Windows 7 Various Crashes

martinradbourne

New Member
Hi all,

A few weeks ago I started having blue screen problems, freezing mostly when I play computer games, sometimes when the computer is idle. I have had a number of different error messages, the most common being IRQL_NOT_LESS_OR_EQUAL, I have also had SYSTEM_SERVICE_EXCEPTION, PAGE_FAULT_IN_NON_PAGED_AREA and DRIVER_IRQL_NOT_LESS_OR_EQUAL. Sometimes after these crashes the computer does not start up and needs to be restarted at least once for it to boot up.


Basic System Info: Windows 7 Pro x64 OEM
Whole base unit is just over a year old, and I tried reinstalling Windows a week or so ago but it did not fix the problem.

Any help you can offer is greatly appreciated!
 

Attachments

  • BSOD Files.zip
    523.2 KB · Views: 572
050111-29156-01.dmp
BugCheck A, {fffff68000379d98, 0, 0, fffff80002b059fa}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )

050111-26239-01.dmp
MEMORY_MANAGEMENT (1a)
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+6051 )

051011-29718-01.dmp
BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )

051111-34491-01.dmp
BugCheck A, {fffff80002850310, 2, 1, fffff80002ae35a0}
Probably caused by : ntkrnlmp.exe ( nt!KiSignalThread+54 )


See if the problem persists after you uninstall AVG:

AVG Worldwide - Download tools

Link Removed due to 404 Error




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050111-29156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Sun May 1 18:02:58.559 2011 (UTC - 4:00)
System Uptime: 0 days 1:57:26.260
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff68000379d98, 0, 0, fffff80002b059fa}

Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff68000379d98, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002b059fa, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
fffff68000379d98 

CURRENT_IRQL: 0

FAULTING_IP: 
nt!MiSwapWslEntries+6a
fffff800`02b059fa 498b00 mov rax,qword ptr [r8]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: WowError.exe

TRAP_FRAME: fffff880096e4a60 -- (.trap 0xfffff880096e4a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000072f14139 rbx=0000000000000000 rcx=0000000072f137c0
rdx=0000000000740180 rsi=0000000000000000 rdi=0000000000000000
rip=0000000072f14139 rsp=000000000037ef54 rbp=000000000037ef5c
r8=000000000000002b r9=000000007728fcd5 r10=0000000000000000
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
0023:72f14139 ?? ???
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002ad4ca9 to fffff80002ad5740

STACK_TEXT: 
fffff880`096e4328 fffff800`02ad4ca9 : 00000000`0000000a fffff680`00379d98 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`096e4330 fffff800`02ad3920 : 00000000`00000000 fffffa80`00000028 00000000`00000000 0c3d0000`00001000 : nt!KiBugCheckDispatch+0x69
fffff880`096e4470 fffff800`02b059fa : fffffa80`00000028 fffffa80`07639ec8 fffff700`01080488 00000000`00037a00 : nt!KiPageFault+0x260
fffff880`096e4600 fffff800`02af11d2 : fffff700`01080000 00000000`72f14001 fffff700`01080000 fffffa80`06300270 : nt!MiSwapWslEntries+0x6a
fffff880`096e4660 fffff800`02afc1fd : 00000000`000003fe 00000000`00000000 00000000`00000000 fffffa80`07d48678 : nt!MiUpdateWsle+0xd2
fffff880`096e46c0 fffff800`02afbb83 : 3fe00000`99810025 00000000`99810121 fffff800`02c8a720 00000000`00000000 : nt!MiCompleteProtoPteFault+0x2cd
fffff880`096e4750 fffff800`02af15be : 00000000`00000000 00000000`72f14139 fffff680`003978a0 fffffa80`07639ec8 : nt!MiResolveProtoPteFault+0x1d3
fffff880`096e47f0 fffff800`02aef743 : 00000000`00000000 00000000`72f14139 00000000`00000000 00000000`00000000 : nt!MiDispatchFault+0x1de
fffff880`096e4900 fffff800`02ad382e : 00000000`00000008 00000000`00380000 00000000`0032ab01 fffffa80`00000000 : nt!MmAccessFault+0x343
fffff880`096e4a60 00000000`72f14139 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0037ef54 fffff800`02acd080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72f14139
fffff880`096e4e70 00000000`00000002 : 00000000`00000000 fffffa80`00680727 fffff880`096e4dd8 00000000`00000259 : nt!KiCallUserMode
fffff880`096e4e78 00000000`00000000 : fffffa80`00680727 fffff880`096e4dd8 00000000`00000259 fffff880`096e5db0 : 0x2


