Irql not less or Equal

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Neto Junior, Jan 29, 2011.

  1. Neto Junior

    Neto Junior New Member

    Joined:
    Jan 29, 2011
    Messages:
    10
    Likes Received:
    0
    I have been having a BSOD everytime my computer loads or i go into certain programs im sorry if im not detailed enough i just want to make the post then i will upload everything within seconds incase i BSOD again
     

    Attached Files:

    #1 Neto Junior, Jan 29, 2011
    Last edited: Jan 29, 2011
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Uninstall InterLock PACE Anti-Piracy.




    Uninstall Avast and install MSE as the replacement:

    avast! Uninstall Utility

    https://www.microsoft.com/security_essentials/



    Update Realtek Audio and Intel GMA:

    Realtek

    IntelĀ® Driver Update Utility




    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012911-38797-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
    Debug session time: Sat Jan 29 01:34:11.208 2011 (UTC - 5:00)
    System Uptime: 0 days 0:00:58.112
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 0, fffff80002aa9d29}
    
    Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002aa9d29, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiInsertQueueApc+1e9
    fffff800`02aa9d29 488b5108        mov     rdx,qword ptr [rcx+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002f1b610 -- (.trap 0xfffff88002f1b610)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa80024af528 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aa9d29 rsp=fffff88002f1b7a0 rbp=fffff880009e4180
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiInsertQueueApc+0x1e9:
    fffff800`02aa9d29 488b5108        mov     rdx,qword ptr [rcx+8] ds:0004:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002accca9 to fffff80002acd740
    
    STACK_TEXT:  
    fffff880`02f1b4c8 fffff800`02accca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02f1b4d0 fffff800`02acb920 : 00000000`00000001 fffffa80`03fbeb60 fffffa80`025196a8 fffff880`00e1b656 : nt!KiBugCheckDispatch+0x69
    fffff880`02f1b610 fffff800`02aa9d29 : fffffa80`033a1010 fffff880`018da947 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`02f1b7a0 fffff800`02aacfec : fffffa80`03fbeb60 00000000`00000002 00000000`00000000 fffffa80`024af528 : nt!KiInsertQueueApc+0x1e9
    fffff880`02f1b7d0 fffff800`02ad055b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
    fffff880`02f1b830 fffff880`00e2c41a : 00000000`00004000 00000000`00000001 fffffa80`04dd76f0 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
    fffff880`02f1b910 fffff880`00e2c242 : fffffa80`04dd76f0 fffff880`00e2eb3b fffffa80`037b4010 fffffa80`02eb37d0 : ataport!IdeCompleteScsiIrp+0x62
    fffff880`02f1b940 fffff880`00e26e32 : 00000000`00000000 00000000`00000000 fffffa80`02519500 fffffa80`02eb37d0 : ataport!IdeCommonCrbCompletion+0x5a
    fffff880`02f1b970 fffff880`00e2f7ed : fffffa80`025181a0 fffffa80`04dd76f0 00000000`00000000 fffffa80`04dd76f0 : ataport!IdeTranslateCompletedRequest+0x236
    fffff880`02f1baa0 fffff880`00e2f0ec : fffffa80`025181a0 00000000`00000000 fffffa80`025181a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
    fffff880`02f1bbd0 fffff800`02ad8bfc : fffff880`009e4180 00000000`08251b56 fffffa80`02518050 fffffa80`02518118 : ataport!IdePortCompletionDpc+0x1a8
    fffff880`02f1bc90 fffff800`02ad5eea : fffff880`009e4180 fffff880`009eef40 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
    fffff880`02f1bd40 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd00 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeCompleteScsiIrp+62
    fffff880`00e2c41a 8bc3            mov     eax,ebx
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118
    
    FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    Followup: MachineOwner
    ---------
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012911-36847-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
    Debug session time: Sat Jan 29 02:15:58.457 2011 (UTC - 5:00)
    System Uptime: 0 days 0:25:54.361
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002a6c5a1, 0, ffffffffffffffff}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002a6c5a1, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!KiApcInterrupt+1f1
    fffff800`02a6c5a1 48cf            iretq
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc70e0
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  wow_helper.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88005b714d8 -- (.exr 0xfffff88005b714d8)
    ExceptionAddress: fffff80002a6c5a1 (nt!KiApcInterrupt+0x00000000000001f1)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000008
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88005b71580 -- (.trap 0xfffff88005b71580)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000000000001c1 rbx=0000000000000000 rcx=00000000000000cc
    rdx=00000000000001c0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a6c5a1 rsp=fffff88005b71718 rbp=fffffa80033a2667
     r8=0000000000000002  r9=00000000000000c1 r10=00000000000000c1
    r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di ng nz na po nc
    nt!KiApcInterrupt+0x1f1:
    fffff800`02a6c5a1 48cf            iretq
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac9a39 to fffff80002a8f740
    
    STACK_TEXT:  
    fffff880`05b70d08 fffff800`02ac9a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a6c5a1 00000000`00000000 : nt!KeBugCheckEx
    fffff880`05b70d10 fffff800`02a8ed82 : fffff880`05b714d8 00000000`000001c1 fffff880`05b71580 00000000`0000003c : nt!KiDispatchException+0x1b9
    fffff880`05b713a0 fffff800`02a8d68a : 00000000`00000000 fffffa80`033a2650 fffffa80`033a3970 00000000`0000003c : nt!KiExceptionDispatch+0xc2
    fffff880`05b71580 fffff800`02a6c5a1 : fffffa80`0339b151 00000000`00000000 00000000`00000200 00000001`05b71740 : nt!KiGeneralProtectionFault+0x10a
    fffff880`05b71718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x1f1
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiApcInterrupt+1f1
    fffff800`02a6c5a1 48cf            iretq
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!KiApcInterrupt+1f1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
    
    Followup: MachineOwner
    ---------
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012911-33134-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
    Debug session time: Sat Jan 29 06:11:37.037 2011 (UTC - 5:00)
    System Uptime: 0 days 0:00:50.941
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fbc30, 2, 1, fffff80002ad1cd8}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000fbc30, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ad1cd8, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
     00000000000fbc30 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiTryUnwaitThread+28
    fffff800`02ad1cd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  WUDFHost.exe
    
    TRAP_FRAME:  fffff8800581add0 -- (.trap 0xfffff8800581add0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8800580d3e8 rbx=0000000000000000 rcx=fffff880009e4180
    rdx=000007feff76b000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ad1cd8 rsp=fffff8800581af60 rbp=0000000000000000
     r8=0000000000000100  r9=0000000000000000 r10=0000000000000002
    r11=fffffa8004f85590 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiTryUnwaitThread+0x28:
    fffff800`02ad1cd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0 ds:3b60:00000000`00000040=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002accca9 to fffff80002acd740
    
    STACK_TEXT:  
    fffff880`0581ac88 fffff800`02accca9 : 00000000`0000000a 00000000`000fbc30 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`0581ac90 fffff800`02acb920 : 00000980`00000000 00000000`000fbbf0 fffff880`0581ae58 fffff8a0`029559e0 : nt!KiBugCheckDispatch+0x69
    fffff880`0581add0 fffff800`02ad1cd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`0581af60 fffff800`02b48f74 : fffffa80`052865e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
    fffff880`0581afc0 fffff800`02aaa0c7 : 00000000`000fbbd2 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3ca30
    fffff880`0581b090 fffff800`02ad4b9d : fffffa80`04f03b60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`0581b110 fffff800`02ad0d4b : 00000000`00000000 00000000`00001f80 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3dd
    fffff880`0581b1a0 fffff800`02dc92ef : fffffa80`00000005 fffff880`0581b4e0 00000000`00000001 00000000`00000006 : nt!KeWaitForMultipleObjects+0x271
    fffff880`0581b450 fffff800`02dc9bf2 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000001 : nt!ObpWaitForMultipleObjects+0x294
    fffff880`0581b920 fffff800`02acc993 : fffffa80`04f03b60 00000000`0185f878 fffff880`0581bb88 fffff8a0`029f4a00 : nt!NtWaitForMultipleObjects+0xe5
    fffff880`0581bb70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTryUnwaitThread+28
    fffff800`02ad1cd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KiTryUnwaitThread+28
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiTryUnwaitThread+28
    
