050111-29156-01.dmp
BugCheck A, {fffff68000379d98, 0, 0, fffff80002b059fa}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )
050111-26239-01.dmp
MEMORY_MANAGEMENT (1a)
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+6051 )
051011-29718-01.dmp
BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )
051111-34491-01.dmp
BugCheck A, {fffff80002850310, 2, 1, fffff80002ae35a0}
Probably caused by : ntkrnlmp.exe ( nt!KiSignalThread+54 )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050111-29156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Sun May 1 18:02:58.559 2011 (UTC - 4:00)
System Uptime: 0 days 1:57:26.260
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff68000379d98, 0, 0, fffff80002b059fa}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff68000379d98, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002b059fa, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
fffff68000379d98
CURRENT_IRQL: 0
FAULTING_IP:
nt!MiSwapWslEntries+6a
fffff800`02b059fa 498b00 mov rax,qword ptr [r8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: WowError.exe
TRAP_FRAME: fffff880096e4a60 -- (.trap 0xfffff880096e4a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000072f14139 rbx=0000000000000000 rcx=0000000072f137c0
rdx=0000000000740180 rsi=0000000000000000 rdi=0000000000000000
rip=0000000072f14139 rsp=000000000037ef54 rbp=000000000037ef5c
r8=000000000000002b r9=000000007728fcd5 r10=0000000000000000
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
0023:72f14139 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad4ca9 to fffff80002ad5740
STACK_TEXT:
fffff880`096e4328 fffff800`02ad4ca9 : 00000000`0000000a fffff680`00379d98 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`096e4330 fffff800`02ad3920 : 00000000`00000000 fffffa80`00000028 00000000`00000000 0c3d0000`00001000 : nt!KiBugCheckDispatch+0x69
fffff880`096e4470 fffff800`02b059fa : fffffa80`00000028 fffffa80`07639ec8 fffff700`01080488 00000000`00037a00 : nt!KiPageFault+0x260
fffff880`096e4600 fffff800`02af11d2 : fffff700`01080000 00000000`72f14001 fffff700`01080000 fffffa80`06300270 : nt!MiSwapWslEntries+0x6a
fffff880`096e4660 fffff800`02afc1fd : 00000000`000003fe 00000000`00000000 00000000`00000000 fffffa80`07d48678 : nt!MiUpdateWsle+0xd2
fffff880`096e46c0 fffff800`02afbb83 : 3fe00000`99810025 00000000`99810121 fffff800`02c8a720 00000000`00000000 : nt!MiCompleteProtoPteFault+0x2cd
fffff880`096e4750 fffff800`02af15be : 00000000`00000000 00000000`72f14139 fffff680`003978a0 fffffa80`07639ec8 : nt!MiResolveProtoPteFault+0x1d3
fffff880`096e47f0 fffff800`02aef743 : 00000000`00000000 00000000`72f14139 00000000`00000000 00000000`00000000 : nt!MiDispatchFault+0x1de
fffff880`096e4900 fffff800`02ad382e : 00000000`00000008 00000000`00380000 00000000`0032ab01 fffffa80`00000000 : nt!MmAccessFault+0x343
fffff880`096e4a60 00000000`72f14139 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0037ef54 fffff800`02acd080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72f14139
fffff880`096e4e70 00000000`00000002 : 00000000`00000000 fffffa80`00680727 fffff880`096e4dd8 00000000`00000259 : nt!KiCallUserMode
fffff880`096e4e78 00000000`00000000 : fffffa80`00680727 fffff880`096e4dd8 00000000`00000259 fffff880`096e5db0 : 0x2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSwapWslEntries+6a
fffff800`02b059fa 498b00 mov rax,qword ptr [r8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiSwapWslEntries+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiSwapWslEntries+6a
BUCKET_ID: X64_0xA_nt!MiSwapWslEntries+6a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050111-26239-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Sun May 1 16:03:37.662 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:22.973
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {411, fffff683ff7a0cd8, 33800000bc03e884, fffff680000049f9}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+6051 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000411, The subtype of the bugcheck.
