Random Screen Freeze / Intermittent and varied BSODs

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by dollie31, Mar 21, 2011.

  1. dollie31

    dollie31 New Member

    Joined:
    Mar 21, 2011
    Messages:
    4
    Likes Received:
    0
    As per the title, I am suffering from recurrent system freezes and intermittent and variable BSODs.

    I've attched the necessary images and system spec.

    Many thanks for any help,


    The system is:

    Item: Microsoft Windows 7 Home Premium - Licence and media - 1 PC - OEM - DVD - 64-bit - English

    Item: Asus M4A785TD-V EVO 785G Socket AM3 onboard DVI VGA HDMI 8 channel audio ATX Motherboard

    Item: Western Digital WD5000AAKS 500GB SATAII 7200RPM 16MB Cache - OEM Caviar Blue

    Item: Arctic Cooling Freezer 7 Pro rev 2 Socket 775, 1156, 1366, AM2, AM3 Heatpipe CPU Cooler

    Item: Crucial 4GB (2x2GB) DDR3 1333MHz/PC3-10600 Ballistix Memory Kit CL7 (7-7-7-24) 1.65V

    Item: Corsair 400W CX PSU - 12cm Fan 80Plus Certified Efficiency 6x SATA 1x PCI-E

    Item: Sony AD-7240S 24x DVD±RW DL & RAM SATA - OEM Black

    Item: AMD Athlon II X4 630 Socket AM3 2.8GHz 2MB L2 Cache Retail Boxed Processor
     

    Attached Files:

  2. dollie31

    dollie31 New Member

    Joined:
    Mar 21, 2011
    Messages:
    4
    Likes Received:
    0
    Most recent minidump attached.
     

    Attached Files:

  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    BAD_POOL_HEADER (19)
    IRQL_NOT_LESS_OR_EQUAL (a)



    Your timings are wrong: 1333mhz 9-9-9-24 while your sticks are rated 1333Mhz 7-7-7-24 1.65v.


    Set your memory as recommended by the manufacturer => 1333Mhz 7-7-7-24 1.65v.



    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031011-20748-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e47e90
    Debug session time: Thu Mar 10 18:00:04.104 2011 (UTC - 4:00)
    System Uptime: 0 days 1:22:59.368
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    .................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {22, fffffa8007a40000, 0, 0}
    
    GetPointerFromAddress: unable to read from fffff80002eb30e8
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+72d6 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000022, 
    Arg2: fffffa8007a40000
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_22
    
    POOL_ADDRESS:  fffffa8007a40000 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002c0ed6e to fffff80002c82640
    
    STACK_TEXT:  
    fffff880`0a71da28 fffff800`02c0ed6e : 00000000`00000019 00000000`00000022 fffffa80`07a40000 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0a71da30 fffff800`02dae1fa : 00000000`00000000 fffff880`0a71db80 fffff880`0a71db00 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x72d6
    fffff880`0a71dac0 fffff800`030d09ae : 00000000`00000000 fffffa80`0818e000 fffffa80`0666f730 fffffa80`00000000 : nt!ExFreePoolWithTag+0x46a
    fffff880`0a71db70 fffff800`030f2090 : fffffa80`06c5bb01 00000000`00000080 fffffa80`03669890 fffff800`02e076e8 : nt!PfpFlushBuffers+0x23e
    fffff880`0a71dc10 fffff800`02f1fcce : ffffffff`ff676980 fffffa80`06c5bb60 fffff880`0a71ddb0 fffffa80`06c5bb60 : nt!PfTLoggingWorker+0xe0
    fffff880`0a71dd40 fffff800`02c73fe6 : fffff880`037d3180 fffffa80`06c5bb60 fffffa80`06328060 fffff880`01069cb0 : nt!PspSystemThreadStartup+0x5a
    fffff880`0a71dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+72d6
    fffff800`02c0ed6e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+72d6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0x19_22_nt!_??_::FNODOBFM::_string_+72d6
    