STACK_COMMAND: kb

FOLLOWUP_IP: 
nt!MiSwapWslEntries+6a
fffff800`02b059fa 498b00 mov rax,qword ptr [r8]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!MiSwapWslEntries+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: X64_0xA_nt!MiSwapWslEntries+6a

BUCKET_ID: X64_0xA_nt!MiSwapWslEntries+6a

Followup: MachineOwner
---------






Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050111-26239-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Sun May 1 16:03:37.662 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:22.973
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {411, fffff683ff7a0cd8, 33800000bc03e884, fffff680000049f9}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+6051 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000411, The subtype of the bugcheck.
Arg2: fffff683ff7a0cd8
Arg3: 33800000bc03e884
Arg4: fffff680000049f9

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_411

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: CurseClient.ex

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a5470e to fffff80002a8d740

STACK_TEXT: 
fffff880`097af8c8 fffff800`02a5470e : 00000000`0000001a 00000000`00000411 fffff683`ff7a0cd8 33800000`bc03e884 : nt!KeBugCheckEx
fffff880`097af8d0 fffff800`02abf7ad : 000007fe`f419b7e0 fffff683`ff7a0cd8 0000007f`fffffff8 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x6051
fffff880`097af920 fffff800`02aa9d26 : 00000000`00000000 00000000`1bacdac0 fffff683`ff7a1488 fffffa80`068a06c8 : nt!MiResolveTransitionFault+0x38d
fffff880`097af9b0 fffff800`02aa7743 : ffffffff`ffffffff 000007fe`f42918e0 fffff880`097afc20 fffff680`00000000 : nt!MiDispatchFault+0x946
fffff880`097afac0 fffff800`02a8b82e : 00000000`00000000 00000000`1e73ed60 fffff880`097afb01 fffffa80`05cca3e0 : nt!MmAccessFault+0x343
fffff880`097afc20 000007fe`f428abb2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`1e73ed10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f428abb2


STACK_COMMAND: kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+6051
fffff800`02a5470e cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+6051

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd

FAILURE_BUCKET_ID: X64_0x1a_411_nt!_??_::FNODOBFM::_string_+6051

BUCKET_ID: X64_0x1a_411_nt!_??_::FNODOBFM::_string_+6051

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051011-29718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue May 10 15:55:10.154 2011 (UTC - 4:00)
System Uptime: 0 days 2:31:49.855
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}

Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8000280c310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a91e09, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
fffff8000280c310 

CURRENT_IRQL: 2

FAULTING_IP: 
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: audiodg.exe

TRAP_FRAME: fffff88003cb9960 -- (.trap 0xfffff88003cb9960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8003b36168 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a91e09 rsp=fffff88003cb9af0 rbp=fffff880009e8180
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003a00200
r11=0000000000100002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiTryUnwaitThread+0x159:
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:00000000`00004490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002a8cca9 to fffff80002a8d740

STACK_TEXT: 
fffff880`03cb9818 fffff800`02a8cca9 : 00000000`0000000a fffff800`0280c310 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`03cb9820 fffff800`02a8b920 : fffff8a0`018e0a01 fffffa80`03b36060 fffffa80`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03cb9960 fffff800`02a91e09 : 00000002`00000000 fffffa80`03cbdc50 00000000`00000001 fffffa80`03cbdc50 : nt!KiPageFault+0x260
fffff880`03cb9af0 fffff800`02a917d2 : fffffa80`0683ed30 00000000`00000000 00000000`00000000 fffff880`009e8180 : nt!KiTryUnwaitThread+0x159
fffff880`03cb9b50 fffff800`02da7f94 : fffff880`00000000 00000000`00000001 fffffa80`03a00200 fffffa80`0683ed38 : nt!KeSetEvent+0x142
fffff880`03cb9bc0 fffff800`02a8c993 : fffffa80`053f9060 fffffa80`06f0f9e0 00000000`00000000 fffffa80`0683ed30 : nt!NtSetEvent+0x90
fffff880`03cb9c20 00000000`771cf79a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0232fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771cf79a


