Windows 7 irql not equal or less bsod

reginanegra

New Member
Joined
Feb 1, 2011
i have windows 7 ultimate and as i was trying to install a game i got this blue screen. i ve tried to locate exactly what the problem is but i cant make sense of it all. i have the dmp files here if anyone can help me with these.
 

Attachments

  • dmp.rar
    161.4 KB · Views: 268
1. Uninstall AVG,

AVG - Download tools


2. Install MSE:

Link Removed due to 404 Error



3. Uninstall Daemon Tools. Clear up with this tool:

DuplexSecure - FAQ




4. Update drivers:

PenTablet
PTSimBus.sys Wed Jun 17 22:20:48 2009

Realtek PCI Lan
Rt64win7.sys Thu Feb 26 04:04:13 2009







Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-19032-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue Feb  1 10:22:12.084 2011 (UTC - 5:00)
System Uptime: 0 days 0:58:47.860
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {90, 2, 0, fffff80002a94995}

Unable to load image \SystemRoot\System32\Drivers\msrpc.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for msrpc.sys
*** ERROR: Module load completed but symbols could not be loaded for msrpc.sys
Probably caused by : msrpc.sys ( msrpc+261c8 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000090, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a94995, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
 0000000000000090 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiCommitThreadWait+1d5
fffff800`02a94995 488bbb90000000  mov     rdi,qword ptr [rbx+90h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  slui.exe

TRAP_FRAME:  fffff88007e272b0 -- (.trap 0xfffff88007e272b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007e27400
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a94995 rsp=fffff88007e27440 rbp=0000000000000001
 r8=fffffa8005a03af8  r9=0000000000000000 r10=fffffffffffffffd
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiCommitThreadWait+0x1d5:
fffff800`02a94995 488bbb90000000  mov     rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8cca9 to fffff80002a8d740

STACK_TEXT:  
fffff880`07e27168 fffff800`02a8cca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07e27170 fffff800`02a8b920 : 00000000`00000000 00000000`00000000 fffffa80`00000001 fffffa80`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`07e272b0 fffff800`02a94995 : fffffa80`06627b60 fffffa80`06627b60 fffff800`02dfce00 fffff800`00000009 : nt!KiPageFault+0x260
fffff880`07e27440 fffff800`02a96cff : fffff880`009e8180 fffff880`009e8180 00000000`00000040 fffffa80`03c1f590 : nt!KiCommitThreadWait+0x1d5
fffff880`07e274d0 fffff880`00dbe1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`06988c00 : nt!KeWaitForSingleObject+0x19f
fffff880`07e27570 00000000`00000000 : fffff8a0`00000000 00000000`00000000 fffffa80`06988c00 fffff880`009e8180 : msrpc+0x261c8


STACK_COMMAND:  kb

FOLLOWUP_IP: 
msrpc+261c8
fffff880`00dbe1c8 ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  msrpc+261c8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: msrpc

IMAGE_NAME:  msrpc.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  X64_0xA_msrpc+261c8

BUCKET_ID:  X64_0xA_msrpc+261c8

Followup: MachineOwner
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-31777-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a54000 PsLoadedModuleList = 0xfffff800`02c91e50
Debug session time: Tue Feb  1 09:22:32.165 2011 (UTC - 5:00)
System Uptime: 0 days 2:11:54.789
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F7, {fffff88007d3a220, 1dc29e234b4c, ffffe23d61dcb4b3, 0}

Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned.  This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: fffff88007d3a220, Actual security check cookie from the stack
Arg2: 00001dc29e234b4c, Expected security check cookie
Arg3: ffffe23d61dcb4b3, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


DEFAULT_BUCKET_ID:  GS_FALSE_POSITIVE_MISSING_GSFRAME

SECURITY_COOKIE:  Expected 00001dc29e234b4c found fffff88007d3a220

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0xF7

PROCESS_NAME:  slui.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002b594c5 to fffff80002ac4740