    BUCKET_ID:  X64_0x19_22_nt!_??_::FNODOBFM::_string_+72d6
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031011-23290-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e61e90
    Debug session time: Thu Mar 10 16:36:37.110 2011 (UTC - 4:00)
    System Uptime: 0 days 0:06:59.374
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck FC, {fffff88009938db0, 800000004f84a963, fffffa800381b500, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4443c )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    An attempt was made to execute non-executable memory.  The guilty driver
    is on the stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff88009938db0, Virtual address for the attempted execute.
    Arg2: 800000004f84a963, PTE contents.
    Arg3: fffffa800381b500, (reserved)
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xFC
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    TRAP_FRAME:  fffffa800381b500 -- (.trap 0xfffffa800381b500)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8004ee0050
    rdx=fffffa8004ee0b98 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88009938db0 rsp=fffffa800381b690 rbp=fffff88009938680
     r8=000000004f444602  r9=0000000000000000 r10=00000000ffffffff
    r11=fffffa800381b660 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    fffff880`09938db0 0090930980f8    add     byte ptr [rax-77FF66Dh],dl ds:0002:ffffffff`f8800995=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c46870 to fffff80002c9c640
    
    STACK_TEXT:  
    fffffa80`0381b398 fffff800`02c46870 : 00000000`000000fc fffff880`09938db0 80000000`4f84a963 fffffa80`0381b500 : nt!KeBugCheckEx
    fffffa80`0381b3a0 fffff800`02c9a76e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`09933000 : nt! ?? ::FNODOBFM::`string'+0x4443c
    fffffa80`0381b500 fffff880`09938db0 : fffff880`09933000 fffff880`09938680 00000000`00000000 00002001`00000101 : nt!KiPageFault+0x16e
    fffffa80`0381b690 fffff880`09933000 : fffff880`09938680 00000000`00000000 00002001`00000101 fffffa80`0381b6b0 : 0xfffff880`09938db0
    fffffa80`0381b698 fffff880`09938680 : 00000000`00000000 00002001`00000101 fffffa80`0381b6b0 fffffa80`0381b6b0 : 0xfffff880`09933000
    fffffa80`0381b6a0 00000000`00000000 : 00002001`00000101 fffffa80`0381b6b0 fffffa80`0381b6b0 fffffa80`0381b6c0 : 0xfffff880`09938680
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4443c
    fffff800`02c46870 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4443c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    FAILURE_BUCKET_ID:  X64_0xFC_nt!_??_::FNODOBFM::_string_+4443c
    
    BUCKET_ID:  X64_0xFC_nt!_??_::FNODOBFM::_string_+4443c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031711-33883-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c16000 PsLoadedModuleList = 0xfffff800`02e5be90
    Debug session time: Thu Mar 17 15:31:41.848 2011 (UTC - 4:00)
    System Uptime: 0 days 0:06:32.487
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff88000c06e18, fffff8800ac98e00, 0}
    
    Probably caused by : fltmgr.sys ( fltmgr!TreeFindNodeOrParent+8 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff88000c06e18, Address of the instruction which caused the bugcheck
    Arg3: fffff8800ac98e00, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    fltmgr!TreeFindNodeOrParent+8
    fffff880`00c06e18 488b4820        mov     rcx,qword ptr [rax+20h]
    
    CONTEXT:  fffff8800ac98e00 -- (.cxr 0xfffff8800ac98e00)
    rax=006e007500540069 rbx=fffff8a00be1a028 rcx=006e007500540069
    rdx=fffffa8003d0d930 rsi=fffff8a00be1a028 rdi=0000000000000000
    rip=fffff88000c06e18 rsp=fffff8800ac997e8 rbp=fffffa8006d57188
     r8=ffffffffffffffff  r9=fffff8800ac99838 r10=fffff880009e8dc0
    r11=fffff8a00be1a028 r12=fffffa8003d0d930 r13=fffff8a00be1a028
    r14=fffff8a00be1a028 r15=0000000000000001
    iopl=0         nv up ei pl nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    fltmgr!TreeFindNodeOrParent+0x8:
    fffff880`00c06e18 488b4820        mov     rcx,qword ptr [rax+20h] ds:002b:006e0075`00540089=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  avp.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88000c06e18
    