STACK_COMMAND: kb

FOLLOWUP_IP: 
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KiTryUnwaitThread+159

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd

FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+159

BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+159

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051111-34491-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
Debug session time: Wed May 11 14:26:53.169 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:34.854
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80002850310, 2, 1, fffff80002ae35a0}

Probably caused by : ntkrnlmp.exe ( nt!KiSignalThread+54 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002850310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ae35a0, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
fffff80002850310 

CURRENT_IRQL: 2

FAULTING_IP: 
nt!KiSignalThread+54
fffff800`02ae35a0 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

TRAP_FRAME: fffff88009fd8940 -- (.trap 0xfffff88009fd8940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003b551b0 rbx=0000000000000000 rcx=fffff88002d63180
rdx=fffffa8003ab3770 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae35a0 rsp=fffff88009fd8ad0 rbp=fffff88002d63180
r8=fffffa8003cd4460 r9=fffffa8003ab3878 r10=0000000000000001
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSignalThread+0x54:
fffff800`02ae35a0 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:0202:00000000`00004490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002ad0c69 to fffff80002ad1700

STACK_TEXT: 
fffff880`09fd87f8 fffff800`02ad0c69 : 00000000`0000000a fffff800`02850310 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09fd8800 fffff800`02acf8e0 : 00000000`00000005 fffffa80`03ab3770 00000000`00000000 fffff800`02dcc7f2 : nt!KiBugCheckDispatch+0x69
fffff880`09fd8940 fffff800`02ae35a0 : 00000000`00000000 fffffa80`03ab3878 fffffa80`03ab3770 fffffa80`04015060 : nt!KiPageFault+0x260
fffff880`09fd8ad0 fffff800`02ae27e1 : fffff880`02d63180 fffffa80`03ab3770 fffffa80`03cd4460 fffffa80`03b551b0 : nt!KiSignalThread+0x54
fffff880`09fd8b00 fffff800`02dccbf4 : 00000000`00000000 00000000`00000000 00000000`1e157400 fffff880`00000000 : nt!KiInsertQueue+0xd1
fffff880`09fd8b70 fffff800`02ae17ae : 00000000`00000000 00000000`00000001 fffffa80`03fe36a0 fffffa80`03fe36a0 : nt!IoSetIoCompletionEx+0x58
fffff880`09fd8ba0 fffff800`02ad0953 : fffffa80`04015060 fffffa80`03fe36a0 fffff880`09fd8ca0 00000000`1e157480 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`09fd8c20 00000000`77200a6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1b35f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77200a6a


STACK_COMMAND: kb

FOLLOWUP_IP: 
nt!KiSignalThread+54
fffff800`02ae35a0 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KiSignalThread+54

