667bd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!GreExtTextOutWLocked+0xb12
FOLLOWUP_IP:
win32k!ESTROBJ::vInit+d8
fffff960`0009b068 0fbaa33807000012 bt dword ptr [rbx+738h],12h
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!ESTROBJ::vInit+d8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d23ecb0
STACK_COMMAND: .cxr 0xfffff8801667b320 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!ESTROBJ::vInit+d8
BUCKET_ID: X64_0x3B_win32k!ESTROBJ::vInit+d8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021911-23290-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03015000 PsLoadedModuleList = 0xfffff800`03252e50
Debug session time: Sat Feb 19 12:17:50.208 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:12.940
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031b8f8c, fffff88003833790, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031b8f8c, Address of the instruction which caused the bugcheck
Arg3: fffff88003833790, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+100
fffff800`031b8f8c 4c8b02 mov r8,qword ptr [rdx]
CONTEXT: fffff88003833790 -- (.cxr 0xfffff88003833790)
rax=fffffa8003963610 rbx=0000000000000003 rcx=fffffa8003963610
rdx=fff7f8a008e9dd00 rsi=0000000000000000 rdi=fffff8a008f23920
rip=fffff800031b8f8c rsp=fffff88003834160 rbp=0000000000000000
r8=fff7f8a008e9dd00 r9=0000000000000000 r10=fffff8a008e9dbe0
r11=0000000000000001 r12=fffffa80039633c0 r13=0000000000000000
r14=0000000000000016 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExDeferredFreePool+0x100:
fffff800`031b8f8c 4c8b02 mov r8,qword ptr [rdx] ds:002b:fff7f8a0`08e9dd00=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031b8f8c
STACK_TEXT:
fffff880`03834160 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100
FOLLOWUP_IP:
nt!ExDeferredFreePool+100
fffff800`031b8f8c 4c8b02 mov r8,qword ptr [rdx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+100
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88003833790 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+100
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+100
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-22105-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
Debug session time: Sun Feb 20 12:38:43.993 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:15.806
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880037c3688, fffff880037c2ef0, fffff88001300535}
Probably caused by : Ntfs.sys ( Ntfs!NtfsExpandHashTable+75 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880037c3688
Arg3: fffff880037c2ef0
Arg4: fffff88001300535
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880037c3688 -- (.exr 0xfffff880037c3688)
ExceptionAddress: fffff88001300535 (Ntfs!NtfsExpandHashTable+0x0000000000000075)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880037c2ef0 -- (.cxr 0xfffff880037c2ef0)
rax=0000000000000fff rbx=fffffa8004a3f350 rcx=fff7f8a001d01c70
rdx=0000000000001000 rsi=fffffa8004230850 rdi=00000000000003ff
rip=fffff88001300535 rsp=fffff880037c38c0 rbp=000000002b7e998a
r8=fffff8a0025f0230 r9=fffff8a0095dc230 r10=fffffa8003961148
r11=0000000000000001 r12=fffff8a0030605f0 r13=0000000000000010
r14=fffff8a0097c7e10 r15=fffff8800e9ba4b0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
Ntfs!NtfsExpandHashTable+0x75:
fffff880`01300535 234110 and eax,dword ptr [rcx+10h] ds:002b:fff7f8a0`01d01c80=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032aa0e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsExpandHashTable+75
fffff880`01300535 234110 and eax,dword ptr [rcx+10h]
FAULTING_IP:
Ntfs!NtfsExpandHashTable+75
fffff880`01300535 234110 and eax,dword ptr [rcx+10h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880012f9896 to fffff88001300535
STACK_TEXT:
fffff880`037c38c0 fffff880`012f9896 : fffffa80`04a3f350 fffffa80`04a3f350 00000000`2b7e998a 00000000`00000000 : Ntfs!NtfsExpandHashTable+0x75
fffff880`037c38f0 fffff880`012bf149 : 00000000`00000000 fffffa80`042d1660 fffffa80`04230850 00000000`000007ff : Ntfs!NtfsInsertHashEntry+0x152
fffff880`037c3970 fffff880`012e2b04 : fffff880`0e9ba4b0 fffffa80`042d1660 fffffa80`04230850 00000000`00000000 : Ntfs!NtfsOpenFile+0x61d
fffff880`037c3b50 fffff880`0124bc0d : fffffa80`04230850 fffffa80`042d1660 fffff880`0e9ba4b0 fffffa80`03fed000 : Ntfs!NtfsCommonCreate+0xc54
fffff880`037c3d30 fffff800`0306a5c7 : fffff880`0e9ba420 122930cf`6b38447d 6d3d33be`4788fb53 4e08a555`45fa5a64 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`037c3d60 fffff800`0306a581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0e9ba2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsExpandHashTable+75
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff880037c2ef0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsExpandHashTable+75
BUCKET_ID: X64_0x24_Ntfs!NtfsExpandHashTable+75
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022211-33431-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0305d000 PsLoadedModuleList = 0xfffff800`0329ae50
Debug session time: Tue Feb 22 16:00:58.083 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:13.815
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1, {77bcf72a, 0, ffff, fffff88008b2eca0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them. A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 0000000077bcf72a, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88008b2eca0, Previous KernelApcDisable
Debugging Details:
------------------
FAULTING_IP:
+3337313634396637
00000000`77bcf72a ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030ccca9 to fffff800030cd740
STACK_TEXT:
fffff880`08b2ea68 fffff800`030ccca9 : 00000000`00000001 00000000`77bcf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08b2ea70 fffff800`030ccbe0 : 00000000`00001045 00000000`00000738 00000000`00000000 0000007f`ffffffff : nt!KiBugCheckDispatch+0x69
fffff880`08b2ebb0 00000000`77bcf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`027ae918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bcf72a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+245
fffff800`030ccbe0 4883ec50 sub rsp,50h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceExit+245
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
BUCKET_ID: X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
Followup: MachineOwner