STACK_TEXT:  
fffff880`07d3a198 fffff800`02b594c5 : 00000000`000000f7 fffff880`07d3a220 00001dc2`9e234b4c ffffe23d`61dcb4b3 : nt!KeBugCheckEx
fffff880`07d3a1a0 fffff800`02a9fa52 : fffff880`00001000 00000000`00000000 fffff880`01a00000 fffff880`07d3a280 : nt!_report_gsfailure+0x25
fffff880`07d3a1e0 fffff800`02aa79fe : fffffa80`0430b430 fffff8a0`09c13000 fffffa80`042f38c0 fffffa80`00000000 : nt!EtwpEventWriteFull+0x4b2
fffff880`07d3a450 fffff800`02e6c2f6 : 00000000`00000034 00000000`ff9e00f0 fffff880`07d3a758 fffff880`07d3a740 : nt!EtwWrite+0xae
fffff880`07d3a4c0 fffff800`02b332ea : fffffa80`03b57000 00000000`00000000 00000000`ff9e0000 fffff800`02da0000 : nt!EtwpPsProvTraceImage+0x1c5
fffff880`07d3a5a0 fffff800`02d1fdc5 : fffffa80`06255d00 fffffa80`03b57000 fffff8a0`00002000 fffff880`07d3a758 : nt! ?? ::FNODOBFM::`string'+0x29333
fffff880`07d3a6c0 fffff800`02d8143e : fffffa80`039c1b30 00000000`00000000 fffffa80`0436c3e0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210c6
fffff880`07d3a860 fffff800`02da9cd4 : 000007ff`fffd6000 fffff880`07d3abe0 00000000`00000000 fffffa80`05a54710 : nt!PspExitProcess+0x4e
fffff880`07d3a8c0 fffff800`02d82635 : 00000000`00000000 fffff800`02dc3101 000007ff`fffd6000 00000000`00000000 : nt!PspExitThread+0x834
fffff880`07d3a980 fffff800`02aa11db : fffffa80`03f80b01 fffffa80`03f9d290 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`07d3a9b0 fffff800`02aa1620 : 00000000`0013fb40 fffff880`07d3aa30 fffff800`02d8274c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`07d3aa30 fffff800`02ac3a37 : 00000000`0000039d 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`07d3ab70 00000000`7772008a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0202eed8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7772008a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!_report_gsfailure+25
fffff800`02b594c5 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!_report_gsfailure+25

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xF7_MISSING_GSFRAME_nt!_report_gsfailure+25

BUCKET_ID:  X64_0xF7_MISSING_GSFRAME_nt!_report_gsfailure+25

Followup: MachineOwner
---------











Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-17596-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02c3ee50
Debug session time: Tue Feb  1 10:31:52.405 2011 (UTC - 5:00)
System Uptime: 0 days 0:08:53.153
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002a912b3}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a912b3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ca90e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02a912b3 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  explorer.exe

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff88005483630 -- (.trap 0xfffff88005483630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880054836e8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a912b3 rsp=fffff880054837c0 rbp=0000000000000000
 r8=fffffa80051eb420  r9=fffff880054838c0 r10=0000000000000002
r11=fffffa80051dc240 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02a912b3 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a70ca9 to fffff80002a71740

