Repeating BSOD, programs crashing and closing...

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Anton17, Dec 31, 2010.

  1. Anton17

    Anton17 New Member

    Joined:
    Oct 29, 2010
    Messages:
    44
    Likes Received:
    0
    Well, I've tried to put off asking for help since I thought it might be something I was doing wrong, but it's gotten past the point of being simply annoying now.

    I've been getting a slew of BSOD at seemingly random intervals. Those incluidng Memory Memory, Page Fault in Non Paged Area, others that I've forgotten or have simply not given a fault cause.

    I thought it was perhaps the image I used for my last install of Windows 7 64 bit Home Premium, but after reformatting and reinstalling this morning, I've had three more bluescreens since then. It forces a shutdown each time. Amongst this, I'm also getting all of my programs to crash or simply refuse to run, a message popping up stating it encountered an error and closed straight after trying to open the program. My firefox browser crashes frequently. I'm seriously considering putting this down to a hardware issue and I'm not sure what to do about it.

    Unfortunately, since refomatting and reinstalling I've lost the minidumps of the countless BSOD I had encountered before, but the ones I've had since installing this morning are attatched to this post.

    Any help or advice would be greatly appreciated.View attachment Minidump.rar
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Bugchecks: 1a, 24, 50



    Update these drivers:

    igdkmd64.sys Wed May 06 14:22:19 2009
    Intel Graphics Accelerator
    Intel

    Rt64win7.sys Thu Feb 26 04:04:13 2009
    Realtek 8136/8168/8169 PCI/PCIe

    RTL8187Se.sys Wed Feb 25 21:31:45 2009
    Realtek RTL8187S Wireless LAN PCIE Network Adapter



    If it still crashes after the updates, check your memory settings in the bios. Attach CPU-Z memory and spd tabs screenshots, and give link to your RAM sticks.





    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\123110-18111-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02863000 PsLoadedModuleList = 0xfffff800`02aa0e50
    Debug session time: Fri Dec 31 06:37:36.693 2010 (UTC - 5:00)
    System Uptime: 0 days 0:10:46.675
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8a20f191010, 0, fffff80002a06f8c, 5}
    
    
    Could not read faulting driver name
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
    
    Followup: Pool_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a20f191010, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002a06f8c, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0b0e0
     fffff8a20f191010 
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+100
    fffff800`02a06f8c 4c8b02          mov     r8,qword ptr [rdx]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  lsass.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880027206f0 -- (.trap 0xfffff880027206f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8003c5eca0 rbx=0000000000000000 rcx=fffffa8003c5eca0
    rdx=fffff8a20f191010 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a06f8c rsp=fffff88002720880 rbp=0000000000000000
     r8=fffff8a20f191010  r9=0000000000000000 r10=fffff8a00f1915e0
    r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!ExDeferredFreePool+0x100:
    fffff800`02a06f8c 4c8b02          mov     r8,qword ptr [rdx] ds:0898:fffff8a2`0f191010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800029528c1 to fffff800028d3740
    
    STACK_TEXT:  
    fffff880`02720588 fffff800`029528c1 : 00000000`00000050 fffff8a2`0f191010 00000000`00000000 fffff880`027206f0 : nt!KeBugCheckEx
    fffff880`02720590 fffff800`028d182e : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
    fffff880`027206f0 fffff800`02a06f8c : fffff8a0`0efc44c0 fffff800`02a082dd fffff8a0`0f193a70 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`02720880 fffff800`02a084c1 : 00000000`00000000 fffff8a0`0f193a10 fffff8a0`0efc44d0 fffff800`02a83b00 : nt!ExDeferredFreePool+0x100
    fffff880`02720910 fffff800`028d88bc : fffffa80`03edcb60 00000000`00000000 fffff880`656b6f54 fffffa80`03c6fa00 : nt!ExFreePoolWithTag+0x411
    fffff880`027209c0 fffff800`02ba3735 : fffff880`02720c60 00000000`00000000 fffff8a0`0f193a70 00000000`00000001 : nt!ObfDereferenceObject+0xdc
    fffff880`02720a20 fffff800`028d2993 : 00000000`0129eb2c fffffa80`03edcb60 00000000`003c9570 00000000`003c9570 : nt!NtSetInformationThread+0x254
    fffff880`02720be0 00000000`774bfe2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0129ea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774bfe2a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+100
    fffff800`02a06f8c 4c8b02          mov     r8,qword ptr [rdx]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+100
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+100
    
    BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+100
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\123110-17581-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
    Debug session time: Fri Dec 31 08:45:24.633 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:22.615
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff88005a380b8, fffff88005a37920, fffff800028b0fcb}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+180 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff88005a380b8
    Arg3: fffff88005a37920
    Arg4: fffff800028b0fcb
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  fffff88005a380b8 -- (.exr 0xfffff88005a380b8)
    ExceptionAddress: fffff800028b0fcb (nt!MmMapViewInSystemCache+0x000000000000021b)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000001
       Parameter[1]: 0000000000000018
    Attempt to write to address 0000000000000018
    
    CONTEXT:  fffff88005a37920 -- (.cxr 0xfffff88005a37920)
    rax=0000000000000000 rbx=fffff6fc00000000 rcx=0000000000000000
    rdx=0000000000000040 rsi=fffff8a00232ec00 rdi=fffff8a00232ea00
    rip=fffff800028b0fcb rsp=fffff88005a382f0 rbp=fffff6fc00000200
     r8=fffffa8000000020  r9=fffffa8003c5d520 r10=fffffa8003c5d008
    r11=0000000000000000 r12=fffffa8006910430 r13=0000000000000000
    r14=fffffa8003cd0b40 r15=fffffa80069104b0
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!MmMapViewInSystemCache+0x21b:
    fffff800`028b0fcb 4d897d18        mov     qword ptr [r13+18h],r15 ds:002b:00000000`00000018=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  msnmsgr.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  0000000000000001
    
    EXCEPTION_PARAMETER2:  0000000000000018
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abf0e0
     0000000000000018 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsCachedRead+180
    fffff880`01261fc0 84c0            test    al,al
    
    FAULTING_IP: 
    nt!MmMapViewInSystemCache+21b
    fffff800`028b0fcb 4d897d18        mov     qword ptr [r13+18h],r15
    
    BUGCHECK_STR:  0x24
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from fffff800028b0407 to fffff800028b0fcb
    
    STACK_TEXT:  
    fffff880`05a382f0 fffff800`028b0407 : fffff8a0`026ce1e0 fffff800`02a02530 fffff880`05a38498 fffff8a0`026d0c90 : nt!MmMapViewInSystemCache+0x21b
    fffff880`05a38460 fffff800`028a62a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcGetVacbMiss+0x177
    fffff880`05a38520 fffff800`02ba4922 : 00000000`00000000 00000000`00000000 fffff880`05a385f0 fffff880`05a38680 : nt!CcGetVirtualAddress+0x1b0
    fffff880`05a385b0 fffff880`01261fc0 : fffff8a0`00000000 fffff880`00000005 fffffa80`0688a010 fffff880`012b5001 : nt!CcCopyRead+0x132
    fffff880`05a38670 fffff880`01266303 : 00000000`00000000 fffff8a0`026d3140 fffff880`05a388a0 fffff880`05a38798 : Ntfs!NtfsCachedRead+0x180
    fffff880`05a386d0 fffff880`01268f78 : fffffa80`0688a010 fffffa80`0669a010 fffff880`05a38801 fffffa80`051ca400 : Ntfs!NtfsCommonRead+0x583
    fffff880`05a38870 fffff880`010c623f : fffffa80`0669a368 fffffa80`0669a010 fffffa80`051ca450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
    fffff880`05a38920 fffff880`010c46df : fffffa80`04cdb040 00000000`00000001 fffffa80`04cdb000 fffffa80`0669a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`05a389b0 fffff800`02b9dca9 : 00000000`00000000 fffffa80`0694fdd0 00000000`00000001 fffffa80`0669a010 : fltmgr!FltpDispatch+0xcf
    fffff880`05a38a10 fffff800`02ba54a3 : fffffa80`0694fdd0 fffffa80`0694fdd0 fffffa80`0694fdd0 fffff800`02a01e80 : nt!IopSynchronousServiceTail+0xf9
    fffff880`05a38a80 fffff800`02886993 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
    fffff880`05a38b70 00000000`74a22dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`086deb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a22dd9
    
