s every day pls help

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Hello123, Mar 28, 2011.

  1. Hello123

    Hello123 New Member

    Joined:
    Mar 28, 2011
    Messages:
    2
    Likes Received:
    0
    Hi,
    I often have BSOD about 1-5 aday I looked them up with the bluescreenviewer and the main problem seems to be ntoskrnl.exe and nvlddmkm.sys. Sometimes my computer instantly shuts down and reboots without a bluescreen. This happens when I am playing games but it also happens randomly... In the last couple of days it really drives me crazy because it happens so often, so pls help me :(.

    My Computer:
    - Asus P7P55D
    - Nvidia GTX 470
    - i7 860 @2.80GHz
    - 4GB RAM cl7 (from GEIL)
    -Socket: 1156
    - Windows7 x64
    - USB devices: mouse, keyboard, headset, fritzwlan stick and a Win-TV nova-t Stick.
    - using MSE


    View attachment Minidump.rar
     
    #1 Hello123, Mar 28, 2011
    Last edited: Mar 28, 2011
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Looks like some hardware issue, could be wrong hardware settings, some incompatibility, or overclocking.


    http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html




    Update Hauppauge MOD7700 Tuner Driver
    hcw95bda.sys Mon Jul 06 15:32:35 2009
    hcw95rc.sys Mon Jul 06 15:33:51 2009
    Hauppauge Computer Works : Support


    Update Intel Matrix Storage
    iaStor.sys Thu Jun 04 21:53:40 2009
    IntelĀ® Driver Update Utility


    Jmicron RAID driver
    jraid.sys Wed Oct 07 07:26:03 2009


    Realtek LAN driver was involved in one of your recent crashes, update it to the latest
    Rt64win7.sys Wed Jun 23 05:10:45 2010
    Realtek





    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032811-20202-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e17000 PsLoadedModuleList = 0xfffff800`0305ce90
    Debug session time: Mon Mar 28 14:44:09.244 2011 (UTC - 4:00)
    System Uptime: 0 days 0:10:03.212
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8a02017f824, 0, fffff800031643de, 2}
    
    
    Could not read faulting driver name
    Probably caused by : ks.sys ( ks!ReadNodeNameValue+18f )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a02017f824, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff800031643de, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c80e8
     fffff8a02017f824 
    
    FAULTING_IP: 
    nt!CmpKcbCacheLookup+1de
    fffff800`031643de 418b45f4        mov     eax,dword ptr [r13-0Ch]
    
    MM_INTERNAL_CODE:  2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  audiodg.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff8800b2376a0 -- (.trap 0xfffff8800b2376a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a000062000 rbx=0000000000000000 rcx=0000000000000b22
    rdx=00000000053a01fb rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800031643de rsp=fffff8800b237830 rbp=fffff8a000024010
     r8=0000000000000007  r9=0000000000000000 r10=0000000000000008
    r11=fffff8800b2379e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!CmpKcbCacheLookup+0x1de:
    fffff800`031643de 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:ffff:ffffffff`fffffff4=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e41ca0 to fffff80002e97640
    