    BUCKET_ID:  X64_0xA_nt!KiTryUnwaitThread+28
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012911-35240-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
    Debug session time: Sat Jan 29 06:13:15.852 2011 (UTC - 5:00)
    System Uptime: 0 days 0:01:06.632
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 0, fffff80002a4fd29}
    
    Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002a4fd29, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiInsertQueueApc+1e9
    fffff800`02a4fd29 488b5108        mov     rdx,qword ptr [rcx+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff80005845610 -- (.trap 0xfffff80005845610)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa80052a3b98 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a4fd29 rsp=fffff800058457a0 rbp=fffff80002bede80
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiInsertQueueApc+0x1e9:
    fffff800`02a4fd29 488b5108        mov     rdx,qword ptr [rcx+8] ds:2240:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a72ca9 to fffff80002a73740
    
    STACK_TEXT:  
    fffff800`058454c8 fffff800`02a72ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`058454d0 fffff800`02a71920 : 00000000`00000001 fffffa80`05674b60 fffffa80`025246a8 fffff880`00e1b656 : nt!KiBugCheckDispatch+0x69
    fffff800`05845610 fffff800`02a4fd29 : fffffa80`033aa010 fffff880`01896947 fffffa80`055f2240 00000000`00000000 : nt!KiPageFault+0x260
    fffff800`058457a0 fffff800`02a52fec : fffffa80`05674b60 00000000`00000002 00000000`00000000 fffffa80`052a3b98 : nt!KiInsertQueueApc+0x1e9
    fffff800`058457d0 fffff800`02a7655b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
    fffff800`05845830 fffff880`00e2c41a : 00000000`00020000 00000000`00000001 fffffa80`04252010 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
    fffff800`05845910 fffff880`00e2c242 : fffffa80`04252010 fffff880`00e2eb3b fffffa80`04256b80 fffffa80`02f2c1b0 : ataport!IdeCompleteScsiIrp+0x62
    fffff800`05845940 fffff880`00e26e32 : 00000000`00000000 00000000`00000000 fffffa80`02524500 fffffa80`02f2c1b0 : ataport!IdeCommonCrbCompletion+0x5a
    fffff800`05845970 fffff880`00e2f7ed : fffffa80`025231a0 fffffa80`04252010 00000000`00000000 fffffa80`04252010 : ataport!IdeTranslateCompletedRequest+0x236
    fffff800`05845aa0 fffff880`00e2f0ec : fffffa80`025231a0 00000000`00000000 fffffa80`025231a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
    fffff800`05845bd0 fffff800`02a7ebfc : fffff800`02bede80 00000000`09552696 fffffa80`02523050 fffffa80`02523118 : ataport!IdePortCompletionDpc+0x1a8
    fffff800`05845c90 fffff800`02a7beea : fffff800`02bede80 fffff800`02bfbc40 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
    fffff800`05845d40 00000000`00000000 : fffff800`05846000 fffff800`05840000 fffff800`05845d00 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeCompleteScsiIrp+62
    fffff880`00e2c41a 8bc3            mov     eax,ebx
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118
    
    FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00f05000 fffff880`00f5c000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03a80000 fffff880`03b0a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04000000 fffff880`04016000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00ff1000 fffff880`00ffc000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`0225d000 fffff880`02266000   aswFsBlk aswFsBlk.SYS Thu Dec 30 13:59:14 2010 (4D1CD682)
    fffff880`02223000 fffff880`0225d000   aswMonFlt aswMonFlt.sys Thu Dec 30 13:59:25 2010 (4D1CD68D)
    fffff880`03b0a000 fffff880`03b14000   aswRdr   aswRdr.SYS   Thu Dec 30 13:59:36 2010 (4D1CD698)
    fffff880`01925000 fffff880`019a2000   aswSnx   aswSnx.SYS   Thu Dec 30 14:03:44 2010 (4D1CD790)
    fffff880`03e9c000 fffff880`03ee5000   aswSP    aswSP.SYS    Thu Dec 30 14:03:38 2010 (4D1CD78A)
    fffff880`01452000 fffff880`01462000   aswTdi   aswTdi.SYS   Thu Dec 30 14:02:22 2010 (4D1CD73E)
    fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e23000 fffff880`00e4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00870000 fffff960`008d1000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`019ab000 fffff880`019b2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03be4000 fffff880`03bf5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`022b4000 fffff880`022d2000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00650000 fffff960`00677000   cdd      cdd.dll      unavailable (00000000)
    fffff880`018fb000 fffff880`01925000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cbd000 fffff880`00d7d000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01895000 fffff880`018c5000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c5f000 fffff880`00cbd000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0116e000 fffff880`011e1000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03de6000 fffff880`03df6000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`029aa000 fffff880`029b8000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03bc6000 fffff880`03be4000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03a68000 fffff880`03a77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0187f000 fffff880`01895000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04a00000 fffff880`04a22000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`029c4000 fffff880`029cd000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`029b8000 fffff880`029c4000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`029cd000 fffff880`029e0000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`029e0000 fffff880`029ec000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03cf2000 fffff880`03de6000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03c00000 fffff880`03c46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`010fc000 fffff880`01110000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010b0000 fffff880`010fc000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01845000 fffff880`0187f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`03cdf000 fffff880`03cec000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02fdf000 fffff800`03028000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03c46000 fffff880`03c6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`048ea000 fffff880`04903000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`04903000 fffff880`0490b080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`04bea000 fffff880`04bf8000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0491a000 fffff880`049e2000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015f1000 fffff880`015fa000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04027000 fffff880`045fb5a0   igdkmd64 igdkmd64.sys Tue Jun 16 14:32:09 2009 (4A37E529)
    fffff880`00fd9000 fffff880`00fe1000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03f0b000 fffff880`03f21000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`03e3b000 fffff880`03e4a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0490c000 fffff880`0491a000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b9e000 fffff800`00ba1000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
    fffff880`03e59000 fffff880`03e9c000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`015b4000 fffff880`015df000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`04be2000 fffff880`04be7200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02287000 fffff880`0229c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02200000 fffff880`02223000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`058ff000 fffff880`05909000   LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
    fffff880`02930000 fffff880`02981200   lvrs64   lvrs64.sys   Tue Jul 27 04:00:02 2010 (4C4E9202)
    fffff880`022ec000 fffff880`02914e00   lvuvc64  lvuvc64.sys  Tue Jul 27 04:00:43 2010 (4C4E922B)
    fffff880`00c07000 fffff880`00c4b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`029ec000 fffff880`029fa000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03e4a000 fffff880`03e59000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0299d000 fffff880`029aa000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`022d2000 fffff880`022ea000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`018c5000 fffff880`018f2000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`050d3000 fffff880`05121000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`05121000 fffff880`05144000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01812000 fffff880`0181d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f65000 fffff880`00f6f000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01110000 fffff880`0116e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03a5d000 fffff880`03a68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015df000 fffff880`015f1000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01462000 fffff880`01554000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04016000 fffff880`04022000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03f9b000 fffff880`03fca000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0487b000 fffff880`04890000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03b88000 fffff880`03b97000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03b14000 fffff880`03b59000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01554000 fffff880`015b4000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`0181d000 fffff880`0182e000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03a51000 fffff880`03a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a03000 fffff800`02fdf000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01244000 fffff880`013e7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019a2000 fffff880`019ab000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03b62000 fffff880`03b88000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00faf000 fffff880`00fc4000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f6f000 fffff880`00fa2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fe1000 fffff880`00ff1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`05144000 fffff880`051ea000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04890000 fffff880`048cd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c4b000 fffff880`00c5f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03f77000 fffff880`03f9b000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03fca000 fffff880`03fe5000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03e00000 fffff880`03e21000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03e21000 fffff880`03e3b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03a00000 fffff880`03a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`019f5000 fffff880`019fe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01800000 fffff880`01809000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01809000 fffff880`01812000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0106f000 fffff880`010a9000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`0229c000 fffff880`022b4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`03c6a000 fffff880`03cc1000   Rt64win7 Rt64win7.sys Mon Sep 20 03:38:09 2010 (4C970F61)
    fffff880`04a24000 fffff880`04be1a00   RTKVHD64 RTKVHD64.sys Mon Jul 20 06:52:29 2009 (4A644C6D)
    fffff880`051ea000 fffff880`051f5000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`05869000 fffff880`058ff000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`0503f000 fffff880`050a7000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`05000000 fffff880`0502d000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`03df6000 fffff880`03df7480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`0502d000 fffff880`0503f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0182e000 fffff880`0183b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`011e1000 fffff880`011ff000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03bb2000 fffff880`03bc6000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`0104c000 fffff880`0106f000   Tpkd     Tpkd.sys     Wed Dec 23 14:32:16 2009 (4B327040)
    fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03ee5000 fffff880`03f0b000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03fe5000 fffff880`03ff7000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`02915000 fffff880`0292fc00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`048cd000 fffff880`048ea000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`04be8000 fffff880`04be9f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03cce000 fffff880`03cdf000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04821000 fffff880`0487b000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`03f21000 fffff880`03f77000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`02982000 fffff880`0299d000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`03cc1000 fffff880`03cce000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00fa2000 fffff880`00faf000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019b2000 fffff880`019c0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019c0000 fffff880`019e5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fc4000 fffff880`00fd9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d7d000 fffff880`00dd9000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03b97000 fffff880`03bb2000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019e5000 fffff880`019f5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e52000 fffff880`00ef6000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ef6000 fffff880`00f05000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03b59000 fffff880`03b62000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00040000 fffff960`0034f000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00f5c000 fffff880`00f65000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02266000 fffff880`02287000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`05909000 fffff880`0593a000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`018c5000 fffff880`018d3000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018d3000 fffff880`018df000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018df000 fffff880`018e8000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018e8000 fffff880`018fb000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  3. Neto Junior

