Repeating BSOD, programs crashing and closing...

#1
Well, I've tried to put off asking for help since I thought it might be something I was doing wrong, but it's gotten past the point of being simply annoying now.

I've been getting a slew of BSOD at seemingly random intervals. Those incluidng Memory Memory, Page Fault in Non Paged Area, others that I've forgotten or have simply not given a fault cause.

I thought it was perhaps the image I used for my last install of Windows 7 64 bit Home Premium, but after reformatting and reinstalling this morning, I've had three more bluescreens since then. It forces a shutdown each time. Amongst this, I'm also getting all of my programs to crash or simply refuse to run, a message popping up stating it encountered an error and closed straight after trying to open the program. My firefox browser crashes frequently. I'm seriously considering putting this down to a hardware issue and I'm not sure what to do about it.

Unfortunately, since refomatting and reinstalling I've lost the minidumps of the countless BSOD I had encountered before, but the ones I've had since installing this morning are attatched to this post.

Any help or advice would be greatly appreciated. View attachment Minidump.rar
 


#2
Bugchecks: 1a, 24, 50



Update these drivers:

igdkmd64.sys Wed May 06 14:22:19 2009
Intel Graphics Accelerator
Intel

Rt64win7.sys Thu Feb 26 04:04:13 2009
Realtek 8136/8168/8169 PCI/PCIe

RTL8187Se.sys Wed Feb 25 21:31:45 2009
Realtek RTL8187S Wireless LAN PCIE Network Adapter



If it still crashes after the updates, check your memory settings in the bios. Attach CPU-Z memory and spd tabs screenshots, and give link to your RAM sticks.





Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123110-18111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02863000 PsLoadedModuleList = 0xfffff800`02aa0e50
Debug session time: Fri Dec 31 06:37:36.693 2010 (UTC - 5:00)
System Uptime: 0 days 0:10:46.675
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff8a20f191010, 0, fffff80002a06f8c, 5}


Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )

Followup: Pool_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a20f191010, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002a06f8c, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0b0e0
 fffff8a20f191010 

FAULTING_IP: 
nt!ExDeferredFreePool+100
fffff800`02a06f8c 4c8b02          mov     r8,qword ptr [rdx]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  lsass.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880027206f0 -- (.trap 0xfffff880027206f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003c5eca0 rbx=0000000000000000 rcx=fffffa8003c5eca0
rdx=fffff8a20f191010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a06f8c rsp=fffff88002720880 rbp=0000000000000000
 r8=fffff8a20f191010  r9=0000000000000000 r10=fffff8a00f1915e0
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExDeferredFreePool+0x100:
fffff800`02a06f8c 4c8b02          mov     r8,qword ptr [rdx] ds:0898:fffff8a2`0f191010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800029528c1 to fffff800028d3740

STACK_TEXT:  
fffff880`02720588 fffff800`029528c1 : 00000000`00000050 fffff8a2`0f191010 00000000`00000000 fffff880`027206f0 : nt!KeBugCheckEx
fffff880`02720590 fffff800`028d182e : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`027206f0 fffff800`02a06f8c : fffff8a0`0efc44c0 fffff800`02a082dd fffff8a0`0f193a70 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`02720880 fffff800`02a084c1 : 00000000`00000000 fffff8a0`0f193a10 fffff8a0`0efc44d0 fffff800`02a83b00 : nt!ExDeferredFreePool+0x100
fffff880`02720910 fffff800`028d88bc : fffffa80`03edcb60 00000000`00000000 fffff880`656b6f54 fffffa80`03c6fa00 : nt!ExFreePoolWithTag+0x411
fffff880`027209c0 fffff800`02ba3735 : fffff880`02720c60 00000000`00000000 fffff8a0`0f193a70 00000000`00000001 : nt!ObfDereferenceObject+0xdc
fffff880`02720a20 fffff800`028d2993 : 00000000`0129eb2c fffffa80`03edcb60 00000000`003c9570 00000000`003c9570 : nt!NtSetInformationThread+0x254
fffff880`02720be0 00000000`774bfe2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0129ea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774bfe2a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+100
fffff800`02a06f8c 4c8b02          mov     r8,qword ptr [rdx]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ExDeferredFreePool+100