    STACK_TEXT:  
    fffff880`0b237538 fffff800`02e41ca0 : 00000000`00000050 fffff8a0`2017f824 00000000`00000000 fffff880`0b2376a0 : nt!KeBugCheckEx
    fffff880`0b237540 fffff800`02e9576e : 00000000`00000000 fffff8a0`2017f824 00000000`00dcff00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x448c6
    fffff880`0b2376a0 fffff800`031643de : fffff8a0`00010690 00000000`659a7ef2 fffff880`0b237db8 fffff800`03166aa9 : nt!KiPageFault+0x16e
    fffff880`0b237830 fffff800`031650e5 : fffff880`0b2379e0 fffff880`00000004 fffff880`0b237dc8 fffff880`0b237dc0 : nt!CmpKcbCacheLookup+0x1de
    fffff880`0b237920 fffff800`03161794 : fffff8a0`0001aca0 fffff880`0b237dc0 fffff880`0b237e10 fffff880`0b237df0 : nt!CmpBuildHashStackAndLookupCache+0x335
    fffff880`0b237d00 fffff800`03191d38 : fffffa80`07e51708 fffff800`02e17000 fffffa80`07e51550 fffff880`00000000 : nt!CmpParseKey+0x294
    fffff880`0b238000 fffff800`03192f56 : 00000000`00000000 fffffa80`07e51550 fffff8a0`000017e0 fffffa80`036c8420 : nt!ObpLookupObjectName+0x588
    fffff880`0b2380f0 fffff800`0316682c : fffff880`0b238100 00000000`00000000 fffff8a0`00001700 fffff8a0`07d5ef00 : nt!ObOpenObjectByName+0x306
    fffff880`0b2381c0 fffff800`03171922 : fffff880`0b238528 00000000`00020019 fffff880`0b238550 67727453`00000000 : nt!CmOpenKey+0x28a
    fffff880`0b238310 fffff800`02e968d3 : fffff8a0`07d7e9b8 fffff8a0`08fa3170 00000000`00000027 fffff8a0`08fa3170 : nt!NtOpenKey+0x12
    fffff880`0b238350 fffff800`02e92e70 : fffff880`078ac5eb fffffa80`03a79c60 fffffa80`0391c010 fffffa80`03a79c60 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`0b2384e8 fffff880`078ac5eb : fffffa80`03a79c60 fffffa80`0391c010 fffffa80`03a79c60 00000000`000007ff : nt!KiServiceLinkage
    fffff880`0b2384f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ks!ReadNodeNameValue+0x18f
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ks!ReadNodeNameValue+18f
    fffff880`078ac5eb 413bc4          cmp     eax,r12d
    
    SYMBOL_STACK_INDEX:  c
    
    SYMBOL_NAME:  ks!ReadNodeNameValue+18f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ks
    
    IMAGE_NAME:  ks.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7a3f3
    
    FAILURE_BUCKET_ID:  X64_0x50_ks!ReadNodeNameValue+18f
    
    BUCKET_ID:  X64_0x50_ks!ReadNodeNameValue+18f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032711-25147-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e05000 PsLoadedModuleList = 0xfffff800`0304ae90
    Debug session time: Sat Mar 26 20:12:35.667 2011 (UTC - 4:00)
    System Uptime: 0 days 0:05:11.620
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff880070ba970, 0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rt64win7.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
    Probably caused by : Rt64win7.sys ( Rt64win7+118d2 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff880070ba970, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    +3363613162636263
    fffff880`070ba970 98              cwde
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b60e8
     0000000000000000 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff880070bb898 -- (.exr 0xfffff880070bb898)
    ExceptionAddress: fffff80002e87810 (nt!RtlCopyMemoryNonTemporal+0x0000000000000110)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff880070bb940 -- (.trap 0xfffff880070bb940)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000ac0 rbx=0000000000000000 rcx=fffff880079d8ac0
    rdx=010001fffc018000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002e87810 rsp=fffff880070bbad8 rbp=0000000000000002
     r8=0000000000000001  r9=fffff880070bbb18 r10=fffffa80063db4f0
    r11=fffff880070bbac0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac pe cy
    nt!RtlCopyMemoryNonTemporal+0x110:
    fffff800`02e87810 8a0411          mov     al,byte ptr [rcx+rdx] ds:bc08:00fffa80`039f0ac0=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002f0d76b to fffff80002e85640
    