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34

FAILURE_BUCKET_ID: X64_0xA_nt!KiSignalThread+54

BUCKET_ID: X64_0xA_nt!KiSignalThread+54

Followup: MachineOwner
---------





DRIVERS

Code:
start end module name
fffff880`00e28000 fffff880`00e7f000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03ca0000 fffff880`03d2a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04fd2000 fffff880`04fe8000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03e52000 fffff880`03e66000 amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03efd000 fffff880`03f12000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00fbc000 fffff880`00fc7000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`04083000 fffff880`0408b000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0ad0a000 fffff880`0ad15000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00f89000 fffff880`00f92000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f92000 fffff880`00fbc000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`054bc000 fffff880`054dc000 AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`0461f000 fffff880`04f46000 atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03f12000 fffff880`03f61000 atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff960`00800000 fffff960`00861000 ATMFD ATMFD.DLL Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`05c00000 fffff880`05c2b000 AVGIDSDriver AVGIDSDriver.Sys Thu Apr 14 13:11:05 2011 (4DA72AA9)
fffff880`01220000 fffff880`0122a000 AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`045e7000 fffff880`045f2000 AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`03e88000 fffff880`03ed7000 avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`02aa9000 fffff880`02ab8000 avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`0147d000 fffff880`01489000 avgrkx64 avgrkx64.sys Wed Mar 16 10:06:34 2011 (4D80C3EA)
fffff880`02b6d000 fffff880`02bcd000 avgtdia avgtdia.sys Mon Apr 04 17:54:35 2011 (4D9A3E1B)
fffff880`02ac1000 fffff880`02ac8000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03db4000 fffff880`03dc5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04513000 fffff880`04531000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00780000 fffff960`007a7000 cdd cdd.dll Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`02a7f000 fffff880`02aa9000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00fc7000 fffff880`00ff7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cea000 fffff880`00d48000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01102000 fffff880`01175000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04fc2000 fffff880`04fd2000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05c92000 fffff880`05ca0000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c77000 fffff880`03c95000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0120a000 fffff880`01220000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05519000 fffff880`0553b000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05cac000 fffff880`05cb5000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05ca0000 fffff880`05cac000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05cb5000 fffff880`05cc8000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05cc8000 fffff880`05cd4000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04092000 fffff880`04186000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04186000 fffff880`041cc000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`01090000 fffff880`010a4000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01044000 fffff880`01090000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01000000 fffff880`0103a000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a18000 fffff800`02a61000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`041cc000 fffff880`041f0000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05541000 fffff880`0559d000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`06bcf000 fffff880`06be8000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`055e3000 fffff880`055eb080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06bc1000 fffff880`06bcf000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0444b000 fffff880`04513000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f0000 fffff880`015f9000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03fef000 fffff880`03ffe000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06be8000 fffff880`06bf6000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9f000 fffff800`00ba9000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`03e0f000 fffff880`03e52000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d5000 fffff880`013ef000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0553b000 fffff880`05540200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05d26000 fffff880`05d3b000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05ce2000 fffff880`05d05000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cc9000 fffff880`00cd6000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05cd4000 fffff880`05ce2000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e00000 fffff880`03e0f000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06b7f000 fffff880`06b8c000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00f6f000 fffff880`00f89000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04531000 fffff880`04549000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`04549000 fffff880`04576000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`04576000 fffff880`045c4000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`045c4000 fffff880`045e7000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`02b26000 fffff880`02b31000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e88000 fffff880`00e92000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010a4000 fffff880`01102000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c5d000 fffff880`03c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015de000 fffff880`015f0000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0148c000 fffff880`0157e000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04fe8000 fffff880`04ff4000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03f85000 fffff880`03fb4000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`054a7000 fffff880`054bc000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d59000 fffff880`03d68000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02a00000 fffff880`02a45000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0157e000 fffff880`015de000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02b31000 fffff880`02b42000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a61000 fffff800`0303d000 nt ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01233000 fffff880`013d5000 Ntfs Ntfs.sys Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`02ab8000 fffff880`02ac1000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03d33000 fffff880`03d59000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04f9c000 fffff880`04fb9000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00ed2000 fffff880`00ee7000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e92000 fffff880`00ec5000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f58000 fffff880`00f5f000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f5f000 fffff880`00f6f000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ef000 fffff880`01400000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05d53000 fffff880`05df9000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`054dc000 fffff880`05519000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cd6000 fffff880`00cea000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f61000 fffff880`03f85000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04600000 fffff880`0461b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fb4000 fffff880`03fd5000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fd5000 fffff880`03fef000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c00000 fffff880`03c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02b0b000 fffff880`02b14000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b14000 fffff880`02b1d000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b1d000 fffff880`02b26000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011c1000 fffff880`011fb000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05d3b000 fffff880`05d53000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04000000 fffff880`04067000 Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`045f2000 fffff880`045fd000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041f0000 fffff880`041fc000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03d68000 fffff880`03d85000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01475000 fffff880`0147d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06a82000 fffff880`06b17000 srv srv.sys Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06a1b000 fffff880`06a82000 srv2 srv2.sys Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`04400000 fffff880`0442d000 srvnet srvnet.sys Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`041fc000 fffff880`041fd480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0442d000 fffff880`0443f000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b60000 fffff880`02b6d000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b42000 fffff880`02b60000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03da0000 fffff880`03db4000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005a0000 fffff960`005aa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03ed7000 fffff880`03efd000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05c3e000 fffff880`05c92000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`03e66000 fffff880`03e78000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06b64000 fffff880`06b7ec00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06b17000 fffff880`06b34000 usbccgp usbccgp.sys Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`06b34000 fffff880`06b35f00 USBD USBD.SYS Thu Mar 24 23:22:51 2011 (4D8C0A8B)
fffff880`04072000 fffff880`04083000 usbehci usbehci.sys Thu Mar 24 23:22:57 2011 (4D8C0A91)
fffff880`0544d000 fffff880`054a7000 usbhub usbhub.sys Thu Mar 24 23:23:22 2011 (4D8C0AAA)
fffff880`04067000 fffff880`04072000 usbohci usbohci.sys Thu Mar 24 23:22:56 2011 (4D8C0A90)
fffff880`04f46000 fffff880`04f9c000 USBPORT USBPORT.SYS Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`06b36000 fffff880`06b63200 usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00ec5000 fffff880`00ed2000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02ac8000 fffff880`02ad6000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02ad6000 fffff880`02afb000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00ee7000 fffff880`00efc000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00efc000 fffff880`00f58000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01175000 fffff880`011c1000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d85000 fffff880`03da0000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02afb000 fffff880`02b0b000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d48000 fffff880`00dec000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00dec000 fffff880`00dfb000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d2a000 fffff880`03d33000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00322000 win32k win32k.sys Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`04fb9000 fffff880`04fc2000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e7f000 fffff880`00e88000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05d05000 fffff880`05d26000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0ac99000 fffff880`0ad0a000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`06a00000 fffff880`06a0d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`06b5d000 fffff880`06b8b000 usbvideo.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
fffff880`06b8b000 fffff880`06ba6000 usbaudio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`06b44000 fffff880`06b5d000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`06b36000 fffff880`06b44000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06ba6000 fffff880`06bb4000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06bb4000 fffff880`06bc1000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`06b34000 fffff880`06b36000 USBD.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
fffff880`06bcf000 fffff880`06be8000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`06bc1000 fffff880`06bcf000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06b17000 fffff880`06b34000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001D000
fffff880`06be8000 fffff880`06bf6000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06a00000 fffff880`06a0d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`06b5d000 fffff880`06b8b000 usbvideo.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
fffff880`06b8b000 fffff880`06ba6000 usbaudio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`06b44000 fffff880`06b5d000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`06b36000 fffff880`06b44000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06ba6000 fffff880`06bb4000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`06bb4000 fffff880`06bc1000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`055ba000 fffff880`055bc000 USBD.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
fffff880`055ca000 fffff880`055e3000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`055bc000 fffff880`055ca000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0559d000 fffff880`055ba000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001D000
fffff880`055ec000 fffff880`055fa000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`05400000 fffff880`0540d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0540d000 fffff880`0543b000 usbvideo.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
fffff880`03dc5000 fffff880`03de0000 usbaudio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`00e00000 fffff880`00e0e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`00e0e000 fffff880`00e1a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0122a000 fffff880`01233000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`02a6c000 fffff880`02a7f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
 