    Neto Junior New Member

    Joined:
    Jan 29, 2011
    Messages:
    10
    Likes Received:
    0
    I am still getting BSOD
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
  5. Neto Junior

    Neto Junior New Member

    Joined:
    Jan 29, 2011
    Messages:
    10
    Likes Received:
    0
    Re-Uploaded
     

    Attached Files:

  6. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    How about the memory tab?
     
  7. Neto Junior

    Neto Junior New Member

    Joined:
    Jan 29, 2011
    Messages:
    10
    Likes Received:
    0
    here you go
     

    Attached Files:

  8. Neto Junior

    Neto Junior New Member

    Joined:
    Jan 29, 2011
    Messages:
    10
    Likes Received:
    0
    Solved fixed it myself but thanks man
     
  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. The RAM is set right.
    2. The sticks are the same brand and have identical rated specs.
    3. However, the sticks are not from the same batch, 1 is 2Gb and the other 1 is 1 Gb. This may or may not be the problem, depending on how identical they actually are. Most likely yours are fine.
    4. The crash dumps, let's take the most recent one in your archive,


    012911-259772-01.dmp <-- January 29 2011, 7:35
    IRQL_NOT_LESS_OR_EQUAL (a)
    PROCESS_NAME: aswRegSvr64.exe <--- Avast
    Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 )
    msrpc.sys <-- Kernel Remote Procedure Call


    I'm afraid you didn't follow any of my suggestions at all:

    Uninstall Avast.