    STACK_TEXT:  
    fffff880`070ba8b8 fffff800`02f0d76b : 00000000`0000001e ffffffff`c0000005 fffff880`070ba970 00000000`00000000 : nt!KeBugCheckEx
    fffff880`070ba8c0 fffff800`02ed95bc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
    fffff880`070ba900 fffff800`02eb14ec : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x83d
    fffff880`070ba940 fffff800`02eb0f6d : fffff800`02fc4d00 fffff880`070bd210 00000000`00000000 fffff800`02e05000 : nt!_C_specific_handler+0x8c
    fffff880`070ba9b0 fffff800`02eafd45 : fffff800`02fc4d00 fffff880`070baa28 fffff880`070bb898 fffff800`02e05000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`070ba9e0 fffff800`02ec0dc1 : fffff880`070bb898 fffff880`070bb0f0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
    fffff880`070bb0c0 fffff800`02e84cc2 : fffff880`070bb898 00fffa80`039f0ac0 fffff880`070bb940 00000000`00000001 : nt!KiDispatchException+0x135
    fffff880`070bb760 fffff800`02e835ca : fffffa80`07737f30 fffff880`0175a5e2 fffff880`070b0014 fffff880`070bbf40 : nt!KiExceptionDispatch+0xc2
    fffff880`070bb940 fffff800`02e87810 : fffff800`033f1e08 00fffa80`039f0ac0 00000000`00000002 fffffa80`06ab2680 : nt!KiGeneralProtectionFault+0x10a
    fffff880`070bbad8 fffff800`033f1e08 : 00fffa80`039f0ac0 00000000`00000002 fffffa80`06ab2680 fffff880`070bbbc0 : nt!RtlCopyMemoryNonTemporal+0x110
    fffff880`070bbae0 fffff800`033f1593 : fffffa80`063db4f0 fffffa80`063db400 00000000`00000ac0 00000000`00000000 : hal!HalpDmaSyncMapBuffers+0x1b0
    fffff880`070bbb90 fffff800`033f44fb : fffffa80`063f6868 fffffa80`063db4f0 fffffa80`06ab2680 fffffa80`06ba1d90 : hal!HalpDmaMapScatterTransfer+0xa3
    fffff880`070bbbe0 fffff800`033f4472 : fffffa80`063f6868 fffffa80`063f6860 00000000`00000001 00000000`00000000 : hal!HalpMapTransfer+0x7b
    fffff880`070bbc70 fffff800`033f394f : 00000000`00000000 fffff800`033f0fb9 00000000`00000000 00000000`0000000b : hal!IoMapTransfer+0x8e
    fffff880`070bbcb0 fffff800`033f413d : fffffa80`06195050 fffffa80`063db4f0 00000000`00000001 fffff880`00000000 : hal!HalpAllocateAdapterCallback+0xc7
    fffff880`070bbd50 fffff800`033f371f : fffffa80`063f6730 00000000`00000082 fffffa80`063db4f0 fffffa80`04319e30 : hal!HalAllocateAdapterChannel+0x101
    fffff880`070bbd90 fffff880`016637c1 : fffffa80`04319d60 00000000`00000001 00000006`00000148 00000000`00000050 : hal!HalBuildScatterGatherList+0x2f3
    fffff880`070bbe00 fffff880`0771d8d2 : fffffa80`061951a0 00000000`00000100 fffffa80`063b8570 00000000`00000001 : ndis!NdisMAllocateNetBufferSGList+0x181
    fffff880`070bbea0 fffffa80`061951a0 : 00000000`00000100 fffffa80`063b8570 00000000`00000001 fffffa80`063f6730 : Rt64win7+0x118d2
    fffff880`070bbea8 00000000`00000100 : fffffa80`063b8570 00000000`00000001 fffffa80`063f6730 00000000`00000358 : 0xfffffa80`061951a0
    fffff880`070bbeb0 fffffa80`063b8570 : 00000000`00000001 fffffa80`063f6730 00000000`00000358 00000103`00000014 : 0x100
    fffff880`070bbeb8 00000000`00000001 : fffffa80`063f6730 00000000`00000358 00000103`00000014 fffffa80`60000000 : 0xfffffa80`063b8570
    fffff880`070bbec0 fffffa80`063f6730 : 00000000`00000358 00000103`00000014 fffffa80`60000000 fffffa80`04319d60 : 0x1
    fffff880`070bbec8 00000000`00000358 : 00000103`00000014 fffffa80`60000000 fffffa80`04319d60 00000000`00000000 : 0xfffffa80`063f6730
    fffff880`070bbed0 00000103`00000014 : fffffa80`60000000 fffffa80`04319d60 00000000`00000000 00000001`00000014 : 0x358
    fffff880`070bbed8 fffffa80`60000000 : fffffa80`04319d60 00000000`00000000 00000001`00000014 fffffa80`00000002 : 0x103`00000014
    fffff880`070bbee0 fffffa80`04319d60 : 00000000`00000000 00000001`00000014 fffffa80`00000002 00000000`00000004 : 0xfffffa80`60000000
    fffff880`070bbee8 00000000`00000000 : 00000001`00000014 fffffa80`00000002 00000000`00000004 00000000`00000002 : 0xfffffa80`04319d60
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Rt64win7+118d2
    fffff880`0771d8d2 ??              ???
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  Rt64win7+118d2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Rt64win7
    
