Windows 7 Random BSODs on newly repaired pc

I2ox

New Member
Joined
May 7, 2011
Messages
4
Hi everyone,

I've just gotten my pc back after basicly everything got replaced, due to being in a building where there was a fire. Since it came back, I've started to have BSOD issues, which pop up randomly while playing games or doing other things.

I already ran a Memtest overnight. It ran for 10 hours and came out with 0 errors.

OS: Windows 7 64 bit.
Attachments:

Link RemovedLink Removed

I've tried to attach everything stated in the Post New Thread-thread. If I missed anything, please let me know.
 

Attachments

  • Cpuid_spd1.webp
    29.8 KB · Views: 492
  • Cpuid_spd2.webp
    28.6 KB · Views: 428
  • Cpuid_cpu.webp
    34 KB · Views: 457
  • Cpuid_memory.webp
    22.3 KB · Views: 448
  • Cpuid_spd3.webp
    28.6 KB · Views: 370
  • Cpuid_spd4.webp
    30 KB · Views: 453
Last edited:
Solution
The culprit of your blue screens is hardware:




- Ensure hardware is running at stock, I mean everything the frequency, multipliers, voltages, etc.
- Load bios defaults. Then if crashes persist, remove the 2 x Samsung...
The culprit of your blue screens is hardware:




- Ensure hardware is running at stock, I mean everything the frequency, multipliers, voltages, etc.
- Load bios defaults. Then if crashes persist, remove the 2 x Samsung sticks as different brands memory does not always work right.
- Additionally, you may want to try out the system without McAfee, but most likely uninstalling McAfee won't help at all.

It's your memory causing blue screens.



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042011-18454-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0324a000 PsLoadedModuleList = 0xfffff800`0348fe90
Debug session time: Wed Apr 20 11:03:36.652 2011 (UTC - 4:00)
System Uptime: 0 days 2:04:48.698
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff800032c86ff}

Probably caused by : memory_corruption

Followup: memory_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800032c86ff

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800d163028 -- (.trap 0xfffff8800d163028)
Unable to read trap frame at fffff880`0d163028

LAST_CONTROL_TRANSFER:  from fffff800032c9be9 to fffff800032ca640

STACK_TEXT:  
fffff800`00ba4d28 fffff800`032c9be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`032c80b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`032c86ff : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0d163028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0xff


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
32 errors : !nt (fffff800032c8643-fffff800032c87fb)
fffff800032c8640  25  88  01 *3b  00  66  83  bd  f0  00  00 *ea  33  75  49  b9 %..;.f......3uI.
fffff800032c8650  02  01  00 *12  0f  32  89  45  e8  89  55 *f0  41  f6  42  03 .....2.E..U.A.B.
fffff800032c8660  80  74  35 *b4  c1  e2  20  48  0b  c2  49 *04  82  b8  00  00 .t5... H..I.....
fffff800032c8670  00  74  25 *96  39  82  b0  01  00  00  74 *72  49  8b  92  b8 .t%.9.....trI...
...
fffff800032c86c0  29  4d  00 *19  29  55  10  0f  29  5d  20 *71  29  65  30  0f )M..)U..)] q)e0.
fffff800032c86d0  29  6d  40 *c1  05  e7  41  1f  00  89  85 *c2  01  00  00  8b )m@...A.........
fffff800032c86e0  85  e0  00 *9c  00  0f  20  d1  48  f7  85 *78  00  00  00  00 ...... .H..x....
fffff800032c86f0  02  00  00 *d5  01  fb  65  4c  8b  0c  25 *2b  01  00  00  41 ......eL..%+...A
...
fffff800032c8740  28  a8  08 *86  24  e8  b6  83  08  00  85 *72  0f  8d  0e  01 (...$......r....
fffff800032c8750  00  00  4c *fb  4d  80  44  8a  85  f0  00 *01  00  41  80  e0 ..L.M.D......A..
fffff800032c8760  01  48  8b *28  50  0f  b6  4d  aa  e8  b2 *cb  00  00  85  c0 .H.(P..M........
fffff800032c8770  7c  36  80 *62  80  bb  19  00  00  74  12 *ba  8b  45  50  48 |6.b.....t...EPH
...
fffff800032c87c0  30  00  00 *14  4c  3b  45  e8  74  20  b9 *54  01  00  c0  41 0...L;E.t .T...A
fffff800032c87d0  8b  c0  49 *21  e8  20  41  8b  d0  0f  30 *3d  80  00  00  00 ..I!. A...0=....
fffff800032c87e0  48  8b  4d *cc  48  c1  e9  20  75  76  8b *b3  ba  02  00  00 H.M.H.. uv......
fffff800032c87f0  00  81  f9 *7c  00  00  d0  74  41  81  f9 *c8  00  00  c0  74 ...|...tA......t