Arg2: fffff683ff7a0cd8
Arg3: 33800000bc03e884
Arg4: fffff680000049f9
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_411
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: CurseClient.ex
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002a5470e to fffff80002a8d740
STACK_TEXT:
fffff880`097af8c8 fffff800`02a5470e : 00000000`0000001a 00000000`00000411 fffff683`ff7a0cd8 33800000`bc03e884 : nt!KeBugCheckEx
fffff880`097af8d0 fffff800`02abf7ad : 000007fe`f419b7e0 fffff683`ff7a0cd8 0000007f`fffffff8 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x6051
fffff880`097af920 fffff800`02aa9d26 : 00000000`00000000 00000000`1bacdac0 fffff683`ff7a1488 fffffa80`068a06c8 : nt!MiResolveTransitionFault+0x38d
fffff880`097af9b0 fffff800`02aa7743 : ffffffff`ffffffff 000007fe`f42918e0 fffff880`097afc20 fffff680`00000000 : nt!MiDispatchFault+0x946
fffff880`097afac0 fffff800`02a8b82e : 00000000`00000000 00000000`1e73ed60 fffff880`097afb01 fffffa80`05cca3e0 : nt!MmAccessFault+0x343
fffff880`097afc20 000007fe`f428abb2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`1e73ed10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f428abb2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+6051
fffff800`02a5470e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+6051
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_411_nt!_??_::FNODOBFM::_string_+6051
BUCKET_ID: X64_0x1a_411_nt!_??_::FNODOBFM::_string_+6051
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051011-29718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue May 10 15:55:10.154 2011 (UTC - 4:00)
System Uptime: 0 days 2:31:49.855
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8000280c310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a91e09, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
fffff8000280c310
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: audiodg.exe
TRAP_FRAME: fffff88003cb9960 -- (.trap 0xfffff88003cb9960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8003b36168 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a91e09 rsp=fffff88003cb9af0 rbp=fffff880009e8180
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003a00200
r11=0000000000100002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiTryUnwaitThread+0x159:
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:00000000`00004490=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8cca9 to fffff80002a8d740
STACK_TEXT:
fffff880`03cb9818 fffff800`02a8cca9 : 00000000`0000000a fffff800`0280c310 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`03cb9820 fffff800`02a8b920 : fffff8a0`018e0a01 fffffa80`03b36060 fffffa80`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03cb9960 fffff800`02a91e09 : 00000002`00000000 fffffa80`03cbdc50 00000000`00000001 fffffa80`03cbdc50 : nt!KiPageFault+0x260
fffff880`03cb9af0 fffff800`02a917d2 : fffffa80`0683ed30 00000000`00000000 00000000`00000000 fffff880`009e8180 : nt!KiTryUnwaitThread+0x159
fffff880`03cb9b50 fffff800`02da7f94 : fffff880`00000000 00000000`00000001 fffffa80`03a00200 fffffa80`0683ed38 : nt!KeSetEvent+0x142
fffff880`03cb9bc0 fffff800`02a8c993 : fffffa80`053f9060 fffffa80`06f0f9e0 00000000`00000000 fffffa80`0683ed30 : nt!NtSetEvent+0x90
fffff880`03cb9c20 00000000`771cf79a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0232fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771cf79a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+159
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+159
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+159
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051111-34491-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
Debug session time: Wed May 11 14:26:53.169 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:34.854
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff80002850310, 2, 1, fffff80002ae35a0}
Probably caused by : ntkrnlmp.exe ( nt!KiSignalThread+54 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002850310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ae35a0, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
fffff80002850310
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSignalThread+54
fffff800`02ae35a0 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: CCC.exe
TRAP_FRAME: fffff88009fd8940 -- (.trap 0xfffff88009fd8940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003b551b0 rbx=0000000000000000 rcx=fffff88002d63180
rdx=fffffa8003ab3770 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae35a0 rsp=fffff88009fd8ad0 rbp=fffff88002d63180
r8=fffffa8003cd4460 r9=fffffa8003ab3878 r10=0000000000000001
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSignalThread+0x54:
fffff800`02ae35a0 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:0202:00000000`00004490=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad0c69 to fffff80002ad1700
STACK_TEXT:
fffff880`09fd87f8 fffff800`02ad0c69 : 00000000`0000000a fffff800`02850310 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09fd8800 fffff800`02acf8e0 : 00000000`00000005 fffffa80`03ab3770 00000000`00000000 fffff800`02dcc7f2 : nt!KiBugCheckDispatch+0x69
fffff880`09fd8940 fffff800`02ae35a0 : 00000000`00000000 fffffa80`03ab3878 fffffa80`03ab3770 fffffa80`04015060 : nt!KiPageFault+0x260
fffff880`09fd8ad0 fffff800`02ae27e1 : fffff880`02d63180 fffffa80`03ab3770 fffffa80`03cd4460 fffffa80`03b551b0 : nt!KiSignalThread+0x54
fffff880`09fd8b00 fffff800`02dccbf4 : 00000000`00000000 00000000`00000000 00000000`1e157400 fffff880`00000000 : nt!KiInsertQueue+0xd1
fffff880`09fd8b70 fffff800`02ae17ae : 00000000`00000000 00000000`00000001 fffffa80`03fe36a0 fffffa80`03fe36a0 : nt!IoSetIoCompletionEx+0x58
fffff880`09fd8ba0 fffff800`02ad0953 : fffffa80`04015060 fffffa80`03fe36a0 fffff880`09fd8ca0 00000000`1e157480 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`09fd8c20 00000000`77200a6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1b35f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77200a6a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSignalThread+54
fffff800`02ae35a0 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSignalThread+54
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
FAILURE_BUCKET_ID: X64_0xA_nt!KiSignalThread+54
BUCKET_ID: X64_0xA_nt!KiSignalThread+54
Followup: MachineOwner
---------
start end module name