thanks for replying so quickly!

I have tried uninstalling AVG but that hasn't stopped them, I have attatched the dump files of blue screens I've had since AVG was removed
 

Attachments

  • post AVG dumps.zip
    43.4 KB · Views: 373
BCCodes 1a, A.

Attach:

- Passmark Rammon HTML.zip
- CPUZ memory and CPU tabs

CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051111-21918-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Wed May 11 17:08:05.556 2011 (UTC - 4:00)
System Uptime: 0 days 0:16:44.867
Loading Kernel Symbols
...............................................................
................................................................
....WARNING: Unknown_Module_fffff880_03a38000 overlaps usbhub
WARNING: Unknown_Module_fffff880_03a38000 overlaps dump_dumpfve
...Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000

Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 1, fffff80002ab2077}

Probably caused by : ntkrnlmp.exe ( nt!KiDeliverApc+197 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ab2077, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'Unknown_Module_fffff880_03a38000' and 'usbhub' overlap

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiDeliverApc+197
fffff800`02ab2077 488910          mov     qword ptr [rax],rdx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  spotify.exe

TRAP_FRAME:  fffff880098a5250 -- (.trap 0xfffff880098a5250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ab2077 rsp=fffff880098a53e0 rbp=0000000000000000
 r8=fffffa80060b4720  r9=0000000000000000 r10=fffffa80060b4710
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiDeliverApc+0x197:
fffff800`02ab2077 488910          mov     qword ptr [rax],rdx ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ad4ca9 to fffff80002ad5740