---------
start end module name
fffff880`03f90000 fffff880`03fce000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00e72000 fffff880`00ec9000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b6b000 fffff880`02bf5000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06da1000 fffff880`06db7000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03dc2000 fffff880`03dd7000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`06d1d000 fffff880`06d25000 ASACPI ASACPI.sys Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`03d96000 fffff880`03d9c000 AsIO AsIO.sys Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`03d90000 fffff880`03d96000 AsUpIO AsUpIO.sys Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00fd3000 fffff880`00fdc000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01409000 fffff880`01411000 AtiPcie AtiPcie.sys Mon Aug 24 04:25:26 2009 (4A924E76)
fffff880`02abf000 fffff880`02ac6000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d7f000 fffff880`03d90000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07ccd000 fffff880`07ceb000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007a0000 fffff960`007c7000 cdd cdd.dll unavailable (00000000)
fffff880`02a5b000 fffff880`02a85000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c9b000 fffff880`00d5b000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c3d000 fffff880`00c9b000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010ee000 fffff880`01161000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`06d91000 fffff880`06da1000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`094e9000 fffff880`094f7000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03d61000 fffff880`03d7f000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03d52000 fffff880`03d61000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`011e7000 fffff880`011fd000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`07e99000 fffff880`07ebb000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`03c78000 fffff880`03cbb000 dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`09503000 fffff880`0950c000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`094f7000 fffff880`09503000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0950c000 fffff880`0951f000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`094cf000 fffff880`094db000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e32000 fffff880`03f26000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`03f26000 fffff880`03f6c000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0107c000 fffff880`01090000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01030000 fffff880`0107c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e2000 fffff880`013ec000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00e35000 fffff880`00e6f000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0159b000 fffff880`015e5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03e00000 fffff880`03e0d000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03014000 fffff800`0305d000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03f6c000 fffff880`03f90000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`07e00000 fffff880`07e5c000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`0952d000 fffff880`09546000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`09546000 fffff880`0954e080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0951f000 fffff880`0952d000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07c05000 fffff880`07ccd000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01400000 fffff880`01409000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`06c85000 fffff880`06c94000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`09579000 fffff880`09587000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcb000 fffff800`00bd5000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`07ed2000 fffff880`07f15000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013b7000 fffff880`013d1000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01570000 fffff880`0159b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`07ebb000 fffff880`07ec0200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`095cb000 fffff880`095e0000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`09587000 fffff880`095aa000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c1c000 fffff880`00c29000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`094db000 fffff880`094e9000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`06c94000 fffff880`06ca3000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0956c000 fffff880`09579000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fb9000 fffff880`00fd3000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a85000 fffff880`02ab6000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`09600000 fffff880`09610000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`07ceb000 fffff880`07d03000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07d03000 fffff880`07d30000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07d30000 fffff880`07d7e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07d7e000 fffff880`07da1000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02b24000 fffff880`02b2f000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ed2000 fffff880`00edc000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01090000 fffff880`010ee000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03d47000 fffff880`03d52000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015ed000 fffff880`015ff000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0141e000 fffff880`01510000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06ddb000 fffff880`06de7000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`09253000 fffff880`09266000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`06c00000 fffff880`06c2f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07f99000 fffff880`07fae000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03c4c000 fffff880`03c5b000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a00000 fffff880`02a45000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01510000 fffff880`01570000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`07da1000 fffff880`07db6000 NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`02b2f000 fffff880`02b40000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03d3b000 fffff880`03d47000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0305d000 fffff800`0363a000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01214000 fffff880`013b7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02ab6000 fffff880`02abf000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`07f27000 fffff880`07f3f000 nusb3hub nusb3hub.sys Tue Feb 23 21:10:14 2010 (4B848A86)