fffff880`00e28000 fffff880`00e7f000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03ca0000 fffff880`03d2a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04fd2000 fffff880`04fe8000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03e52000 fffff880`03e66000 amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03efd000 fffff880`03f12000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00fbc000 fffff880`00fc7000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`04083000 fffff880`0408b000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0ad0a000 fffff880`0ad15000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00f89000 fffff880`00f92000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f92000 fffff880`00fbc000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`054bc000 fffff880`054dc000 AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`0461f000 fffff880`04f46000 atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03f12000 fffff880`03f61000 atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff960`00800000 fffff960`00861000 ATMFD ATMFD.DLL Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`05c00000 fffff880`05c2b000 AVGIDSDriver AVGIDSDriver.Sys Thu Apr 14 13:11:05 2011 (4DA72AA9)
fffff880`01220000 fffff880`0122a000 AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`045e7000 fffff880`045f2000 AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`03e88000 fffff880`03ed7000 avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`02aa9000 fffff880`02ab8000 avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`0147d000 fffff880`01489000 avgrkx64 avgrkx64.sys Wed Mar 16 10:06:34 2011 (4D80C3EA)
fffff880`02b6d000 fffff880`02bcd000 avgtdia avgtdia.sys Mon Apr 04 17:54:35 2011 (4D9A3E1B)
fffff880`02ac1000 fffff880`02ac8000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03db4000 fffff880`03dc5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04513000 fffff880`04531000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00780000 fffff960`007a7000 cdd cdd.dll Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`02a7f000 fffff880`02aa9000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00fc7000 fffff880`00ff7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cea000 fffff880`00d48000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01102000 fffff880`01175000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04fc2000 fffff880`04fd2000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05c92000 fffff880`05ca0000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c77000 fffff880`03c95000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0120a000 fffff880`01220000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05519000 fffff880`0553b000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05cac000 fffff880`05cb5000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05ca0000 fffff880`05cac000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05cb5000 fffff880`05cc8000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05cc8000 fffff880`05cd4000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04092000 fffff880`04186000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04186000 fffff880`041cc000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`01090000 fffff880`010a4000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01044000 fffff880`01090000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01000000 fffff880`0103a000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a18000 fffff800`02a61000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`041cc000 fffff880`041f0000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05541000 fffff880`0559d000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`06bcf000 fffff880`06be8000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`055e3000 fffff880`055eb080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06bc1000 fffff880`06bcf000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0444b000 fffff880`04513000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f0000 fffff880`015f9000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03fef000 fffff880`03ffe000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06be8000 fffff880`06bf6000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9f000 fffff800`00ba9000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`03e0f000 fffff880`03e52000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d5000 fffff880`013ef000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0553b000 fffff880`05540200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05d26000 fffff880`05d3b000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05ce2000 fffff880`05d05000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cc9000 fffff880`00cd6000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05cd4000 fffff880`05ce2000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e00000 fffff880`03e0f000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06b7f000 fffff880`06b8c000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00f6f000 fffff880`00f89000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04531000 fffff880`04549000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`04549000 fffff880`04576000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`04576000 fffff880`045c4000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`045c4000 fffff880`045e7000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`02b26000 fffff880`02b31000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e88000 fffff880`00e92000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010a4000 fffff880`01102000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c5d000 fffff880`03c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015de000 fffff880`015f0000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0148c000 fffff880`0157e000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04fe8000 fffff880`04ff4000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f85000 fffff880`03fb4000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`054a7000 fffff880`054bc000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d59000 fffff880`03d68000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a00000 fffff880`02a45000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0157e000 fffff880`015de000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02b31000 fffff880`02b42000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a61000 fffff800`0303d000 nt ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01233000 fffff880`013d5000 Ntfs Ntfs.sys Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`02ab8000 fffff880`02ac1000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03d33000 fffff880`03d59000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04f9c000 fffff880`04fb9000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00ed2000 fffff880`00ee7000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e92000 fffff880`00ec5000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f58000 fffff880`00f5f000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f5f000 fffff880`00f6f000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ef000 fffff880`01400000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05d53000 fffff880`05df9000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`054dc000 fffff880`05519000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cd6000 fffff880`00cea000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f61000 