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  Ntfs!NtfsCachedRead+180
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f
    
    STACK_COMMAND:  .cxr 0xfffff88005a37920 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCachedRead+180
    
    BUCKET_ID:  X64_0x24_Ntfs!NtfsCachedRead+180
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\123110-26208-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02855000 PsLoadedModuleList = 0xfffff800`02a92e50
    Debug session time: Fri Dec 31 08:56:45.961 2010 (UTC - 5:00)
    System Uptime: 0 days 0:10:56.943
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {5003, fffff70001080000, 9a0, 9a400001344}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+21b46 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000005003, The subtype of the bugcheck.
    Arg2: fffff70001080000
    Arg3: 00000000000009a0
    Arg4: 000009a400001344
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_5003
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88006bf6d60 -- (.trap 0xfffff88006bf6d60)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=000000000000fffe
    rdx=000000000000020a rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002b93a6b rsp=fffff88006bf6ef0 rbp=fffffa80051ad060
     r8=fffffa800570cb30  r9=0000000000000000 r10=fffffa8003f75b60
    r11=fffffa80048290e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!MmCreateTeb+0x11b:
    fffff800`02b93a6b 830eff          or      dword ptr [rsi],0FFFFFFFFh ds:0001:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000292d986 to fffff800028c5740
    
    STACK_TEXT:  
    fffff880`06bf6ba8 fffff800`0292d986 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000009a0 : nt!KeBugCheckEx
    fffff880`06bf6bb0 fffff800`028e004c : fffff680`003f7d48 fffff880`06bf6c80 00000000`00000000 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x21b46
    fffff880`06bf6c00 fffff800`028c382e : 00000000`00000001 00000000`7efa7000 00000000`7efaa000 fffffa80`051ad060 : nt!MmAccessFault+0xc4c
    fffff880`06bf6d60 fffff800`02b93a6b : fffffa80`051ad060 00000000`00000000 00000000`00002fe4 fffff880`06bf6f80 : nt!KiPageFault+0x16e
    fffff880`06bf6ef0 fffff800`02b904bc : 00000000`7efa7000 00000000`00001000 00000000`00000000 00000000`00000000 : nt!MmCreateTeb+0x11b
    fffff880`06bf6f80 fffff800`02b93d12 : fffffa80`051ad060 00000000`00000000 fffffa80`03c6ad01 fffff880`06bf79d0 : nt!PspAllocateThread+0x364
    fffff880`06bf71a0 fffff800`02b9408b : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`06bf79d0 : nt!PspCreateThread+0x1d2
    fffff880`06bf7420 fffff800`028c4993 : fffffa80`061cd060 00000000`0017e258 fffff880`06bf7b88 00000000`00000000 : nt!NtCreateThreadEx+0x243
    fffff880`06bf7b70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+21b46
    fffff800`0292d986 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+21b46
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46
    
    BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00eb9000 fffff880`00f10000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02cee000 fffff880`02d78000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04349000 fffff880`0435f000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`00ded000 fffff880`00df8000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00dba000 fffff880`00dc3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dc3000 fffff880`00ded000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`00f81000 fffff880`00f8d000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`0193b000 fffff880`01942000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02dec000 fffff880`02dfd000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`024c8000 fffff880`024e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`01908000 fffff880`01932000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018a2000 fffff880`018d2000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d42000 fffff880`00da0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`04315000 fffff880`04319500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01119000 fffff880`0118c000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00f78000 fffff880`00f81000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`04339000 fffff880`04349000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04412000 fffff880`04420000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02ccb000 fffff880`02ce9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02cbc000 fffff880`02ccb000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0188c000 fffff880`018a2000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`045dd000 fffff880`045ff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`0442c000 fffff880`04435000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`04420000 fffff880`0442c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`04435000 fffff880`04448000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`04406000 fffff880`04412000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04080000 fffff880`04174000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04174000 fffff880`041ba000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`010a7000 fffff880`010bb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0105b000 fffff880`010a7000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01852000 fffff880`0188c000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`0280c000 fffff800`02855000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`041c7000 fffff880`041eb000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`04544000 fffff880`045a0000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`04456000 fffff880`0446f000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`0446f000 fffff880`04477080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`04448000 fffff880`04456000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02400000 fffff880`024c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015e8000 fffff880`015f1000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`042d9000 fffff880`042f7000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03a26000 fffff880`03ff9500   igdkmd64 igdkmd64.sys Wed May 06 14:22:19 2009 (4A01D55B)
    fffff880`04323000 fffff880`04339000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`042f7000 fffff880`04306000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04480000 fffff880`044c3000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`015ab000 fffff880`015d6000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`04400000 fffff880`04405200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`04067000 fffff880`0407c000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`011d8000 fffff880`011fb000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cea000 fffff880`00d2e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`041eb000 fffff880`041f9000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04306000 fffff880`04315000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0421c000 fffff880`04229000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00da0000 fffff880`00dba000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0256b000 fffff880`02583000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02583000 fffff880`025b0000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`025b0000 fffff880`025fe000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`02888000 fffff880`028ab000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`019a0000 fffff880`019ab000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f19000 fffff880`00f23000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010bb000 fffff880`01119000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02cb1000 fffff880`02cbc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015d6000 fffff880`015e8000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01459000 fffff880`0154b000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04383000 fffff880`0438f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02540000 fffff880`02553000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`0438f000 fffff880`043be000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0452f000 fffff880`04544000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02c16000 fffff880`02c25000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02d78000 fffff880`02dbd000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0154b000 fffff880`015ab000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`019ab000 fffff880`019bc000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02ca5000 fffff880`02cb1000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02855000 fffff800`02e31000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0124b000 fffff880`013ee000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01932000 fffff880`0193b000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`024ed000 fffff880`02540000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02dc6000 fffff880`02dec000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f63000 fffff880`00f78000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f23000 fffff880`00f56000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00cc0000 fffff880`00cc7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00cc7000 fffff880`00cd7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`028ab000 fffff880`02951000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`045a0000 fffff880`045dd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d2e000 fffff880`00d42000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`0435f000 fffff880`04383000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`043be000 fffff880`043d9000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`043d9000 fffff880`043fa000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04200000 fffff880`0421a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02c54000 fffff880`02ca5000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`01985000 fffff880`0198e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0198e000 fffff880`01997000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01997000 fffff880`019a0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02553000 fffff880`0256b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`042a7000 fffff880`042d9000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
    fffff880`04229000 fffff880`0429a000   RTL8187Se RTL8187Se.sys Wed Feb 25 21:31:45 2009 (49A5FF11)
    fffff880`02951000 fffff880`0295c000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`03800000 fffff880`03871000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`038ff000 fffff880`03995000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
    fffff880`02800000 fffff880`02868000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
    fffff880`0295c000 fffff880`02989000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
    fffff880`0421a000 fffff880`0421b480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`02989000 fffff880`0299b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`019da000 fffff880`019e7000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`019bc000 fffff880`019da000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02c40000 fffff880`02c54000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`01800000 fffff880`01826000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`044c3000 fffff880`044d5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`03a00000 fffff880`03a1d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`04478000 fffff880`04479f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04056000 fffff880`04067000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`044d5000 fffff880`0452f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`01826000 fffff880`01841000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`041ba000 fffff880`041c7000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`018d2000 fffff880`018ff100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
    fffff880`00f56000 fffff880`00f63000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01942000 fffff880`01950000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01950000 fffff880`01975000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00f8d000 fffff880`00fa2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00fa2000 fffff880`00ffe000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0118c000 fffff880`011d8000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0429a000 fffff880`042a7000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02c00000 fffff880`02c16000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02c25000 fffff880`02c40000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01975000 fffff880`01985000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e06000 fffff880`00eaa000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eaa000 fffff880`00eb9000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02dbd000 fffff880`02dc6000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F)
    fffff880`0431a000 fffff880`04323000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f10000 fffff880`00f19000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    
    Unloaded modules:
    fffff880`018d2000 fffff880`018e0000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018e0000 fffff880`018ec000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018ec000 fffff880`018f5000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018f5000 fffff880`01908000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     

Share This Page

Loading...