    IMAGE_NAME:  Rt64win7.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c21cf95
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+118d2
    
    BUCKET_ID:  X64_0x1E_c0000005_Rt64win7+118d2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032811-19422-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e12000 PsLoadedModuleList = 0xfffff800`03057e90
    Debug session time: Mon Mar 28 15:19:23.506 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:21.474
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ...
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80002e886e8, fffff880085fe110, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueue+a8 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002e886e8, Address of the instruction which caused the bugcheck
    Arg3: fffff880085fe110, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!KiInsertQueue+a8
    fffff800`02e886e8 49890f          mov     qword ptr [r15],rcx
    
    CONTEXT:  fffff880085fe110 -- (.cxr 0xfffff880085fe110)
    rax=27fffa8006aad458 rbx=fffffa80079fa3b0 rcx=fffffa80079fa3b8
    rdx=fffffa80079fac10 rsi=0000000000000000 rdi=fffffa8006b28880
    rip=fffff80002e886e8 rsp=fffff880085feaf0 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=fffffa8003779900
    r11=00000000000f00ff r12=fffff80003004e80 r13=fffffa80079fa3b8
    r14=fffffa80079fc678 r15=27fffa8006aad458
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!KiInsertQueue+0xa8:
    fffff800`02e886e8 49890f          mov     qword ptr [r15],rcx ds:002b:27fffa80`06aad458=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000317ae64 to fffff80002e886e8
    
    STACK_TEXT:  
    fffff880`085feaf0 fffff800`0317ae64 : 00000000`00000000 fffffa80`079fac10 00000000`002a2c00 fffff880`00000000 : nt!KiInsertQueue+0xa8
    fffff880`085feb70 fffff800`02e7ec42 : 00000000`00000000 00000000`00000001 fffffa80`06b28060 fffffa80`06b28060 : nt!IoSetIoCompletionEx+0x58
    fffff880`085feba0 fffff800`02e918d3 : fffffa80`06b28880 fffffa80`06b28060 fffff880`085feca0 00000000`002a2c90 : nt!NtReleaseWorkerFactoryWorker+0x196
    fffff880`085fec20 00000000`777426ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00d5f3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777426ca
    
    
    FOLLOWUP_IP: 
    nt!KiInsertQueue+a8
    fffff800`02e886e8 49890f          mov     qword ptr [r15],rcx
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiInsertQueue+a8
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a
    
    STACK_COMMAND:  .cxr 0xfffff880085fe110 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!KiInsertQueue+a8
    
    BUCKET_ID:  X64_0x3B_nt!KiInsertQueue+a8
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Loading Dump File [F:\DMP\032811-18673-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e0e000 PsLoadedModuleList = 0xfffff800`03053e90
    Debug session time: Mon Mar 28 05:05:52.219 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:56.172
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............................
    Loading User Symbols
    Loading unloaded module list
    ...
    Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff8800f4a2939, fffff8800355ba38, fffff8800355b290}
    