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+100

BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+100

Followup: Pool_corruption
---------















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123110-17581-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
Debug session time: Fri Dec 31 08:45:24.633 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:22.615
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88005a380b8, fffff88005a37920, fffff800028b0fcb}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+180 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88005a380b8
Arg3: fffff88005a37920
Arg4: fffff800028b0fcb

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88005a380b8 -- (.exr 0xfffff88005a380b8)
ExceptionAddress: fffff800028b0fcb (nt!MmMapViewInSystemCache+0x000000000000021b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000018
Attempt to write to address 0000000000000018

CONTEXT:  fffff88005a37920 -- (.cxr 0xfffff88005a37920)
rax=0000000000000000 rbx=fffff6fc00000000 rcx=0000000000000000
rdx=0000000000000040 rsi=fffff8a00232ec00 rdi=fffff8a00232ea00
rip=fffff800028b0fcb rsp=fffff88005a382f0 rbp=fffff6fc00000200
 r8=fffffa8000000020  r9=fffffa8003c5d520 r10=fffffa8003c5d008
r11=0000000000000000 r12=fffffa8006910430 r13=0000000000000000
r14=fffffa8003cd0b40 r15=fffffa80069104b0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MmMapViewInSystemCache+0x21b:
fffff800`028b0fcb 4d897d18        mov     qword ptr [r13+18h],r15 ds:002b:00000000`00000018=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msnmsgr.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000018

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abf0e0
 0000000000000018 

FOLLOWUP_IP: 
Ntfs!NtfsCachedRead+180
fffff880`01261fc0 84c0            test    al,al

FAULTING_IP: 
nt!MmMapViewInSystemCache+21b
fffff800`028b0fcb 4d897d18        mov     qword ptr [r13+18h],r15

BUGCHECK_STR:  0x24

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff800028b0407 to fffff800028b0fcb

STACK_TEXT:  
fffff880`05a382f0 fffff800`028b0407 : fffff8a0`026ce1e0 fffff800`02a02530 fffff880`05a38498 fffff8a0`026d0c90 : nt!MmMapViewInSystemCache+0x21b
fffff880`05a38460 fffff800`028a62a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcGetVacbMiss+0x177
fffff880`05a38520 fffff800`02ba4922 : 00000000`00000000 00000000`00000000 fffff880`05a385f0 fffff880`05a38680 : nt!CcGetVirtualAddress+0x1b0
fffff880`05a385b0 fffff880`01261fc0 : fffff8a0`00000000 fffff880`00000005 fffffa80`0688a010 fffff880`012b5001 : nt!CcCopyRead+0x132
fffff880`05a38670 fffff880`01266303 : 00000000`00000000 fffff8a0`026d3140 fffff880`05a388a0 fffff880`05a38798 : Ntfs!NtfsCachedRead+0x180
fffff880`05a386d0 fffff880`01268f78 : fffffa80`0688a010 fffffa80`0669a010 fffff880`05a38801 fffffa80`051ca400 : Ntfs!NtfsCommonRead+0x583
fffff880`05a38870 fffff880`010c623f : fffffa80`0669a368 fffffa80`0669a010 fffffa80`051ca450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`05a38920 fffff880`010c46df : fffffa80`04cdb040 00000000`00000001 fffffa80`04cdb000 fffffa80`0669a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`05a389b0 fffff800`02b9dca9 : 00000000`00000000 fffffa80`0694fdd0 00000000`00000001 fffffa80`0669a010 : fltmgr!FltpDispatch+0xcf
fffff880`05a38a10 fffff800`02ba54a3 : fffffa80`0694fdd0 fffffa80`0694fdd0 fffffa80`0694fdd0 fffff800`02a01e80 : nt!IopSynchronousServiceTail+0xf9
fffff880`05a38a80 fffff800`02886993 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`05a38b70 00000000`74a22dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`086deb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a22dd9


SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Ntfs!NtfsCachedRead+180

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff88005a37920 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCachedRead+180

BUCKET_ID:  X64_0x24_Ntfs!NtfsCachedRead+180

Followup: MachineOwner
---------














Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123110-26208-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02855000 PsLoadedModuleList = 0xfffff800`02a92e50
Debug session time: Fri Dec 31 08:56:45.961 2010 (UTC - 5:00)
System Uptime: 0 days 0:10:56.943
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff70001080000, 9a0, 9a400001344}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+21b46 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000009a0
Arg4: 000009a400001344

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006bf6d60 -- (.trap 0xfffff88006bf6d60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000fffe
rdx=000000000000020a rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b93a6b rsp=fffff88006bf6ef0 rbp=fffffa80051ad060
 r8=fffffa800570cb30  r9=0000000000000000 r10=fffffa8003f75b60
r11=fffffa80048290e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MmCreateTeb+0x11b:
fffff800`02b93a6b 830eff          or      dword ptr [rsi],0FFFFFFFFh ds:0001:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000292d986 to fffff800028c5740

STACK_TEXT:  
fffff880`06bf6ba8 fffff800`0292d986 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000009a0 : nt!KeBugCheckEx
fffff880`06bf6bb0 fffff800`028e004c : fffff680`003f7d48 fffff880`06bf6c80 00000000`00000000 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x21b46
fffff880`06bf6c00 fffff800`028c382e : 00000000`00000001 00000000`7efa7000 00000000`7efaa000 fffffa80`051ad060 : nt!MmAccessFault+0xc4c
fffff880`06bf6d60 fffff800`02b93a6b : fffffa80`051ad060 00000000`00000000 00000000`00002fe4 fffff880`06bf6f80 : nt!KiPageFault+0x16e
fffff880`06bf6ef0 fffff800`02b904bc : 00000000`7efa7000 00000000`00001000 00000000`00000000 00000000`00000000 : nt!MmCreateTeb+0x11b
fffff880`06bf6f80 fffff800`02b93d12 : fffffa80`051ad060 00000000`00000000 fffffa80`03c6ad01 fffff880`06bf79d0 : nt!PspAllocateThread+0x364
fffff880`06bf71a0 fffff800`02b9408b : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`06bf79d0 : nt!PspCreateThread+0x1d2
fffff880`06bf7420 fffff800`028c4993 : fffffa80`061cd060 00000000`0017e258 fffff880`06bf7b88 00000000`00000000 : nt!NtCreateThreadEx+0x243
fffff880`06bf7b70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+21b46
fffff800`0292d986 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+21b46