    Update Intel GMA.

    Update Realtek HD Audio.

    See my 1st post.






    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012911-259772-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
    Debug session time: Sat Jan 29 07:29:57.441 2011 (UTC - 5:00)
    System Uptime: 0 days 0:09:18.345
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {2400000090, 2, 0, fffff80002a88995}
    
    Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000002400000090, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002a88995, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb90e0
     0000002400000090 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiCommitThreadWait+1d5
    fffff800`02a88995 488bbb90000000  mov     rdi,qword ptr [rbx+90h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  aswRegSvr64.ex
    
    TRAP_FRAME:  fffff880051bf2b0 -- (.trap 0xfffff880051bf2b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff880051bf400
    rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a88995 rsp=fffff880051bf440 rbp=0000000000000001
     r8=fffffa8004dbabb8  r9=0000000000000000 r10=fffffffffffffffe
    r11=000000000008e310 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!KiCommitThreadWait+0x1d5:
    fffff800`02a88995 488bbb90000000  mov     rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a80ca9 to fffff80002a81740
    
    STACK_TEXT:  
    fffff880`051bf168 fffff800`02a80ca9 : 00000000`0000000a 00000024`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`051bf170 fffff800`02a7f920 : 00000000`00000000 00000024`00000000 fffffa80`00000000 fffffa80`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`051bf2b0 fffff800`02a88995 : fffffa80`04ec9770 fffffa80`04ec9770 fffff800`02df0e00 fffff800`00000008 : nt!KiPageFault+0x260
    fffff880`051bf440 fffff800`02a8acff : fffff800`02bfbe80 fffff800`02bfbe80 00000000`000000b0 fffffa80`0263cbe0 : nt!KiCommitThreadWait+0x1d5
    fffff880`051bf4d0 fffff880`011281c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`046a9900 : nt!KeWaitForSingleObject+0x19f
    fffff880`051bf570 fffff880`0112705d : fffffa80`04ec9770 fffff8a0`02404e40 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118
    fffff880`051bf5e0 fffff880`0112737b : fffff8a0`0de11a10 00000000`00000000 fffff8a0`0de11a10 fffff8a0`02404e40 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
    fffff880`051bf720 fffff880`0112a9d2 : fffff8a0`02404e40 fffff8a0`02404e40 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
    fffff880`051bf750 fffff960`003d44f3 : fffff8a0`02cb5130 fffff900`c35ca010 fffff700`01080488 00000000`000007ff : msrpc!RpcBindingCopy+0x42
    fffff880`051bf780 fffff960`001526a9 : fffff900`c35ca010 00000000`00000000 fffffa80`04dbab30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
    fffff880`051bf7e0 fffff960`001acfdd : fffff900`c35ca010 fffff880`051bfbe0 00000000`00000000 fffff900`c35ca010 : win32k!PostPlaySoundMessage+0x25
    fffff880`051bf810 fffff960`001a403f : fffff900`c35ca010 fffff880`051bfbe0 00000000`ffffffff 00000000`00000000 : win32k!DestroyProcessInfo+0x125
    fffff880`051bf840 fffff960`001a413a : fffffa80`04503800 fffff900`c35ca010 fffffa80`02ca0000 fffff8a0`00134001 : win32k!xxxUserProcessCallout+0x15f
    fffff880`051bf890 fffff800`02d66a01 : fffffa80`045038c0 00000000`00000000 00000000`00000000 fffffa80`04ec9770 : win32k!W32pProcessCallout+0x4e
    fffff880`051bf8c0 fffff800`02d3f635 : 00000000`00000002 fffff800`02d80101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`051bf980 fffff800`02a5e1db : fffffa80`02cabb01 fffffa80`03686710 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`051bf9b0 fffff800`02a5e620 : 00000000`0032ee00 fffff880`051bfa30 fffff800`02d3f74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`051bfa30 fffff800`02a80a37 : 00000000`000002ee 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
    fffff880`051bfb70 00000000`7707008a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`0200f508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7707008a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    fffff880`011281c8 8b7710          mov     esi,dword ptr [rdi+10h]
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: msrpc
    