STACK_TEXT:  
fffff880`098a5108 fffff800`02ad4ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`098a5110 fffff800`02ad3920 : 00000000`00000001 fffffa80`064b46d0 fffffa80`043e5a80 fffff880`098a5380 : nt!KiBugCheckDispatch+0x69
fffff880`098a5250 fffff800`02ab2077 : fffff880`048ac700 fffffa80`05348000 fffff880`098a5450 fffff880`04197f76 : nt!KiPageFault+0x260
fffff880`098a53e0 fffff800`02a88bc5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x197
fffff880`098a5460 fffff800`02dcefa8 : fffff880`098a5ca0 fffff880`098a5720 00000000`00000000 fffff880`00000006 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`098a5490 fffff800`02df5c7d : 00000000`00000001 fffff800`02adb9a2 fffffa80`00000001 fffffa80`00000000 : nt!ObpWaitForMultipleObjects+0x24d
fffff880`098a5960 fffff800`02ad4993 : 00000000`739e2450 00000000`0802f170 00000000`0802fd20 00000000`7ef56000 : nt!NtWaitForMultipleObjects32+0xec
fffff880`098a5bb0 00000000`739e2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0802f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739e2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDeliverApc+197
fffff800`02ab2077 488910          mov     qword ptr [rax],rdx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiDeliverApc+197

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xA_nt!KiDeliverApc+197

BUCKET_ID:  X64_0xA_nt!KiDeliverApc+197

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051011-29718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue May 10 15:55:10.154 2011 (UTC - 4:00)
System Uptime: 0 days 2:31:49.855
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}

Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8000280c310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a91e09, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
 fffff8000280c310 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  audiodg.exe

TRAP_FRAME:  fffff88003cb9960 -- (.trap 0xfffff88003cb9960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8003b36168 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a91e09 rsp=fffff88003cb9af0 rbp=fffff880009e8180
 r8=0000000000000000  r9=0000000000000000 r10=fffffa8003a00200
r11=0000000000100002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiTryUnwaitThread+0x159:
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:00000000`00004490=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8cca9 to fffff80002a8d740

STACK_TEXT:  
fffff880`03cb9818 fffff800`02a8cca9 : 00000000`0000000a fffff800`0280c310 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`03cb9820 fffff800`02a8b920 : fffff8a0`018e0a01 fffffa80`03b36060 fffffa80`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03cb9960 fffff800`02a91e09 : 00000002`00000000 fffffa80`03cbdc50 00000000`00000001 fffffa80`03cbdc50 : nt!KiPageFault+0x260
fffff880`03cb9af0 fffff800`02a917d2 : fffffa80`0683ed30 00000000`00000000 00000000`00000000 fffff880`009e8180 : nt!KiTryUnwaitThread+0x159
fffff880`03cb9b50 fffff800`02da7f94 : fffff880`00000000 00000000`00000001 fffffa80`03a00200 fffffa80`0683ed38 : nt!KeSetEvent+0x142
fffff880`03cb9bc0 fffff800`02a8c993 : fffffa80`053f9060 fffffa80`06f0f9e0 00000000`00000000 fffffa80`0683ed30 : nt!NtSetEvent+0x90
fffff880`03cb9c20 00000000`771cf79a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0232fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771cf79a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiTryUnwaitThread+159
fffff800`02a91e09 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiTryUnwaitThread+159