STACK_TEXT:  
fffff880`054834e8 fffff800`02a70ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`054834f0 fffff800`02a6f920 : 00000000`00000000 fffffa80`044084d0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`05483630 fffff800`02a912b3 : fffffa80`068a4560 fffff800`02a775da 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`054837c0 fffff800`02a4e0c7 : 00000000`00000001 00000000`00000000 00000000`00000000 ffffe541`00000000 : nt!IopCompleteRequest+0xae3
fffff880`05483890 fffff800`02a78b9d : fffff880`009eae40 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`05483910 fffff800`02a7c2a1 : fffffa80`06074ec8 fffffa80`068a4560 fffffa80`00000046 fffff8a0`01f611d0 : nt!KiCommitThreadWait+0x3dd
fffff880`054839a0 fffff800`02d6cdf7 : fffffa80`00010000 fffff880`05483b88 00000000`00000001 fffff880`05483b00 : nt!KeRemoveQueueEx+0x301
fffff880`05483a50 fffff800`02a81aa6 : 00000000`00000000 fffff880`05483b68 fffff880`05483b88 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`05483ae0 fffff800`02a70993 : fffffa80`068a4560 00000000`77ca4270 fffff880`05483c60 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`05483be0 00000000`77bf165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0c1ff678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf165a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02a6f920 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020111-20046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Tue Feb  1 10:37:58.770 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:50.518
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002d6fc9a, fffff88007961cb0, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpDeleteNameCheck+2a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002d6fc9a, Address of the instruction which caused the bugcheck
Arg3: fffff88007961cb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpDeleteNameCheck+2a
fffff800`02d6fc9a f0480fba691000  lock bts qword ptr [rcx+10h],0

CONTEXT:  fffff88007961cb0 -- (.cxr 0xfffff88007961cb0)
rax=fffffa80073d2060 rbx=0000000000000000 rcx=0000000107868300
rdx=fffffa80066881e1 rsi=0000000107868300 rdi=0000000000000200
rip=fffff80002d6fc9a rsp=fffff88007962680 rbp=0050e0c24f000000
 r8=fffffa80066881e0  r9=fffff80002bede80 r10=fffffa8003a49c10
r11=fffffa8006ba4190 r12=fffffa8000000000 r13=0000000000000001
r14=fffffa8003a76c00 r15=fffff8a002f6bf90
iopl=0         nv up ei ng nz ac po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010296
nt!ObpDeleteNameCheck+0x2a:
fffff800`02d6fc9a f0480fba691000  lock bts qword ptr [rcx+10h],0 ds:002b:00000001`07868310=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  taskhost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002d6fc9a

STACK_TEXT:  
fffff880`07962680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpDeleteNameCheck+0x2a


FOLLOWUP_IP: 
nt!ObpDeleteNameCheck+2a
fffff800`02d6fc9a f0480fba691000  lock bts qword ptr [rcx+10h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpDeleteNameCheck+2a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88007961cb0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpDeleteNameCheck+2a