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\
]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349de90
Debug session time: Sun Apr 10 10:26:01.599 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:12.645
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80003e2f594, d, 1, fffff800032cedf7}

*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption

Followup: memory_corruption
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80003e2f594, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032cedf7, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800035090e8
 fffff80003e2f594 

CURRENT_IRQL:  d

FAULTING_IP: 
nt!KeAccumulateTicks+307
fffff800`032cedf7 898314479e00    mov     dword ptr [rbx+9E4714h],eax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000152c5
rdx=0000000000020e22 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032cedf7 rsp=fffff80000b9ca30 rbp=0000000000000001
 r8=00000000000010d3  r9=0000000000000000 r10=0000000000000020
r11=fffff80000b9cb08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr ac po cy
nt!KeAccumulateTicks+0x307:
fffff800`032cedf7 898314479e00    mov     dword ptr [rbx+9E4714h],eax ds:0001:00000000`009e4714=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032d7be9 to fffff800032d8640

STACK_TEXT:  
fffff800`00b9c758 fffff800`032d7be9 : 00000000`0000000a fffff800`03e2f594 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`032d6860 : 00000000`00000006 fffffa80`0a336630 fffffa80`0595d6d0 fffff800`0344ae80 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff800`032cedf7 : 00000000`00000202 fffff800`03330c4f fffff880`03315180 fffff880`03317300 : nt!KiPageFault+0x260
fffff800`00b9ca30 fffff800`032e2eb7 : 00000000`00000000 fffff800`0344ae80 00000000`00002710 fffffa80`06354c00 : nt!KeAccumulateTicks+0x307
fffff800`00b9cac0 fffff800`03219895 : fffff800`0323f460 fffff800`00b9cc70 fffff800`0323f460 fffffa80`00000000 : nt!KeUpdateSystemTime+0x377
fffff800`00b9cbc0 fffff800`032d4b73 : fffffa80`00000000 fffffa80`00000000 fffff800`0344d7e0 00000000`00000006 : hal!HalpHpetClockInterrupt+0x8d
fffff800`00b9cbf0 fffff800`032d0342 : fffff800`0344ae80 fffff800`00000002 00000000`00000002 fffff880`00000000 : nt!KiInterruptDispatchNoLock+0x163
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x32


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
16 errors : !nt (fffff800032cedc3-fffff800032cee7b)
fffff800032cedc0  0f  84  f0 *48  ff  ff  8b  83  24  47  00 *1f  01  bb  0c  47 ...H....$G.....G
fffff800032cedd0  00  00  85 *d0  0f  84  f6  fd  ff  ff  01 *9d  20  47  00  00 ............ G..
fffff800032cede0  39  83  20 *4c  00  00  0f  86  e4  fd  ff *1e  e9  a8  0c  06 9. L............
fffff800032cedf0  00  8b  05 *52  a3  23  00  89  83  14  47 *9e  00  8b  83  c8 ...R.#....G.....
...
fffff800032cee40  00  0f  84 *5d  0d  06  00  40  88  6b  06 *25  8b  c8  21  00 ...]...@.k.%..!.
fffff800032cee50  00  8b  05 *37  a4  23  00  39  83  cc  21 *af  00  0f  83  b4 ...7.#.9..!.....
fffff800032cee60  fd  ff  ff *35  cd  0f  86  ac  fd  ff  ff *cd  41  ff  89  83 ...5........A...
fffff800032cee70  c8  21  00 *d3  e9  9e  fd  ff  ff  01  bb *95  47  00  00  e9 .!..........G...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  STRIDE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

BUCKET_ID:  X64_MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption
---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050611-21871-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03259000 PsLoadedModuleList = 0xfffff800`0349ee90
Debug session time: Fri May  6 17:37:49.384 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:02.832
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 62b80560, 0, 0}

Probably caused by : hardware ( nt! ?? ::FNODOBFM::`string'+46585 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000062b80560
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Wow.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800e038900 -- (.trap 0xfffff8800e038900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800653edb0
rdx=fffffa8005b04060 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003304aed rsp=fffff8800e038a90 rbp=fffff8800e038b40
 r8=fffff8800e038b98  r9=fffff6fb400018a8 r10=fffff68000315c00
r11=fffff70001080488 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlUnwindEx+0x527:
fffff800`03304aed 000f            add     byte ptr [rdi],cl ds:00000000`00000000=??
Resetting default scope