    STACK_TEXT:  
    fffff880`0ac997e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!TreeFindNodeOrParent+0x8
    
    
    FOLLOWUP_IP: 
    fltmgr!TreeFindNodeOrParent+8
    fffff880`00c06e18 488b4820        mov     rcx,qword ptr [rax+20h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  fltmgr!TreeFindNodeOrParent+8
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: fltmgr
    
    IMAGE_NAME:  fltmgr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7929c
    
    STACK_COMMAND:  .cxr 0xfffff8800ac98e00 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_fltmgr!TreeFindNodeOrParent+8
    
    BUCKET_ID:  X64_0x3B_fltmgr!TreeFindNodeOrParent+8
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031711-26114-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e8fe90
    Debug session time: Thu Mar 17 15:48:29.625 2011 (UTC - 4:00)
    System Uptime: 0 days 0:01:25.889
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {10000002f, 2, 1, fffff80002cfbe12}
    
    Probably caused by : PCIIDEX.SYS ( PCIIDEX!BmFlush+25 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000000010000002f, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002cfbe12, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e8
     000000010000002f 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KxWaitForLockOwnerShip+12
    fffff800`02cfbe12 48890a          mov     qword ptr [rdx],rcx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880037fb7d0 -- (.trap 0xfffff880037fb7d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffff880037fba00
    rdx=000000010000002f rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cfbe12 rsp=fffff880037fb960 rbp=fffffa8004120ea0
     r8=fffff880037fba00  r9=fffff80002c2cc60 r10=00000000000fffff
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!KxWaitForLockOwnerShip+0x12:
    fffff800`02cfbe12 48890a          mov     qword ptr [rdx],rcx ds:0022:00000001`0000002f=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002cc9be9 to fffff80002cca640
    
    STACK_TEXT:  
    fffff880`037fb688 fffff800`02cc9be9 : 00000000`0000000a 00000001`0000002f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`037fb690 fffff800`02cc8860 : fffffa80`04745790 fffffa80`077f6910 fffffa80`04734530 fffffa80`04120e00 : nt!KiBugCheckDispatch+0x69
    fffff880`037fb7d0 fffff800`02cfbe12 : fffffa80`00000002 fffffa80`036536a8 00000000`00000001 fffff800`02c047d8 : nt!KiPageFault+0x260
    fffff880`037fb960 fffff800`02cd466d : fffffa80`04120e00 fffffa00`001200b0 fffffa80`074d9680 fffff800`02c03354 : nt!KxWaitForLockOwnerShip+0x12
    fffff880`037fb990 fffff800`02c05b98 : fffffa80`04120ea0 fffffa80`04120ea0 00000000`00000001 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x8d
    fffff880`037fb9e0 fffff800`02c05825 : fffffa80`074d9720 00000000`00000000 00000000`00000001 fffffa80`074fe0d0 : hal!IoFreeMapRegisters+0x78
    fffff880`037fba50 fffff880`00fcf199 : fffffa80`074d9680 fffffa80`0412f1b0 fffffa80`074d9680 fffffa80`040a8cc0 : hal!HalPutScatterGatherList+0xd5
    fffff880`037fbab0 fffff880`00e15453 : 00000000`00000000 00000000`00000001 fffff800`02cc6063 00000000`0000000b : PCIIDEX!BmFlush+0x25
    fffff880`037fbae0 fffff880`00e15104 : fffffa80`036521a0 00000000`00000000 fffffa80`036521a0 fffffa80`074d9680 : ataport!IdeProcessCompletedRequests+0x123
    fffff880`037fbc10 fffff800`02cd5b1c : fffff880`037d3180 00000000`0e1d90f6 fffffa80`03652050 fffffa80`03652118 : ataport!IdePortCompletionDpc+0x1a8
    fffff880`037fbcd0 fffff800`02cc236a : fffff880`037d3180 fffff880`037ddfc0 00000000`00000000 fffff880`00e14f5c : nt!KiRetireDpcList+0x1bc
    fffff880`037fbd80 00000000`00000000 : fffff880`037fc000 fffff880`037f6000 fffff880`037fbd40 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    PCIIDEX!BmFlush+25
    fffff880`00fcf199 4883a3e003000000 and     qword ptr [rbx+3E0h],0
    