BUCKET_ID:  X64_0x3B_nt!ObpDeleteNameCheck+2a

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`0fe00000 fffff880`0fe45000   a6uj2290 a6uj2290.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c00000 fffff880`02c8a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe55000 fffff880`0fe6b000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00fe8000 fffff880`00ff3000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04c33000 fffff880`04d3d000   arusb_win7x arusb_win7x.sys Thu Nov 26 03:55:17 2009 (4B0E4275)
fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db0000 fffff880`00dda000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03a00000 fffff880`03a6e000   avgldx64 avgldx64.sys Thu Jul 09 20:19:20 2009 (4A568908)
fffff880`03bb5000 fffff880`03bbb880   avgmfx64 avgmfx64.sys Wed Jul 01 16:38:25 2009 (4A4BC941)
fffff880`02d13000 fffff880`02d37000   avgtdia  avgtdia.sys  Mon Apr 06 09:43:58 2009 (49DA071E)
fffff880`0140c000 fffff880`01413000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ba4000 fffff880`03bb5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`067a0000 fffff880`067be000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00770000 fffff960`00797000   cdd      cdd.dll      unavailable (00000000)
fffff880`00c60000 fffff880`00c8a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00e2a000 fffff880`00eea000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013d0000 fffff880`01400000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cf6000 fffff880`00d54000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0148c000 fffff880`014ff000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fe45000 fffff880`0fe55000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`040c1000 fffff880`040cf000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03b03000 fffff880`03b86000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03b86000 fffff880`03ba4000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03af4000 fffff880`03b03000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`015da000 fffff880`015f0000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04099000 fffff880`040bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`040db000 fffff880`040e4000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`040cf000 fffff880`040db000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041d2000 fffff880`041e5000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04d3d000 fffff880`04d49000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eac000 fffff880`03fa0000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03fa0000 fffff880`03fe6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03e74000 fffff880`03e81000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c4c000 fffff880`00c60000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`041b2000 fffff880`041bd000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c00000 fffff880`00c4c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01510000 fffff880`0151a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015a0000 fffff880`015da000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`017a4000 fffff880`017ee000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03fe6000 fffff880`03ff3000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02fdf000 fffff800`03028000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04000000 fffff880`0405c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04d83000 fffff880`04d9c000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04d9c000 fffff880`04da4080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04d75000 fffff880`04d83000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`066d8000 fffff880`067a0000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0161a000 fffff880`01623000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00fd0000 fffff880`00fd8000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03be2000 fffff880`03bf8000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03a79000 fffff880`03a88000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04da5000 fffff880`04db3000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9b000 fffff800`00b9e000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040f7000 fffff880`0413a000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01472000 fffff880`0148c000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01779000 fffff880`017a4000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`040bb000 fffff880`040c0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`041e5000 fffff880`041fa000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04dd7000 fffff880`04dfa000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c9e000 fffff880`00ce2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04dc9000 fffff880`04dd7000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`040e6000 fffff880`040f5000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04dbc000 fffff880`04dc9000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`067be000 fffff880`067d6000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06600000 fffff880`0662d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06a97000 fffff880`06ae5000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`06ae5000 fffff880`06b08000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02ccc000 fffff880`02cd7000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01414000 fffff880`01472000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03ae9000 fffff880`03af4000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01608000 fffff880`0161a000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01627000 fffff880`01719000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03ff3000 fffff880`03fff000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`066ad000 fffff880`066c0000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe8f000 fffff880`0febe000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041bd000 fffff880`041d2000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02da2000 fffff880`02db1000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d37000 fffff880`02d7c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01719000 fffff880`01779000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02cd7000 fffff880`02ce8000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03add000 fffff880`03ae9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a03000 fffff800`02fdf000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122d000 fffff880`013d0000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04db3000 fffff880`04dbc000   NuidFltr NuidFltr.sys Fri May 08 04:53:31 2009 (4A03F30B)
fffff880`0121c000 fffff880`01225000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b6d000 fffff880`10b6e180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fedb000 fffff880`10b6ce00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`0665a000 fffff880`066ad000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d7c000 fffff880`02da2000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03e8d000 fffff880`03eaa000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0109d000 fffff880`010b2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f9d000 fffff880`00fd0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fd8000 fffff880`00fe8000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014ff000 fffff880`01510000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06b08000 fffff880`06bae000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0405c000 fffff880`04099000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ce2000 fffff880`00cf6000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0413a000 fffff880`04146000   PTSimBus PTSimBus.sys Wed Jun 17 22:20:48 2009 (4A39A480)
fffff880`0fe6b000 fffff880`0fe8f000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0febe000 fffff880`0fed9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`10bc5000 fffff880`10be6000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`10be6000 fffff880`10c00000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a8c000 fffff880`03add000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03a6e000 fffff880`03a79000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02cb1000 fffff880`02cba000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cba000 fffff880`02cc3000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cc3000 fffff880`02ccc000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01566000 fffff880`015a0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`066c0000 fffff880`066d8000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e24000 fffff880`03e56000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`06bae000 fffff880`06bb9000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03e81000 fffff880`03e8d000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02db1000 fffff880`02dce000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01600000 fffff880`01608000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06a00000 fffff880`06a71000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`010b5000 fffff880`011db000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`072f2000 fffff880`07388000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0728b000 fffff880`072f2000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06bb9000 fffff880`06be6000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`040f5000 fffff880`040f6480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06be6000 fffff880`06bf8000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d06000 fffff880`02d13000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02ce8000 fffff880`02d06000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02de9000 fffff880`02dfd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004d0000 fffff960`004da000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03bbc000 fffff880`03be2000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04146000 fffff880`04158000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04d56000 fffff880`04d73000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04d73000 fffff880`04d74f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e63000 fffff880`03e74000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04158000 fffff880`041b2000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`10b6f000 fffff880`10bc5000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03e56000 fffff880`03e63000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00c8a000 fffff880`00c98000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00dda000 fffff880`00dff000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017ee000 fffff880`017fe000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`011e4000 fffff880`011f9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d54000 fffff880`00db0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0151a000 fffff880`01566000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04d49000 fffff880`04d56000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02dce000 fffff880`02de9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02ca1000 fffff880`02cb1000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c8a000 fffff880`02c93000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`011db000 fffff880`011e4000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04c00000 fffff880`04c21000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`015f0000 fffff880`015fe000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01400000 fffff880`0140c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01200000 fffff880`01209000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01209000 fffff880`0121c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
thanks i was actually trying to do some of these things after i got a few hints in the event viewer. thing is i cant have any interaction with avg. i cant open any interface and if i try to uninstall it i get an error. i allready got rid of daemon. there are not newer drivers for the pen tablet i am afraid, what do i do in that case?
edit: i used the avg remove tool but i got the same blue screen on the restart when i tried to have it run to finish the proccess. i am not sure if it has left unfinished bussiness :/
 