MISALIGNED_IP: 
nt!RtlUnwindEx+527
fffff800`03304aed 000f            add     byte ptr [rdi],cl

LAST_CONTROL_TRANSFER:  from fffff8000326c62e to fffff800032d9640

STACK_TEXT:  
fffff880`0e038798 fffff800`0326c62e : 00000000`0000001a 00000000`00041287 00000000`62b80560 00000000`00000000 : nt!KeBugCheckEx
fffff880`0e0387a0 fffff800`032d776e : 00000000`00000001 00000000`62b80560 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x46585
fffff880`0e038900 fffff800`03304aed : fffffa80`05b3bb60 ffffffff`ffffffff 00000000`00000000 fffff880`0e038b40 : nt!KiPageFault+0x16e
fffff880`0e038a90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlUnwindEx+0x527


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+46585
fffff800`0326c62e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+46585

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED

BUCKET_ID:  X64_IP_MISALIGNED

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`0a9b8000 fffff880`0a9e3000   000      000.fcl      Fri Sep 26 09:11:22 2008 (48DCDF7A)
fffff880`07400000 fffff880`0743e000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00fa1000 fffff880`00ff8000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`04757000 fffff880`047e0000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`07dd5000 fffff880`07deb000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`012ec000 fffff880`012f7000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`07447000 fffff880`07d6e000   atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03faf000 fffff880`03ffe000   atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff880`04662000 fffff880`04669000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f62000 fffff880`03f73000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02b6a000 fffff880`02b88000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`006b0000 fffff960`006d7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`0462f000 fffff880`04659000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`0186b000 fffff880`0189b000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00d62000 fffff880`00dc0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0105e000 fffff880`010d0000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`07e9a000 fffff880`07eaa000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`056a2000 fffff880`056ab000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`094d6000 fffff880`094e4000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03f44000 fffff880`03f62000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`03f35000 fffff880`03f44000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01855000 fffff880`0186b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0843d000 fffff880`0845f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`03e47000 fffff880`03e8a000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`094e4000 fffff880`094f7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0440f000 fffff880`04619000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`094f7000 fffff880`09503000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`07eb2000 fffff880`07fa6000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`07fa6000 fffff880`07fec000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`01343000 fffff880`01357000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`012f7000 fffff880`01343000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01400000 fffff880`0140a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0181b000 fffff880`01855000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01ae4000 fffff880`01b2e000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`07e8d000 fffff880`07e9a000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03210000 fffff800`03259000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`07e00000 fffff880`07e24000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`08575000 fffff880`085d1000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`0952e000 fffff880`09547000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`09547000 fffff880`0954f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`09520000 fffff880`0952e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02aa1000 fffff880`02b6a000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01812000 fffff880`0181b000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`010e2000 fffff880`012ec000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`03f99000 fffff880`03faf000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`07deb000 fffff880`07dfa000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`09550000 fffff880`0955e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc7000 fffff800`00bd1000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`08499000 fffff880`084dc000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`015d4000 fffff880`015ef000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01795000 fffff880`017c0000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`0845f000 fffff880`08464200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`09200000 fffff880`09215000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`095af000 fffff880`095d2000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cff000 fffff880`00d4e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`02bcd000 fffff880`02bf0b80   mfeapfk  mfeapfk.sys  Wed Jan 12 16:35:05 2011 (4D2E1E89)
fffff880`094a2000 fffff880`094d5300   mfeavfk  mfeavfk.sys  Wed Jan 12 16:35:31 2011 (4D2E1EA3)
fffff880`01357000 fffff880`013e8b80   mfehidk  mfehidk.sys  Wed Jan 12 16:34:12 2011 (4D2E1E54)
fffff880`01b2e000 fffff880`01b70b00   mfewfpk  mfewfpk.sys  Wed Jan 12 16:34:28 2011 (4D2E1E64)
fffff880`095a1000 fffff880`095af000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e30000 fffff880`03e3f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`09594000 fffff880`095a1000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`02b88000 fffff880`02ba0000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02ba0000 fffff880`02bcd000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`05631000 fffff880`0567e000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0567e000 fffff880`056a2000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`046c7000 fffff880`046d2000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e09000 fffff880`00e13000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`03f2a000 fffff880`03f35000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01800000 fffff880`01812000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01642000 fffff880`01735000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`07fec000 fffff880`07ff8000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02a76000 