    IMAGE_NAME:  msrpc.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc17c
    
    FAILURE_BUCKET_ID:  X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    BUCKET_ID:  X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00fa1000 fffff880`00ff8000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03ad8000 fffff880`03b62000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02db0000 fffff880`02dc6000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00de1000 fffff880`00dec000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`05df6000 fffff880`05dff000   aswFsBlk aswFsBlk.SYS Thu Dec 30 13:59:14 2010 (4D1CD682)
    fffff880`05dbc000 fffff880`05df6000   aswMonFlt aswMonFlt.sys Thu Dec 30 13:59:25 2010 (4D1CD68D)
    fffff880`03b62000 fffff880`03b6c000   aswRdr   aswRdr.SYS   Thu Dec 30 13:59:36 2010 (4D1CD698)
    fffff880`01905000 fffff880`01982000   aswSnx   aswSnx.SYS   Thu Dec 30 14:03:44 2010 (4D1CD790)
    fffff880`03c17000 fffff880`03c60000   aswSP    aswSP.SYS    Thu Dec 30 14:03:38 2010 (4D1CD78A)
    fffff880`01086000 fffff880`01096000   aswTdi   aswTdi.SYS   Thu Dec 30 14:02:22 2010 (4D1CD73E)
    fffff880`00ee1000 fffff880`00eea000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00db7000 fffff880`00de1000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00840000 fffff960`008a1000   ATMFD    ATMFD.DLL    Thu May 27 00:11:31 2010 (4BFDF0F3)
    fffff880`0198b000 fffff880`01992000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03ac4000 fffff880`03ad5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03587000 fffff880`035a5000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00750000 fffff960`00777000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`018db000 fffff880`01905000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01875000 fffff880`018a5000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d3f000 fffff880`00d9d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01160000 fffff880`011d3000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`02da0000 fffff880`02db0000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`03471000 fffff880`0347a000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`04c06000 fffff880`04c14000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03aa6000 fffff880`03ac4000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03a97000 fffff880`03aa6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0185f000 fffff880`01875000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04dda000 fffff880`04dfc000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0459f000 fffff880`045a8000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`04593000 fffff880`0459f000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`045a8000 fffff880`045bb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05d05000 fffff880`05d11000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`03c9c000 fffff880`03d90000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03d90000 fffff880`03dd6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`010ee000 fffff880`01102000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010a2000 fffff880`010ee000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013db000 fffff880`013e5000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01825000 fffff880`0185f000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`015af000 fffff880`015f9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`02d93000 fffff880`02da0000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02fed000 fffff800`03036000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`045e6000 fffff880`045ff000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`04400000 fffff880`04408080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`045d8000 fffff880`045e6000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`034bf000 fffff880`03587000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`013f7000 fffff880`01400000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03e24000 fffff880`043f85a0   igdkmd64 igdkmd64.sys Tue Jun 16 14:32:09 2009 (4A37E529)
    fffff880`00ed9000 fffff880`00ee1000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03c86000 fffff880`03c9c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`02c85000 fffff880`02c94000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`04409000 fffff880`04417000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bab000 fffff800`00bae000   kdcom    kdcom.dll    Fri Jan 21 08:17:13 2011 (4D398759)
    fffff880`04492000 fffff880`044d5000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013b0000 fffff880`013ca000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`04c00000 fffff880`04c05200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`05621000 fffff880`05636000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05d99000 fffff880`05dbc000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`04800000 fffff880`0480a000   LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
    fffff880`05d11000 fffff880`05d62200   lvrs64   lvrs64.sys   Tue Jul 27 04:00:02 2010 (4C4E9202)
    fffff880`056c1000 fffff880`05ce9e00   lvuvc64  lvuvc64.sys  Tue Jul 27 04:00:43 2010 (4C4E922B)