fffff880`03f85000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04600000 fffff880`0461b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fb4000 fffff880`03fd5000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fd5000 fffff880`03fef000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c00000 fffff880`03c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02b0b000 fffff880`02b14000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b14000 fffff880`02b1d000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b1d000 fffff880`02b26000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011c1000 fffff880`011fb000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05d3b000 fffff880`05d53000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04000000 fffff880`04067000 Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`045f2000 fffff880`045fd000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041f0000 fffff880`041fc000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03d68000 fffff880`03d85000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01475000 fffff880`0147d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06a82000 fffff880`06b17000 srv srv.sys Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06a1b000 fffff880`06a82000 srv2 srv2.sys Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`04400000 fffff880`0442d000 srvnet srvnet.sys Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`041fc000 fffff880`041fd480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0442d000 fffff880`0443f000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b60000 fffff880`02b6d000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b42000 fffff880`02b60000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03da0000 fffff880`03db4000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005a0000 fffff960`005aa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03ed7000 fffff880`03efd000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05c3e000 fffff880`05c92000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`03e66000 fffff880`03e78000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06b64000 fffff880`06b7ec00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06b17000 fffff880`06b34000 usbccgp usbccgp.sys Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`06b34000 fffff880`06b35f00 USBD USBD.SYS Thu Mar 24 23:22:51 2011 (4D8C0A8B)
fffff880`04072000 fffff880`04083000 usbehci usbehci.sys Thu Mar 24 23:22:57 2011 (4D8C0A91)
fffff880`0544d000 fffff880`054a7000 usbhub usbhub.sys Thu Mar 24 23:23:22 2011 (4D8C0AAA)
fffff880`04067000 fffff880`04072000 usbohci usbohci.sys Thu Mar 24 23:22:56 2011 (4D8C0A90)
fffff880`04f46000 fffff880`04f9c000 USBPORT USBPORT.SYS Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`06b36000 fffff880`06b63200 usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00ec5000 fffff880`00ed2000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02ac8000 fffff880`02ad6000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02ad6000 fffff880`02afb000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00ee7000 fffff880`00efc000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00efc000 fffff880`00f58000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01175000 fffff880`011c1000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d85000 fffff880`03da0000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02afb000 fffff880`02b0b000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d48000 fffff880`00dec000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00dec000 fffff880`00dfb000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d2a000 fffff880`03d33000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00322000 win32k win32k.sys Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`04fb9000 fffff880`04fc2000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e7f000 fffff880`00e88000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05d05000 fffff880`05d26000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`0ac99000 fffff880`0ad0a000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`06a00000 fffff880`06a0d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`06b5d000 fffff880`06b8b000 usbvideo.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
fffff880`06b8b000 fffff880`06ba6000 usbaudio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`06b44000 fffff880`06b5d000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`06b36000 fffff880`06b44000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06ba6000 fffff880`06bb4000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06bb4000 fffff880`06bc1000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`06b34000 fffff880`06b36000 USBD.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
fffff880`06bcf000 fffff880`06be8000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`06bc1000 fffff880`06bcf000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06b17000 fffff880`06b34000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001D000
fffff880`06be8000 fffff880`06bf6000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06a00000 fffff880`06a0d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`06b5d000 fffff880`06b8b000 usbvideo.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
fffff880`06b8b000 fffff880`06ba6000 usbaudio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`06b44000 fffff880`06b5d000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`06b36000 fffff880`06b44000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06ba6000 fffff880`06bb4000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06bb4000 fffff880`06bc1000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`055ba000 fffff880`055bc000 USBD.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
fffff880`055ca000 fffff880`055e3000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`055bc000 fffff880`055ca000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0559d000 fffff880`055ba000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001D000
fffff880`055ec000 fffff880`055fa000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`05400000 fffff880`0540d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0540d000 fffff880`0543b000 usbvideo.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
fffff880`03dc5000 fffff880`03de0000 usbaudio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`00e00000 fffff880`00e0e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`00e0e000 fffff880`00e1a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0122a000 fffff880`01233000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`02a6c000 fffff880`02a7f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051111-21918-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Wed May 11 17:08:05.556 2011 (UTC - 4:00)
System Uptime: 0 days 0:16:44.867
Loading Kernel Symbols
...............................................................