    Probably caused by : hardware ( nvlddmkm+1c7939 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8800f4a2939, The address that the exception occurred at
    Arg3: fffff8800355ba38, Exception Record Address
    Arg4: fffff8800355b290, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nvlddmkm+1c7939
    fffff880`0f4a2939 a0000000488bdaf083 mov   al,byte ptr [83F0DA8B48000000h]
    
    EXCEPTION_RECORD:  fffff8800355ba38 -- (.exr 0xfffff8800355ba38)
    ExceptionAddress: fffff8800f4a2939 (nvlddmkm+0x00000000001c7939)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff8800355b290 -- (.cxr 0xfffff8800355b290)
    rax=fffffa8007bd8aff rbx=fffffa8006199480 rcx=fffffa8006199480
    rdx=fffffa80069fd510 rsi=fffffa8003707b60 rdi=fffffa8007bd8a50
    rip=fffff8800f4a2939 rsp=fffff8800355bc70 rbp=fffff8000302b658
     r8=fffffa8007bd8a50  r9=0000000000000000 r10=0000000000000001
    r11=fffffa800369b108 r12=fffffa8007bd8a50 r13=0000000000000001
    r14=0000000000000000 r15=0000000000000001
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nvlddmkm+0x1c7939:
    fffff880`0f4a2939 a0000000488bdaf083 mov   al,byte ptr [83F0DA8B48000000h] ds:002b:83f0da8b`48000000=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bf0e8
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    nvlddmkm+1c7939
    fffff880`0f4a2939 a0000000488bdaf083 mov   al,byte ptr [83F0DA8B48000000h]
    
    BUGCHECK_STR:  0x7E
    
    MISALIGNED_IP: 
    nvlddmkm+1c7939
    fffff880`0f4a2939 a0000000488bdaf083 mov   al,byte ptr [83F0DA8B48000000h]
    
    LAST_CONTROL_TRANSFER:  from fffffa8007bd8a50 to fffff8800f4a2939
    
    STACK_TEXT:  
    fffff880`0355bc70 fffffa80`07bd8a50 : fffff800`03184f4d fffffa80`06199480 00000000`00000001 fffffa80`07aa4e90 : nvlddmkm+0x1c7939
    fffff880`0355bc78 fffff800`03184f4d : fffffa80`06199480 00000000`00000001 fffffa80`07aa4e90 fffffa80`03707b60 : 0xfffffa80`07bd8a50
    fffff880`0355bc80 fffff800`02e98a21 : fffff800`0302b600 fffff800`03184f01 fffffa80`03707b00 fffffa80`03707b60 : nt!IopProcessWorkItem+0x3d
    fffff880`0355bcb0 fffff800`0312bcce : 4f90cf14`1cd30cc6 fffffa80`03707b60 00000000`00000080 fffffa80`036cfb30 : nt!ExpWorkerThread+0x111
    fffff880`0355bd40 fffff800`02e7ffe6 : fffff880`03367180 fffffa80`03707b60 fffff880`033720c0 7702ba85`e555c0b3 : nt!PspSystemThreadStartup+0x5a
    fffff880`0355bd80 00000000`00000000 : fffff880`0355c000 fffff880`03556000 fffff880`0355b9e0 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nvlddmkm+1c7939
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: hardware
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    STACK_COMMAND:  .cxr 0xfffff8800355b290 ; kb
    