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00eb9000 fffff880`00f10000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cee000 fffff880`02d78000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04349000 fffff880`0435f000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ded000 fffff880`00df8000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00dba000 fffff880`00dc3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc3000 fffff880`00ded000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`00f81000 fffff880`00f8d000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`0193b000 fffff880`01942000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02dec000 fffff880`02dfd000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`024c8000 fffff880`024e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`01908000 fffff880`01932000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018a2000 fffff880`018d2000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d42000 fffff880`00da0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04315000 fffff880`04319500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01119000 fffff880`0118c000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00f78000 fffff880`00f81000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`04339000 fffff880`04349000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04412000 fffff880`04420000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02ccb000 fffff880`02ce9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02cbc000 fffff880`02ccb000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0188c000 fffff880`018a2000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045dd000 fffff880`045ff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0442c000 fffff880`04435000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04420000 fffff880`0442c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04435000 fffff880`04448000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04406000 fffff880`04412000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04080000 fffff880`04174000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04174000 fffff880`041ba000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010a7000 fffff880`010bb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0105b000 fffff880`010a7000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01852000 fffff880`0188c000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0280c000 fffff800`02855000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`041c7000 fffff880`041eb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04544000 fffff880`045a0000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04456000 fffff880`0446f000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0446f000 fffff880`04477080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04448000 fffff880`04456000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02400000 fffff880`024c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e8000 fffff880`015f1000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`042d9000 fffff880`042f7000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03a26000 fffff880`03ff9500   igdkmd64 igdkmd64.sys Wed May 06 14:22:19 2009 (4A01D55B)
fffff880`04323000 fffff880`04339000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`042f7000 fffff880`04306000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04480000 fffff880`044c3000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015ab000 fffff880`015d6000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04400000 fffff880`04405200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04067000 fffff880`0407c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`011d8000 fffff880`011fb000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cea000 fffff880`00d2e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`041eb000 fffff880`041f9000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04306000 fffff880`04315000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0421c000 fffff880`04229000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00da0000 fffff880`00dba000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0256b000 fffff880`02583000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02583000 fffff880`025b0000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`025b0000 fffff880`025fe000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`02888000 fffff880`028ab000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019a0000 fffff880`019ab000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f19000 fffff880`00f23000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010bb000 fffff880`01119000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02cb1000 fffff880`02cbc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015d6000 fffff880`015e8000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01459000 fffff880`0154b000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04383000 fffff880`0438f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02540000 fffff880`02553000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0438f000 fffff880`043be000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0452f000 fffff880`04544000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c16000 fffff880`02c25000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d78000 fffff880`02dbd000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0154b000 fffff880`015ab000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019ab000 fffff880`019bc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02ca5000 fffff880`02cb1000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02855000 fffff800`02e31000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0124b000 fffff880`013ee000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01932000 fffff880`0193b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`024ed000 fffff880`02540000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02dc6000 fffff880`02dec000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f63000 fffff880`00f78000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f23000 fffff880`00f56000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00cc0000 fffff880`00cc7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00cc7000 fffff880`00cd7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`028ab000 fffff880`02951000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`045a0000 fffff880`045dd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d2e000 fffff880`00d42000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0435f000 fffff880`04383000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043be000 fffff880`043d9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`043d9000 fffff880`043fa000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04200000 fffff880`0421a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c54000 fffff880`02ca5000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01985000 fffff880`0198e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0198e000 fffff880`01997000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01997000 fffff880`019a0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02553000 fffff880`0256b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`042a7000 fffff880`042d9000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`04229000 fffff880`0429a000   RTL8187Se RTL8187Se.sys Wed Feb 25 21:31:45 2009 (49A5FF11)
fffff880`02951000 fffff880`0295c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`03800000 fffff880`03871000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`038ff000 fffff880`03995000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`02800000 fffff880`02868000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`0295c000 fffff880`02989000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`0421a000 fffff880`0421b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02989000 fffff880`0299b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019da000 fffff880`019e7000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`019bc000 fffff880`019da000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c40000 fffff880`02c54000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`01800000 fffff880`01826000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`044c3000 fffff880`044d5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`03a00000 fffff880`03a1d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04478000 fffff880`04479f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04056000 fffff880`04067000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044d5000 fffff880`0452f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`01826000 fffff880`01841000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`041ba000 fffff880`041c7000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`018d2000 fffff880`018ff100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`00f56000 fffff880`00f63000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01942000 fffff880`01950000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01950000 fffff880`01975000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f8d000 fffff880`00fa2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fa2000 fffff880`00ffe000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0118c000 fffff880`011d8000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0429a000 fffff880`042a7000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02c00000 fffff880`02c16000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02c25000 fffff880`02c40000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01975000 fffff880`01985000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e06000 fffff880`00eaa000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eaa000 fffff880`00eb9000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dbd000 fffff880`02dc6000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F)
fffff880`0431a000 fffff880`04323000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f10000 fffff880`00f19000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`018d2000 fffff880`018e0000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018e0000 fffff880`018ec000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018ec000 fffff880`018f5000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018f5000 fffff880`01908000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.