    fffff880`00ce7000 fffff880`00d2b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`05d63000 fffff880`05d71000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`02c94000 fffff880`02ca3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05d8c000 fffff880`05d99000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d9d000 fffff880`00db7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`035a5000 fffff880`035bd000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`035bd000 fffff880`035ea000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`03400000 fffff880`0344e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0344e000 fffff880`03471000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`019f0000 fffff880`019fb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e09000 fffff880`00e13000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01102000 fffff880`01160000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03a8c000 fffff880`03a97000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`013e5000 fffff880`013f7000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014bd000 fffff880`015af000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02dea000 fffff880`02df6000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02c00000 fffff880`02c2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04541000 fffff880`04556000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03be0000 fffff880`03bef000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03b6c000 fffff880`03bb1000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01800000 fffff880`01811000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03a80000 fffff880`03a8c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a11000 fffff800`02fed000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0120d000 fffff880`013b0000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01982000 fffff880`0198b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03bba000 fffff880`03be0000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e53000 fffff880`00e68000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e13000 fffff880`00e46000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013ca000 fffff880`013db000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`04811000 fffff880`048b7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04556000 fffff880`04593000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d2b000 fffff880`00d3f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02dc6000 fffff880`02dea000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02c2f000 fffff880`02c4a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`02c4a000 fffff880`02c6b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`02c6b000 fffff880`02c85000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03a2f000 fffff880`03a80000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`019d5000 fffff880`019de000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019de000 fffff880`019e7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019e7000 fffff880`019f0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05636000 fffff880`0564e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02cc8000 fffff880`02d1f000   Rt64win7 Rt64win7.sys Mon Sep 20 03:38:09 2010 (4C970F61)
    fffff880`04c1c000 fffff880`04dd9a00   RTKVHD64 RTKVHD64.sys Mon Jul 20 06:52:29 2009 (4A644C6D)
    fffff880`048b7000 fffff880`048c2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`014ae000 fffff880`014b6000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`04969000 fffff880`049ff000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`04901000 fffff880`04969000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`048c2000 fffff880`048ef000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`02ca3000 fffff880`02ca4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`048ef000 fffff880`04901000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01811000 fffff880`0181e000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`011d3000 fffff880`011f1000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03a1b000 fffff880`03a2f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`0148b000 fffff880`014ae000   Tpkd     Tpkd.sys     Wed Dec 23 14:32:16 2009 (4B327040)
    fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03c60000 fffff880`03c86000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`044d5000 fffff880`044e7000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05cea000 fffff880`05d04c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`045bb000 fffff880`045d8000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`04c14000 fffff880`04c15f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`02d82000 fffff880`02d93000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`044e7000 fffff880`04541000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`02d2c000 fffff880`02d82000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`05d71000 fffff880`05d8c000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`02d1f000 fffff880`02d2c000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00e46000 fffff880`00e53000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01992000 fffff880`019a0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019a0000 fffff880`019c5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e68000 fffff880`00e7d000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e7d000 fffff880`00ed9000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03a00000 fffff880`03a1b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019c5000 fffff880`019d5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eee000 fffff880`00f92000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f92000 fffff880`00fa1000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03bb1000 fffff880`03bba000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F)
    fffff880`00e00000 fffff880`00e09000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05600000 fffff880`05621000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`0347a000 fffff880`034ab000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`0564e000 fffff880`056bf000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`018a5000 fffff880`018b3000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018b3000 fffff880`018bf000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018bf000 fffff880`018c8000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018c8000 fffff880`018db000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     

Share This Page

Loading...