    FAILURE_BUCKET_ID:  X64_IP_MISALIGNED_nvlddmkm.sys
    
    BUCKET_ID:  X64_IP_MISALIGNED_nvlddmkm.sys
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`0ffb3000 fffff880`0fff1000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
    fffff880`00f4e000 fffff880`00fa5000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`044b7000 fffff880`04540000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`075e3000 fffff880`075f9000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0138c000 fffff880`01397000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`0fff1000 fffff880`0fff9000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
    fffff880`0134e000 fffff880`01357000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01357000 fffff880`01381000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
    fffff880`08a7e000 fffff880`08acd000   atksgt   atksgt.sys   Sun May 17 09:36:34 2009 (4A1012E2)
    fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`089f8000 fffff880`089fbe80   BdaSup   BdaSup.SYS   Mon Jul 13 20:06:40 2009 (4A5BCC10)
    fffff880`02e00000 fffff880`02e07000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`07596000 fffff880`075a7000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`0416c000 fffff880`0418a000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`02f97000 fffff880`02fc1000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00cd1000 fffff880`00d91000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01b9e000 fffff880`01bce000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00c73000 fffff880`00cd1000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`0f2c5000 fffff880`0f2d5000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`08b4f000 fffff880`08b5d000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`074f5000 fffff880`07578000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`07578000 fffff880`07596000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`04489000 fffff880`04498000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01b88000 fffff880`01b9e000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`07b95000 fffff880`07bb7000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`04400000 fffff880`04443000   dtsoftbus01 dtsoftbus01.sys Wed Dec 22 05:19:28 2010 (4D11D0B0)
    fffff880`08b5d000 fffff880`08b70000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`02e65000 fffff880`02f81000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:53:40 2009 (4A287AA4)
    fffff880`08b43000 fffff880`08b4f000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`07400000 fffff880`074f4000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`0ff38000 fffff880`0ff7e000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`013e3000 fffff880`013f7000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01397000 fffff880`013e3000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`015d1000 fffff880`015db000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01b4e000 fffff880`01b88000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`08ace000 fffff880`08b43000   fwlanusb fwlanusb.sys Thu Dec 14 12:04:55 2006 (45818437)
    fffff880`01a4b000 fffff880`01a95000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff880`0f2b8000 fffff880`0f2c5000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`033f8000 fffff800`03441000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`07a00000 fffff880`07aa5000   hcw95bda hcw95bda.sys Mon Jul 06 15:32:35 2009 (4A525153)
    fffff880`08800000 fffff880`08804c00   hcw95rc  hcw95rc.sys  Mon Jul 06 15:33:51 2009 (4A52519F)
    fffff880`0ff7e000 fffff880`0ffa2000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`08805000 fffff880`0881e000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`0881e000 fffff880`08826080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`07bda000 fffff880`07be8000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`040a3000 fffff880`0416c000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`01b45000 fffff880`01b4e000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`01232000 fffff880`0134e000   iaStor   iaStor.sys   Thu Jun 04 21:53:40 2009 (4A287AA4)
    fffff880`075cd000 fffff880`075e3000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00da1000 fffff880`00dc1000   jraid    jraid.sys    Wed Oct 07 07:26:03 2009 (4ACC7ACB)
    fffff880`0182f000 fffff880`0183e000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08827000 fffff880`08835000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
    fffff800`00baf000 fffff800`00bb9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`011af000 fffff880`011f2000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`015a5000 fffff880`015c0000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`01600000 fffff880`0162b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`07bb7000 fffff880`07bbc200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`04071000 fffff880`0407e000   lirsgt   lirsgt.sys   Sun May 17 09:06:57 2009 (4A100BF1)
    fffff880`08bc2000 fffff880`08bd7000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`08b7e000 fffff880`08ba1000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c10000 fffff880`00c5f000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
    fffff880`08b70000 fffff880`08b7e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0167c000 fffff880`0168b000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`07be8000 fffff880`07bf5000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`010e7000 fffff880`01101000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`02fc1000 fffff880`02ff2000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`08d7e000 fffff880`08d8e000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`0418a000 fffff880`041a2000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`041a2000 fffff880`041cf000   mrxsmb   mrxsmb.sys   Sat Nov 20 04:27:41 2010 (4CE7948D)
    fffff880`04000000 fffff880`0404d000   mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
    fffff880`0404d000 fffff880`04071000   mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
    fffff880`01381000 fffff880`0138c000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
    fffff880`01bdc000 fffff880`01be7000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fae000 fffff880`00fb8000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`08d7c000 fffff880`08d7da80   MSPQM    MSPQM.sys    Mon Jul 13 20:00:17 2009 (4A5BCA91)