Last edited:
Let's check your RAM just in case. Attach your CPU-Z snapshots of these tabs for each slot of RAM: MEMORY and SPD.
 
Uninstall Daemon Tools for sure:

Code:
BugCheck A, {8, 2, 0, fffff800036a5d29}

Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )


Run DuplexSecure to uninstall sptd.sys.






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020211-30685-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03659000 PsLoadedModuleList = 0xfffff800`03896e50
Debug session time: Wed Feb  2 06:25:46.497 2011 (UTC - 5:00)
System Uptime: 0 days 0:03:33.245
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff800036a5d29}

Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800036a5d29, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800039010e0
 0000000000000008 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertQueueApc+1e9
fffff800`036a5d29 488b5108        mov     rdx,qword ptr [rcx+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff8000658d7e0 -- (.trap 0xfffff8000658d7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8003ce4718 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036a5d29 rsp=fffff8000658d970 rbp=fffff80003843e80
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`036a5d29 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c8ca9 to fffff800036c9740

STACK_TEXT:  
fffff800`0658d698 fffff800`036c8ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`0658d6a0 fffff800`036c7920 : fffff800`03843e80 fffffa80`0706ab60 fffff800`03846080 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`0658d7e0 fffff800`036a5d29 : fffff800`03843e80 fffffa80`03ce4701 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff800`0658d970 fffff800`036a8fec : fffffa80`0706ab60 00000000`00000002 00000000`00000000 fffffa80`03ce4718 : nt!KiInsertQueueApc+0x1e9
fffff800`0658d9a0 fffff800`036cc55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`0658da00 fffff880`00e8841a : 00000000`00000000 00000000`00000001 fffffa80`05d44580 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`0658dae0 fffff880`00e88242 : fffffa80`05d44580 fffffa80`047a2ea0 fffffa80`06919f40 fffffa80`06919f00 : ataport!IdeCompleteScsiIrp+0x62
fffff800`0658db10 fffff880`00e82e32 : 00000000`00000000 00000000`00000000 fffffa80`047a3300 fffff800`0363bc60 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`0658db40 fffff880`00e8b7ed : fffffa80`0396c1a0 fffffa80`05d44580 00000000`00000000 fffffa80`05d44580 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`0658dc70 fffff880`00e8b0ec : fffffa80`0396c1a0 00000000`00000000 fffffa80`0396c1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`0658dda0 fffff880`010664ce : fffffa80`046af000 fffff800`0658de88 fffffa80`0396c050 fffffa80`046af750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`0658de60 fffffa80`046af000 : fffff800`0658de88 fffffa80`0396c050 fffffa80`046af750 00000000`00000000 : sptd+0x424ce
fffff800`0658de68 fffff800`0658de88 : fffffa80`0396c050 fffffa80`046af750 00000000`00000000 fffffa80`0565ea10 : 0xfffffa80`046af000
fffff800`0658de70 fffffa80`0396c050 : fffffa80`046af750 00000000`00000000 fffffa80`0565ea10 ffffffff`0000ffff : 0xfffff800`0658de88
fffff800`0658de78 fffffa80`046af750 : 00000000`00000000 fffffa80`0565ea10 ffffffff`0000ffff 00000000`00000022 : 0xfffffa80`0396c050
fffff800`0658de80 00000000`00000000 : fffffa80`0565ea10 ffffffff`0000ffff 00000000`00000022 00000000`00000000 : 0xfffffa80`046af750