fffff880`03fce000 fffff880`03ffe000 nusb3xhc nusb3xhc.sys Tue Feb 23 21:10:16 2010 (4B848A88)
fffff880`07bf6000 fffff880`07bf7180 nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`0701c000 fffff880`07bf5a80 nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`09200000 fffff880`09253000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03c10000 fffff880`03c36000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f1c000 fffff880`00f31000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00edc000 fffff880`00f0f000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fa2000 fffff880`00fa9000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fa9000 fffff880`00fb9000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d1000 fffff880`013e2000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`09611000 fffff880`096b7000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`07e5c000 fffff880`07e99000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c29000 fffff880`00c3d000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`06db7000 fffff880`06ddb000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06c2f000 fffff880`06c4a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`06c4a000 fffff880`06c6b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`06c6b000 fffff880`06c85000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03cea000 fffff880`03d3b000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02b09000 fffff880`02b12000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b12000 fffff880`02b1b000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b1b000 fffff880`02b24000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011ad000 fffff880`011e7000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`09266000 fffff880`0927e000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06d31000 fffff880`06d88000 Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`09292000 fffff880`094ce280 RTKVHD64 RTKVHD64.sys Tue Apr 20 04:46:52 2010 (4BCD69FC)
fffff880`096b7000 fffff880`096c2000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`06d25000 fffff880`06d31000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03c5b000 fffff880`03c78000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015e5000 fffff880`015ed000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`09768000 fffff880`097fe000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`09701000 fffff880`09768000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`096c2000 fffff880`096ef000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`06ca3000 fffff880`06ca4480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`096ef000 fffff880`09701000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b5e000 fffff880`02b6b000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b40000 fffff880`02b5e000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03cd6000 fffff880`03cea000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03d9c000 fffff880`03dc2000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`07f15000 fffff880`07f27000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0954f000 fffff880`0956c000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`03ffe000 fffff880`03ffff00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`06d0c000 fffff880`06d1d000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`07f3f000 fffff880`07f99000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03e0d000 fffff880`03e18000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`06cb6000 fffff880`06d0c000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f0f000 fffff880`00f1c000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02ac6000 fffff880`02ad4000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02ad4000 fffff880`02af9000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f31000 fffff880`00f46000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f46000 fffff880`00fa2000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01161000 fffff880`011ad000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c36000 fffff880`03c4c000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03cbb000 fffff880`03cd6000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02af9000 fffff880`02b09000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d5b000 fffff880`00dff000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00c00000 fffff880`00c0f000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a45000 fffff880`02a4e000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`003a0000 win32k win32k.sys Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`06d88000 fffff880`06d91000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ec9000 fffff880`00ed2000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`095aa000 fffff880`095cb000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`013ec000 fffff880`013fa000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01411000 fffff880`0141d000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01200000 fffff880`01209000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`00fdc000 fffff880`00fef000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
I never would have figured that out.
Thank you very much, really appreciate it.
That's what it should be, correct?
So far it hasn't crashed today, and I'm crossing my fingers that that's a good sign. It does it so irregularly, though, that I don't know if that is what would have done it or not.
me said:2. Start > Accessories > Command Prompt > chkdsk /f
3. Start > Accessories > Command Prompt > sfc /scannow
4. Your drivers look OK. You might benefit updating to the latest:
Realtek Audio Realtek
Realtek LAN Realtek
Motherboard driver for USB 3.0 ASUSTeK Computer Inc.-Support-