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xA_nt!KiTryUnwaitThread+159

BUCKET_ID:  X64_0xA_nt!KiTryUnwaitThread+159

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f70000 fffff880`00fc7000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cea000 fffff880`02d74000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04800000 fffff880`04816000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0429c000 fffff880`042b0000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03fc1000 fffff880`03fd6000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ea4000 fffff880`00eaf000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`041eb000 fffff880`041f3000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0715b000 fffff880`07166000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e9b000 fffff880`00ea4000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da9000 fffff880`00dd3000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04331000 fffff880`04351000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`04854000 fffff880`0517b000   atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03e00000 fffff880`03e4f000   atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff960`008c0000 fffff960`00921000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`06c00000 fffff880`06c2b000   AVGIDSDriver AVGIDSDriver.Sys Wed Mar 30 10:57:08 2011 (4D9344C4)
fffff880`0196f000 fffff880`01979000   AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`03a71000 fffff880`03a7c000   AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`03f4c000 fffff880`03f9b000   avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`019d9000 fffff880`019e8000   avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`01963000 fffff880`0196f000   avgrkx64 avgrkx64.sys Tue Jan 18 21:31:31 2011 (4D364D03)
fffff880`02c46000 fffff880`02ca5000   avgtdia  avgtdia.sys  Thu Feb 10 00:50:32 2011 (4D537CA8)
fffff880`019f1000 fffff880`019f8000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f3b000 fffff880`03f4c000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03b80000 fffff880`03b9e000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      unavailable (00000000)
fffff880`019af000 fffff880`019d9000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ce9000 fffff880`00da9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01933000 fffff880`01963000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c8b000 fffff880`00ce9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01128000 fffff880`0119b000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`051ee000 fffff880`051fe000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05d9e000 fffff880`05dac000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03f1d000 fffff880`03f3b000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03f0e000 fffff880`03f1d000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0191d000 fffff880`01933000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0438e000 fffff880`043b0000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05db8000 fffff880`05dc1000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05dac000 fffff880`05db8000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05dc1000 fffff880`05dd4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05dd4000 fffff880`05de0000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`040db000 fffff880`041cf000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04000000 fffff880`04046000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`010b6000 fffff880`010ca000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0106a000 fffff880`010b6000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018e3000 fffff880`0191d000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01592000 fffff880`015dc000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ffa000 fffff800`03043000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04046000 fffff880`0406a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05c3b000 fffff880`05c97000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05d18000 fffff880`05d31000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05d31000 fffff880`05d39080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05d0a000 fffff880`05d18000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03ab8000 fffff880`03b80000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f6000 fffff880`015ff000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02c1a000 fffff880`02c29000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05d3a000 fffff880`05d48000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc5000 fffff800`00bcf000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04259000 fffff880`0429c000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d2000 fffff880`013ec000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01567000 fffff880`01592000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`043b0000 fffff880`043b5200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05c23000 fffff880`05c38000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c00000 fffff880`05c23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c6a000 fffff880`00c77000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05de0000 fffff880`05dee000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`02c29000 fffff880`02c38000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05d48000 fffff880`05d55000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e81000 fffff880`00e9b000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b9e000 fffff880`03bb6000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03bb6000 fffff880`03be3000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`03a00000 fffff880`03a4e000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`03a4e000 fffff880`03a71000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0185e000 fffff880`01869000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fd0000 fffff880`00fda000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010ca000 fffff880`01128000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03f03000 fffff880`03f0e000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e4000 fffff880`015f6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01415000 fffff880`01507000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0483a000 fffff880`04846000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03e4f000 fffff880`03e7e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0431c000 fffff880`04331000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02da3000 fffff880`02db2000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ca5000 fffff880`02cea000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01507000 fffff880`01567000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01869000 fffff880`0187a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03ef7000 fffff880`03f03000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1d000 fffff800`02ffa000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01230000 fffff880`013d2000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`019e8000 fffff880`019f1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d7d000 fffff880`02da3000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`051d1000 fffff880`051ee000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e6a000 fffff880`00e71000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e71000 fffff880`00e81000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ec000 fffff880`013fd000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06cf3000 fffff880`06d99000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04351000 fffff880`0438e000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c77000 fffff880`00c8b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04816000 fffff880`0483a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e7e000 fffff880`03e99000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03fd6000 fffff880`03ff7000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02c00000 fffff880`02c1a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03ea6000 fffff880`03ef7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01843000 fffff880`0184c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0184c000 fffff880`01855000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01855000 fffff880`0185e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`043d7000 fffff880`043ef000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0406a000 fffff880`040d1000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`06d99000 fffff880`06da4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041f3000 fffff880`041ff000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02db2000 fffff880`02dcf000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015dc000 fffff880`015e4000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07055000 fffff880`070ea000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06c2b000 fffff880`06c92000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`06da4000 fffff880`06dd1000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`04846000 fffff880`04847480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06dd1000 fffff880`06de3000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01898000 fffff880`018a5000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0187a000 fffff880`01898000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dea000 fffff880`02dfe000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03f9b000 fffff880`03fc1000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05cb6000 fffff880`05d0a000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`042b0000 fffff880`042c2000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05d83000 fffff880`05d9dc00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05c97000 fffff880`05cb4000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05cb4000 fffff880`05cb5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`041da000 fffff880`041eb000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042c2000 fffff880`0431c000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`041cf000 fffff880`041da000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0517b000 fffff880`051d1000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05d55000 fffff880`05d82200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01800000 fffff880`0180e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0180e000 fffff880`01833000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0119b000 fffff880`011e7000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02dcf000 fffff880`02dea000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01833000 fffff880`01843000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ebd000 fffff880`00f61000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f61000 fffff880`00f70000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d74000 fffff880`02d7d000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003c2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`040d1000 fffff880`040da000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fc7000 fffff880`00fd0000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`043b6000 fffff880`043d7000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`070ea000 fffff880`0715b000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01979000 fffff880`01987000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01987000 fffff880`01993000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01993000 fffff880`0199c000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0199c000 fffff880`019af000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Memory settings look right.