................................................................
....WARNING: Unknown_Module_fffff880_03a38000 overlaps usbhub
WARNING: Unknown_Module_fffff880_03a38000 overlaps dump_dumpfve
...Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff80002ab2077}
Probably caused by : ntkrnlmp.exe ( nt!KiDeliverApc+197 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ab2077, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'Unknown_Module_fffff880_03a38000' and 'usbhub' overlap
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiDeliverApc+197
fffff800`02ab2077 488910 mov qword ptr [rax],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: spotify.exe
TRAP_FRAME: fffff880098a5250 -- (.trap 0xfffff880098a5250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ab2077 rsp=fffff880098a53e0 rbp=0000000000000000
r8=fffffa80060b4720 r9=0000000000000000 r10=fffffa80060b4710
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiDeliverApc+0x197:
fffff800`02ab2077 488910 mov qword ptr [rax],rdx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad4ca9 to fffff80002ad5740
STACK_TEXT:
fffff880`098a5108 fffff800`02ad4ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`098a5110 fffff800`02ad3920 : 00000000`00000001 fffffa80`064b46d0 fffffa80`043e5a80 fffff880`098a5380 : nt!KiBugCheckDispatch+0x69
fffff880`098a5250 fffff800`02ab2077 : fffff880`048ac700 fffffa80`05348000 fffff880`098a5450 fffff880`04197f76 : nt!KiPageFault+0x260
fffff880`098a53e0 fffff800`02a88bc5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x197
fffff880`098a5460 fffff800`02dcefa8 : fffff880`098a5ca0 fffff880`098a5720 00000000`00000000 fffff880`00000006 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`098a5490 fffff800`02df5c7d : 00000000`00000001 fffff800`02adb9a2 fffffa80`00000001 fffffa80`00000000 : nt!ObpWaitForMultipleObjects+0x24d
fffff880`098a5960 fffff800`02ad4993 : 00000000`739e2450 00000000`0802f170 00000000`0802fd20 00000000`7ef56000 : nt!NtWaitForMultipleObjects32+0xec
fffff880`098a5bb0 00000000`739e2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0802f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739e2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDeliverApc+197
fffff800`02ab2077 488910 mov qword ptr [rax],rdx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiDeliverApc+197
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0xA_nt!KiDeliverApc+197
BUCKET_ID: X64_0xA_nt!KiDeliverApc+197
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051011-29718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue May 10 15:55:10.154 2011 (UTC - 4:00)
System Uptime: 0 days 2:31:49.855
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8000280c310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a91e09, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
fffff8000280c310
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: audiodg.exe
TRAP_FRAME: fffff88003cb9960 -- (.trap 0xfffff88003cb9960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8003b36168 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a91e09 rsp=fffff88003cb9af0 rbp=fffff880009e8180
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003a00200
r11=0000000000100002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiTryUnwaitThread+0x159:
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:00000000`00004490=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8cca9 to fffff80002a8d740
STACK_TEXT:
fffff880`03cb9818 fffff800`02a8cca9 : 00000000`0000000a fffff800`0280c310 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`03cb9820 fffff800`02a8b920 : fffff8a0`018e0a01 fffffa80`03b36060 fffffa80`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03cb9960 fffff800`02a91e09 : 00000002`00000000 fffffa80`03cbdc50 00000000`00000001 fffffa80`03cbdc50 : nt!KiPageFault+0x260
fffff880`03cb9af0 fffff800`02a917d2 : fffffa80`0683ed30 00000000`00000000 00000000`00000000 fffff880`009e8180 : nt!KiTryUnwaitThread+0x159
fffff880`03cb9b50 fffff800`02da7f94 : fffff880`00000000 00000000`00000001 fffffa80`03a00200 fffffa80`0683ed38 : nt!KeSetEvent+0x142
fffff880`03cb9bc0 fffff800`02a8c993 : fffffa80`053f9060 fffffa80`06f0f9e0 00000000`00000000 fffffa80`0683ed30 : nt!NtSetEvent+0x90
fffff880`03cb9c20 00000000`771cf79a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0232fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771cf79a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+159
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+159
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+159
Followup: MachineOwner
---------
start end module name
fffff880`00f70000 fffff880`00fc7000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cea000 fffff880`02d74000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04800000 fffff880`04816000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0429c000 fffff880`042b0000 amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03fc1000 fffff880`03fd6000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ea4000 fffff880`00eaf000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`041eb000 fffff880`041f3000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0715b000 fffff880`07166000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e9b000 fffff880`00ea4000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da9000 fffff880`00dd3000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04331000 fffff880`04351000 AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`04854000 fffff880`0517b000 atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03e00000 fffff880`03e4f000 atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff960`008c0000 fffff960`00921000 ATMFD ATMFD.DLL Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`06c00000 fffff880`06c2b000 AVGIDSDriver AVGIDSDriver.Sys Wed Mar 30 10:57:08 2011 (4D9344C4)