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdeCompleteScsiIrp+62
fffff880`00e8841a 8bc3            mov     eax,ebx

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`01182000 fffff880`011d9000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cda000 fffff880`02d64000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`10b98000 fffff880`10bae000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ea9000 fffff880`00eb4000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`07cdd000 fffff880`07de7000   arusb_win7x arusb_win7x.sys Thu Nov 26 03:55:17 2009 (4B0E4275)
fffff880`00e76000 fffff880`00e7f000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e7f000 fffff880`00ea9000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`015f9000 fffff880`01600000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03b73000 fffff880`03b84000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`052c8000 fffff880`052e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d3f000 fffff880`00dff000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00c4c000 fffff880`00c7c000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce1000 fffff880`00d3f000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0155f000 fffff880`015d2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`10b88000 fffff880`10b98000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`049e2000 fffff880`049f0000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ad2000 fffff880`03b55000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03b55000 fffff880`03b73000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03ac3000 fffff880`03ad2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`014c0000 fffff880`014d6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`049ba000 fffff880`049dc000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04800000 fffff880`04809000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`049f0000 fffff880`049fc000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04809000 fffff880`0481c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0481c000 fffff880`04828000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c0f000 fffff880`03d03000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03d03000 fffff880`03d49000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03dbd000 fffff880`03dca000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00eb4000 fffff880`00ec8000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`04901000 fffff880`0490c000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c00000 fffff880`00c4c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015e3000 fffff880`015ed000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01486000 fffff880`014c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0178c000 fffff880`017d6000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03df3000 fffff880`03e00000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03610000 fffff800`03659000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03d49000 fffff880`03d6d000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04921000 fffff880`0497d000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04855000 fffff880`0486e000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0486e000 fffff880`04876080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04847000 fffff880`04855000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05200000 fffff880`052c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01015000 fffff880`0101d000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03baa000 fffff880`03bc0000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`10bd2000 fffff880`10be1000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04877000 fffff880`04885000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba6000 fffff800`00ba9000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`03a00000 fffff880`03a43000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01545000 fffff880`0155f000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01761000 fffff880`0178c000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`049dc000 fffff880`049e1200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03be3000 fffff880`03bf8000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03bc0000 fffff880`03be3000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c89000 fffff880`00ccd000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0fe90000 fffff880`0fe9e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`10be1000 fffff880`10bf0000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0488e000 fffff880`0489b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e5c000 fffff880`00e76000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05371000 fffff880`05389000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05389000 fffff880`053b6000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05afd000 fffff880`05b4b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05b4b000 fffff880`05b6e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02c4e000 fffff880`02c59000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011d9000 fffff880`011e3000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014e7000 fffff880`01545000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03ab8000 fffff880`03ac3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017ee000 fffff880`01800000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0160f000 fffff880`01701000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c00000 fffff880`03c0c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05346000 fffff880`05359000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe00000 fffff880`0fe2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0490c000 fffff880`04921000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d93000 fffff880`02da2000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c95000 fffff880`02cda000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01701000 fffff880`01761000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02c59000 fffff880`02c6a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03aac000 fffff880`03ab8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03659000 fffff800`03c35000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122e000 fffff880`013d1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04885000 fffff880`0488e000   NuidFltr NuidFltr.sys Fri May 08 04:53:31 2009 (4A03F30B)