    fffff880`01151000 fffff880`011af000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`0447e000 fffff880`04489000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01b33000 fffff880`01b45000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01695000 fffff880`01788000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`04498000 fffff880`044a4000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`08a53000 fffff880`08a66000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`01200000 fffff880`0122f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`07b1a000 fffff880`07b2f000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`045b4000 fffff880`045c3000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04540000 fffff880`04585000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`01788000 fffff880`017e8000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`08d8e000 fffff880`08da3000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`01be7000 fffff880`01bf8000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04472000 fffff880`0447e000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02e0e000 fffff800`033f8000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01402000 fffff880`015a5000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`02ff2000 fffff880`02ffb000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0ff36000 fffff880`0ff37180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
    fffff880`07b2f000 fffff880`07b58000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
    fffff880`0f2db000 fffff880`0ff35d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
    fffff880`08a00000 fffff880`08a53000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`0458e000 fffff880`045b4000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00fb8000 fffff880`00feb000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`00e86000 fffff880`00e8d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d91000 fffff880`00da1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`015c0000 fffff880`015d1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06452000 fffff880`064f8000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`07b58000 fffff880`07b95000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c5f000 fffff880`00c73000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`015db000 fffff880`015ff000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`045e0000 fffff880`045fb000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`01072000 fffff880`01093000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`01093000 fffff880`010ad000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`0162b000 fffff880`0167c000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`044a4000 fffff880`044af000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`02e4a000 fffff880`02e53000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02e53000 fffff880`02e5c000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02e5c000 fffff880`02e65000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01af9000 fffff880`01b33000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`08a66000 fffff880`08a7e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0f256000 fffff880`0f2ac000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`00dc1000 fffff880`00df0000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
    fffff880`064f8000 fffff880`06503000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0f2ac000 fffff880`0f2b8000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`045c3000 fffff880`045e0000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`01af1000 fffff880`01af9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`08ce3000 fffff880`08d7c000   srv      srv.sys      Sat Nov 20 04:28:05 2010 (4CE794A5)
    fffff880`06546000 fffff880`065b1000   srv2     srv2.sys     Sat Nov 20 04:27:43 2010 (4CE7948F)
    fffff880`06503000 fffff880`06534000   srvnet   srvnet.sys   Sat Nov 20 04:27:20 2010 (4CE79478)
    fffff880`0f2d5000 fffff880`0f2d6480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01847000 fffff880`01a4b000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`06534000 fffff880`06546000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`01822000 fffff880`0182f000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`01800000 fffff880`01822000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`0445e000 fffff880`04472000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00410000 fffff960`0041a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`075a7000 fffff880`075cd000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`017e8000 fffff880`017fa000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`07bbd000 fffff880`07bda000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`089fc000 fffff880`089fdf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`0ffa2000 fffff880`0ffb3000   usbehci  usbehci.sys  Sat Nov 20 05:43:54 2010 (4CE7A66A)
    fffff880`07ac0000 fffff880`07b1a000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`0f200000 fffff880`0f256000   USBPORT  USBPORT.SYS  Sat Nov 20 05:44:00 2010 (4CE7A670)
    fffff880`00feb000 fffff880`00ff8000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`02e07000 fffff880`02e15000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`08837000 fffff880`089f8000   viahduaa viahduaa.sys Wed Aug 04 03:51:53 2010 (4C591C19)
    fffff880`02e15000 fffff880`02e3a000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01101000 fffff880`0113d000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`01a95000 fffff880`01aa5000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01aa5000 fffff880`01af1000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04443000 fffff880`0445e000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`02e3a000 fffff880`02e4a000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e9b000 fffff880`00f3f000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f3f000 fffff880`00f4e000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04585000 fffff880`0458e000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00010000 fffff960`00321000   win32k   win32k.sys   unavailable (00000000)
    fffff880`0113d000 fffff880`01151000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`00fa5000 fffff880`00fae000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`08ba1000 fffff880`08bc2000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`01bce000 fffff880`01bdc000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`02e68000 fffff880`02f84000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0011C000
    fffff880`02f84000 fffff880`02f97000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     

Share This Page

Loading...