fffff880`0196f000 fffff880`01979000 AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`03a71000 fffff880`03a7c000 AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`03f4c000 fffff880`03f9b000 avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`019d9000 fffff880`019e8000 avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`01963000 fffff880`0196f000 avgrkx64 avgrkx64.sys Tue Jan 18 21:31:31 2011 (4D364D03)
fffff880`02c46000 fffff880`02ca5000 avgtdia avgtdia.sys Thu Feb 10 00:50:32 2011 (4D537CA8)
fffff880`019f1000 fffff880`019f8000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f3b000 fffff880`03f4c000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03b80000 fffff880`03b9e000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00790000 fffff960`007b7000 cdd cdd.dll unavailable (00000000)
fffff880`019af000 fffff880`019d9000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ce9000 fffff880`00da9000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01933000 fffff880`01963000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c8b000 fffff880`00ce9000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01128000 fffff880`0119b000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`051ee000 fffff880`051fe000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05d9e000 fffff880`05dac000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03f1d000 fffff880`03f3b000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03f0e000 fffff880`03f1d000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0191d000 fffff880`01933000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0438e000 fffff880`043b0000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05db8000 fffff880`05dc1000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05dac000 fffff880`05db8000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05dc1000 fffff880`05dd4000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05dd4000 fffff880`05de0000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`040db000 fffff880`041cf000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04000000 fffff880`04046000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`010b6000 fffff880`010ca000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0106a000 fffff880`010b6000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e3000 fffff880`0191d000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01592000 fffff880`015dc000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ffa000 fffff800`03043000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04046000 fffff880`0406a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05c3b000 fffff880`05c97000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05d18000 fffff880`05d31000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05d31000 fffff880`05d39080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05d0a000 fffff880`05d18000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03ab8000 fffff880`03b80000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f6000 fffff880`015ff000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02c1a000 fffff880`02c29000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05d3a000 fffff880`05d48000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc5000 fffff800`00bcf000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04259000 fffff880`0429c000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d2000 fffff880`013ec000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01567000 fffff880`01592000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`043b0000 fffff880`043b5200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05c23000 fffff880`05c38000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c00000 fffff880`05c23000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c6a000 fffff880`00c77000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05de0000 fffff880`05dee000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`02c29000 fffff880`02c38000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05d48000 fffff880`05d55000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e81000 fffff880`00e9b000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b9e000 fffff880`03bb6000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03bb6000 fffff880`03be3000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`03a00000 fffff880`03a4e000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`03a4e000 fffff880`03a71000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0185e000 fffff880`01869000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fd0000 fffff880`00fda000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010ca000 fffff880`01128000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03f03000 fffff880`03f0e000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e4000 fffff880`015f6000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01415000 fffff880`01507000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0483a000 fffff880`04846000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03e4f000 fffff880`03e7e000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0431c000 fffff880`04331000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02da3000 fffff880`02db2000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ca5000 fffff880`02cea000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01507000 fffff880`01567000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01869000 fffff880`0187a000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03ef7000 fffff880`03f03000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1d000 fffff800`02ffa000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01230000 fffff880`013d2000 Ntfs Ntfs.sys Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`019e8000 fffff880`019f1000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d7d000 fffff880`02da3000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`051d1000 