fffff880`013ed000 fffff880`013f6000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b30000 fffff880`10b31180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe9e000 fffff880`10b2fe00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`052f3000 fffff880`05346000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d6d000 fffff880`02d93000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03dd6000 fffff880`03df3000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01000000 fffff880`01015000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8c000 fffff880`00fbf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011f0000 fffff880`01200000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015d2000 fffff880`015e3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05a00000 fffff880`05aa6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0497d000 fffff880`049ba000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ccd000 fffff880`00ce1000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`10bf0000 fffff880`10bfc000   PTSimBus PTSimBus.sys Wed Jun 17 22:20:48 2009 (4A39A480)
fffff880`10bae000 fffff880`10bd2000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe2f000 fffff880`0fe4a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0fe4a000 fffff880`0fe6b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0fe6b000 fffff880`0fe85000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a5b000 fffff880`03aac000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0fe85000 fffff880`0fe90000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02c33000 fffff880`02c3c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c3c000 fffff880`02c45000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c45000 fffff880`02c4e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0144c000 fffff880`01486000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05359000 fffff880`05371000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`07c00000 fffff880`07c32000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`01153000 fffff880`01182000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`05aa6000 fffff880`05ab1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03dca000 fffff880`03dd6000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02da2000 fffff880`02dbf000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017e6000 fffff880`017ee000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05b6e000 fffff880`05bdf000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`01024000 fffff880`0114a000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`06e6d000 fffff880`06f03000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06e06000 fffff880`06e6d000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05ab1000 fffff880`05ade000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03c0c000 fffff880`03c0d480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05bdf000 fffff880`05bf1000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02c88000 fffff880`02c95000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c6a000 fffff880`02c88000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dda000 fffff880`02dee000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00530000 fffff960`0053a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03b84000 fffff880`03baa000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03a43000 fffff880`03a55000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04828000 fffff880`04845000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04845000 fffff880`04846f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03dac000 fffff880`03dbd000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`048a7000 fffff880`04901000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`10b32000 fffff880`10b88000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03d9f000 fffff880`03dac000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`011e3000 fffff880`011f0000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00ec8000 fffff880`00ed6000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00fd4000 fffff880`00ff9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d6000 fffff880`017e6000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fbf000 fffff880`00fd4000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`07de7000 fffff880`07df4000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02dbf000 fffff880`02dda000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c23000 fffff880`02c33000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ed9000 fffff880`00f7d000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f7d000 fffff880`00f8c000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d64000 fffff880`02d6d000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`0036f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`0114a000 fffff880`01153000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02c00000 fffff880`02c21000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`03d6d000 fffff880`03d9f000   Rt64win7.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00032000
fffff880`014d6000 fffff880`014e4000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`015ed000 fffff880`015f9000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`013d1000 fffff880`013da000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`013da000 fffff880`013ed000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
cpuz1.JPGcpuz 3.JPGcpuz2.JPGok got rid of daemon and run duplex. here are the cpu-z thingies.
 
Good.

The sticks in slots #1 and #2 are identical and set right. Do you mind attaching slots 3 and 4?
 
there are no slot 3 and 4 as far as i can see. i only got the two.
i also updated the drivers for realtek pci lan through the device manager but then when i opened it again i noticed the little yellow triangle on the device and on the device status i see this message Reinstall the drivers for this device. (Code 18)
 
Last edited:
basically i want to make sure there are no hardware problems and then i am hoping a format will cure all the rest of my ailments if nothing else works. :/
 
There should be slots #3 and #4, I'm sure. Slot#1 and #2 look good. The RAM is set right.
 
thanks for all your help cybercore. in the end i decided to reinstall windows anyway, since i could back up everything and didnt risk loosing anything valuable. so far everything seems ok. thanks again :)
 
Back
Top Bottom