Code:
[B]

050111-29156-01.dmp
 BugCheck A, {fffff68000379d98, 0, 0, fffff80002b059fa}
 Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )

 050111-26239-01.dmp
 MEMORY_MANAGEMENT (1a)
 Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+6051 )

 051011-29718-01.dmp
 BugCheck A, {fffff8000280c310, 2, 1, fffff80002a91e09}
 Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+159 )

 051111-34491-01.dmp
 BugCheck A, {fffff80002850310, 2, 1, fffff80002ae35a0}
 Probably caused by : ntkrnlmp.exe ( nt!KiSignalThread+54 [/B]All you get is this,


Run 10 passes of memtest.
Test sticks each indivudually. If clean, move them to slots 1 and 2.
 
ok seems there was a problem with one of the ram slots, kept freezing when I tried to do one of the memory tests. I have moved the chips to different slots and have not had any problems so far, hopefully it will stay this way!

Thanks so much for your help :)
 
ok may have spoken too soon :( they started again when I switched the PC on today
 

Attachments

  • Dump Files (post RAM check).zip
    547.5 KB · Views: 411
Memory_corruption. Faulty ram or bad motherboard:

CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-20779-01.dmp]
BugCheck 3B, {c0000005, fffff80002d4e2cd, fffff88008811770, 0}
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )
---------
---------
---------

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\051611-25334-01.dmp]
BugCheck 4E, {99, 371aa, 3, 352a9}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
---------
---------
---------
 
Not daft at all, good question. Your crash dumps blame memory.

What you have done:

- uninstalled AVG
- updated drivers
- tested memory sticks individually
- verified that your memory settings are right
- loaded bios setup defaults

And you keep getting errors related to memory, http://windows7forums.com/blue-screen-death-bsod/66314-various-crashes.html

It does not look at all like in any way it could be related to hard disk, but still go ahead and test it:

- command prompt >> chkdsk /f

- HDDScan

- Link Removed - Invalid URL


Test the hard drive and reinstall the system, if no luck replace your hardware.
 
Last edited:
Ok I will give that a go. Briefly looking through a few other threads with similar issues, overclocking came up, could that be causing these problems?
 
Ok I will give that a go. Briefly looking through a few other threads with similar issues, overclocking came up, could that be causing these problems?

Yes, overclocking can cause memory errors.

me said:
- Passmark Rammon HTML.zip
- CPUZ memory and CPU tabs

You didn't attach cpuz CPU snip, and I didn't insist further. Ensure your CPU is at stock.
 
this is a screenshot of the CPU tab after I've disabled overclocking, would it help if I posted one with overclocking on?
 

Attachments

  • CPUss.png
    CPUss.png
    44.3 KB · Views: 590
ok after removing the suspect RAM chip, disabling overclocking and enabling CnQ, I am still getting crashes :( here are all the up to date files.

Would it do any good to format the hard drive and do a complete Windows reinstall?
 

Attachments

  • dump files (post CnQ).zip
    642.6 KB · Views: 385
ok after removing the suspect RAM chip, disabling overclocking and enabling CnQ, I am still getting crashes :( here are all the up to date files.

Would it do any good to format the hard drive and do a complete Windows reinstall?

4e --> memory_corruption.

Now your CPU is back to 3,4Ghz, an old screenshot?

Reinstall the system? Give it a go, 99,9999% it won't help.


1. Load bios setup defaults.

2. Make sure AMD C&Q is on.

3. No overclocking at all.

4. It could help if you place the stick into another slot.

5. Test the hard drive just in case.


Again, make sure the hardware is at its stock recommended settings.
 
Back
Top