fffff880`051ee000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e40000 fffff880`00e55000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e6a000 fffff880`00e71000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e71000 fffff880`00e81000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ec000 fffff880`013fd000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06cf3000 fffff880`06d99000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04351000 fffff880`0438e000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c77000 fffff880`00c8b000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04816000 fffff880`0483a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e7e000 fffff880`03e99000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fd6000 fffff880`03ff7000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02c00000 fffff880`02c1a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03ea6000 fffff880`03ef7000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01843000 fffff880`0184c000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0184c000 fffff880`01855000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01855000 fffff880`0185e000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`043d7000 fffff880`043ef000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0406a000 fffff880`040d1000 Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`06d99000 fffff880`06da4000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041f3000 fffff880`041ff000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02db2000 fffff880`02dcf000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015dc000 fffff880`015e4000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07055000 fffff880`070ea000 srv srv.sys Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06c2b000 fffff880`06c92000 srv2 srv2.sys Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`06da4000 fffff880`06dd1000 srvnet srvnet.sys Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`04846000 fffff880`04847480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06dd1000 fffff880`06de3000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01898000 fffff880`018a5000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0187a000 fffff880`01898000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dea000 fffff880`02dfe000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03f9b000 fffff880`03fc1000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05cb6000 fffff880`05d0a000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`042b0000 fffff880`042c2000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05d83000 fffff880`05d9dc00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05c97000 fffff880`05cb4000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05cb4000 fffff880`05cb5f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`041da000 fffff880`041eb000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042c2000 fffff880`0431c000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`041cf000 fffff880`041da000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0517b000 fffff880`051d1000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05d55000 fffff880`05d82200 usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01800000 fffff880`0180e000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0180e000 fffff880`01833000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0119b000 fffff880`011e7000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02dcf000 fffff880`02dea000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01833000 fffff880`01843000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ebd000 fffff880`00f61000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f61000 fffff880`00f70000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d74000 fffff880`02d7d000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003c2000 win32k win32k.sys Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`040d1000 fffff880`040da000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fc7000 fffff880`00fd0000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`043b6000 fffff880`043d7000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`070ea000 fffff880`0715b000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01979000 fffff880`01987000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01987000 fffff880`01993000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01993000 fffff880`0199c000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`0199c000 fffff880`019af000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
[B]
050111-29156-01.dmp
BugCheck A, {fffff68000379d98, 0, 0, fffff80002b059fa}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )
050111-26239-01.dmp
MEMORY_MANAGEMENT (1a)
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+6051 )
051011-29718-01.dmp
BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )
051111-34491-01.dmp
BugCheck A, {fffff80002850310, 2, 1, fffff80002ae35a0}
Probably caused by : ntkrnlmp.exe ( nt!KiSignalThread+54 [/B]All you get is this,
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-20779-01.dmp]
BugCheck 3B, {c0000005, fffff80002d4e2cd, fffff88008811770, 0}
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )
---------
---------
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-25334-01.dmp]
BugCheck 4E, {99, 371aa, 3, 352a9}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
---------
---------
---------
Ok I will give that a go. Briefly looking through a few other threads with similar issues, overclocking came up, could that be causing these problems?
me said:- Passmark Rammon HTML.zip
- CPUZ memory and CPU tabs
ok after removing the suspect RAM chip, disabling overclocking and enabling CnQ, I am still getting crasheshere are all the up to date files.
Would it do any good to format the hard drive and do a complete Windows reinstall?