fffff880`02a89000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`01600000 fffff880`0162f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`08560000 fffff880`08575000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`04400000 fffff880`0440f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04712000 fffff880`04757000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01735000 fffff880`01795000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`046d2000 fffff880`046e3000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03f1e000 fffff880`03f2a000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03259000 fffff800`03843000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01431000 fffff880`015d4000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`04659000 fffff880`04662000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`08548000 fffff880`08560000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`03e00000 fffff880`03e30000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`02a23000 fffff880`02a76000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`018a9000 fffff880`018cf000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00e53000 fffff880`00e68000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00e13000 fffff880`00e46000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`015ef000 fffff880`01600000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`056ab000 fffff880`05751000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`08400000 fffff880`0843d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d4e000 fffff880`00d62000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`017c0000 fffff880`017e4000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`017e4000 fffff880`017ff000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0140a000 fffff880`0142b000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`00cda000 fffff880`00cf4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03ecd000 fffff880`03f1e000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`046ac000 fffff880`046b5000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`046b5000 fffff880`046be000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`046be000 fffff880`046c7000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01bc5000 fffff880`01bff000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`02a89000 fffff880`02aa1000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`07d6e000 fffff880`07dd5000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`0925a000 fffff880`094a1480   RTKVHD64 RTKVHD64.sys Mon Jun 14 05:34:27 2010 (4C15F7A3)
fffff880`03ec3000 fffff880`03ecd000   SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 19:11:52 2010 (4B70A848)
fffff880`03eb9000 fffff880`03ec3000   SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 17:27:34 2010 (4B71E156)
fffff880`05751000 fffff880`0575c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0a871000 fffff880`0a928000   Sftfslh  Sftfslh.sys  Fri Apr 23 15:20:30 2010 (4BD1F2FE)
fffff880`0a928000 fffff880`0a975000   Sftplaylh Sftplaylh.sys Fri Apr 23 15:20:28 2010 (4BD1F2FC)
fffff880`0a9e3000 fffff880`0a9ee000   Sftredirlh Sftredirlh.sys Fri Apr 23 15:20:39 2010 (4BD1F307)
fffff880`095d2000 fffff880`095dd000   Sftvollh Sftvollh.sys Fri Apr 23 15:20:08 2010 (4BD1F2E8)
fffff880`01bbd000 fffff880`01bc5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0e40e000 fffff880`0e47f000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0575c000 fffff880`057f4000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`0a800000 fffff880`0a86a000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`0a975000 fffff880`0a9a6000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`07ff8000 fffff880`07ff9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`018e0000 fffff880`01ae4000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`0a9a6000 fffff880`0a9b8000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`04705000 fffff880`04712000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`046e3000 fffff880`04705000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`03ea5000 fffff880`03eb9000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03f73000 fffff880`03f99000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`084dc000 fffff880`084ee000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`09579000 fffff880`09593c80   usbaudio usbaudio.sys Sat Nov 20 05:43:52 2010 (4CE7A668)
fffff880`09503000 fffff880`09520000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`07e8b000 fffff880`07e8cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`07e24000 fffff880`07e35000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`084ee000 fffff880`08548000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`07e35000 fffff880`07e8b000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0955e000 fffff880`09579000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00e46000 fffff880`00e53000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`04669000 fffff880`04677000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04677000 fffff880`0469c000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e68000 fffff880`00e7d000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00e7d000 fffff880`00ed9000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01b71000 fffff880`01bbd000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`047e9000 fffff880`047ff000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03e8a000 fffff880`03ea5000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`0469c000 fffff880`046ac000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eee000 fffff880`00f92000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f92000 fffff880`00fa1000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`047e0000 fffff880`047e9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00382000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00e00000 fffff880`00e09000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`095dd000 fffff880`095fe000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
fffff880`05600000 fffff880`05631000   WUDFRd   WUDFRd.sys   Sat Nov 20 05:43:32 2010 (4CE7A654)

Unloaded modules:
fffff880`0a9ee000 fffff880`0a9f1000   MSKSSRV.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00003000
fffff880`0a800000 fffff880`0a834000   mfeavfk01.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00034000
fffff880`0189b000 fffff880`018a9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`04412000 fffff880`0461c000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0020A000
fffff880`0461c000 fffff880`0462f000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Solution