    SYMBOL_STACK_INDEX:  7
    
    SYMBOL_NAME:  PCIIDEX!BmFlush+25
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: PCIIDEX
    
    IMAGE_NAME:  PCIIDEX.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc114
    
    FAILURE_BUCKET_ID:  X64_0xA_PCIIDEX!BmFlush+25
    
    BUCKET_ID:  X64_0xA_PCIIDEX!BmFlush+25
    
    Followup: MachineOwner
    ---------
    
    
    
    
    DRIVERS

    Code:
    start             end                 module name
    fffff880`04c13000 fffff880`04c51000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
    fffff880`00ef3000 fffff880`00f4a000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`03447000 fffff880`034d0000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`04c6a000 fffff880`04c80000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01026000 fffff880`0103b000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e33000 fffff880`00e3e000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`04a2e000 fffff880`04a36000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
    fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e09000 fffff880`00e33000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`0500e000 fffff880`0590a000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`0103b000 fffff880`01089000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff960`00990000 fffff960`009f1000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`03587000 fffff880`0358e000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`011e0000 fffff880`011f1000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`04200000 fffff880`0421e000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`007b0000 fffff960`007d7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`01967000 fffff880`01991000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00d13000 fffff880`00dd3000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`021c5000 fffff880`021f5000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00cb5000 fffff880`00d13000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01150000 fffff880`011c2000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`04c5a000 fffff880`04c6a000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`06798000 fffff880`067a6000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`011c2000 fffff880`011e0000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`01200000 fffff880`0120f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`021af000 fffff880`021c5000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06770000 fffff880`06792000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`067b2000 fffff880`067bb000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`067a6000 fffff880`067b2000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`067bb000 fffff880`067ce000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04dcf000 fffff880`04ddb000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0590a000 fffff880`059fe000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`04acf000 fffff880`04b15000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`010de000 fffff880`010f2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01092000 fffff880`010de000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`013e4000 fffff880`013ee000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`02175000 fffff880`021af000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`0185c000 fffff880`018a6000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`04b8f000 fffff880`04b9c000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02c01000 fffff800`02c4a000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`04b15000 fffff880`04b39000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`066d7000 fffff880`06733000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
    fffff880`06600000 fffff880`06619000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`06619000 fffff880`06621080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`067ed000 fffff880`067fb000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`0432e000 fffff880`043f7000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`0216c000 fffff880`02175000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`04d35000 fffff880`04d44000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06635000 fffff880`06643000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
    fffff800`00bc5000 fffff800`00bcf000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`01a0d000 fffff880`0216c000   kl1      kl1.sys      Wed Jun 09 09:34:19 2010 (4C0F985B)
    fffff880`03440000 fffff880`03447000   kl2      kl2.sys      Wed Jun 09 09:24:47 2010 (4C0F961F)
    fffff880`034e8000 fffff880`0357e000   klif     klif.sys     Fri Aug 06 13:14:46 2010 (4C5C4306)
    fffff880`034d9000 fffff880`034e2000   klim6    klim6.sys    Thu Apr 22 11:07:24 2010 (4BD0662C)
    fffff880`04daa000 fffff880`04db4000   klmouflt klmouflt.sys Mon Nov 02 11:26:06 2009 (4AEF081E)
    fffff880`04d55000 fffff880`04d98000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`013b8000 fffff880`013d3000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`015a6000 fffff880`015d1000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`06792000 fffff880`06797200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`06622000 fffff880`06635000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
    fffff880`04de9000 fffff880`04dfe000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06650000 fffff880`06664000   LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)
    fffff880`00c5c000 fffff880`00c7f000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c94000 fffff880`00ca1000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`04ddb000 fffff880`04de9000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04d44000 fffff880`04d53000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06643000 fffff880`06650000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fde000 fffff880`00ff8000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`0421e000 fffff880`04236000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`04236000 fffff880`04263000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
    fffff880`07c5a000 fffff880`07ca7000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
    fffff880`07ca7000 fffff880`07ccb000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
    fffff880`035ec000 fffff880`035f7000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f53000 fffff880`00f5d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010f2000 fffff880`01150000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`013ee000 fffff880`013f9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01934000 fffff880`01946000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01453000 fffff880`01546000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`04ca4000 fffff880`04cb0000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`042f9000 fffff880`0430c000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`04cb0000 fffff880`04cdf000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`066c2000 fffff880`066d7000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`01616000 fffff880`01625000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`01991000 fffff880`019d6000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01546000 fffff880`015a6000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`04a42000 fffff880`04ab5000   netr6164 netr6164.sys Wed Apr 07 08:07:21 2010 (4BBC7579)
    fffff880`03400000 fffff880`03411000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015ec000 fffff880`015f8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02c4a000 fffff800`03234000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01215000 fffff880`013b8000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`0357e000 fffff880`03587000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`042a6000 fffff880`042f9000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`019d6000 fffff880`019fc000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`04a11000 fffff880`04a2e000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f9d000 fffff880`00fb2000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f5d000 fffff880`00f90000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00fc7000 fffff880`00fce000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fce000 fffff880`00fde000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013d3000 fffff880`013e4000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`07ccb000 fffff880`07d71000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`06733000 fffff880`06770000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00ca1000 fffff880`00cb5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04c80000 fffff880`04ca4000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`04cdf000 fffff880`04cfa000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04cfa000 fffff880`04d1b000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`04d1b000 fffff880`04d35000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`01400000 fffff880`01451000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`035d1000 fffff880`035da000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`035da000 fffff880`035e3000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`035e3000 fffff880`035ec000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`018fa000 fffff880`01934000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`0430c000 fffff880`04324000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04b39000 fffff880`04b8f000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`07d71000 fffff880`07d7c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`04a36000 fffff880`04a42000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`01625000 fffff880`01642000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`018f2000 fffff880`018fa000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`08337000 fffff880`083d0000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
    fffff880`082cc000 fffff880`08337000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
    fffff880`07d7c000 fffff880`07dad000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
    fffff880`04d53000 fffff880`04d54480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01658000 fffff880`0185c000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`07dad000 fffff880`07dbf000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`03433000 fffff880`03440000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`03411000 fffff880`03433000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`01642000 fffff880`01656000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`01000000 fffff880`01026000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`04d98000 fffff880`04daa000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`067ce000 fffff880`067eb000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`067eb000 fffff880`067ecf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04a00000 fffff880`04a11000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`06668000 fffff880`066c2000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`04b9c000 fffff880`04ba7000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04ba7000 fffff880`04bfd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`04db4000 fffff880`04dcf000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
    fffff880`00f90000 fffff880`00f9d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0358e000 fffff880`0359c000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0359c000 fffff880`035c1000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00fb2000 fffff880`00fc7000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`018a6000 fffff880`018f2000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04ab5000 fffff880`04ac2000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`01600000 fffff880`01616000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`04324000 fffff880`0432e000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
    fffff880`015d1000 fffff880`015ec000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`035c1000 fffff880`035d1000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e40000 fffff880`00ee4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ee4000 fffff880`00ef3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`034d0000 fffff880`034d9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000b0000 fffff960`003c1000   win32k   win32k.sys   unavailable (00000000)
    fffff880`04c51000 fffff880`04c5a000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f4a000 fffff880`00f53000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01946000 fffff880`01967000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`01946000 fffff880`01954000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01a00000 fffff880`01a0c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`021f5000 fffff880`021fe000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01954000 fffff880`01967000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`015ec000 fffff880`015ff000   RapportEI64.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
    #3 cybercore, Mar 22, 2011
    Last edited: Mar 22, 2011

Share This Page

Loading...