BSOD when gamming

Joined
Mar 21, 2011
Messages
3
Reaction score
0
i am able to play only one game without a BSOD when i play MOH i could play for like 10 minutes before i get a BLUE SCREEN sometimes the screen goes WHITE and takes me to my desktop and seconds later i get a BSOD i would really appreciate your help i also ran this program called "who crashed" and i got these results it's pretty weird it gives me different reasons why it maybe happening check it out and also i updated my graphics card drivers thanks for help in advanced

On Sat 3/19/2011 2:18:28 AM GMT your computer crashed
crash dump file: C:\Windows\Minidump\031811-15834-01.dmp
This was probably caused by the following module: atikmdag.sys (atikmdag+0x8026B8)
Bugcheck code: 0x1000007E (0xFFFFFFFF80000003, 0xFFFFF880050516B8, 0xFFFFF8800570B338, 0xFFFFF8800570ABA0)
Error: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
file path: C:\Windows\system32\drivers\atikmdag.sys
product: ATI Radeon Family
company: ATI Technologies Inc.
description: ATI Radeon Kernel Mode Driver
Bug check description: This indicates that a system thread generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: atikmdag.sys (ATI Radeon Kernel Mode Driver, ATI Technologies Inc.).
Google query: atikmdag.sys ATI Technologies Inc. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M

On Sat 3/19/2011 7:50:38 AM GMT your computer crashed
crash dump file: C:\Windows\Minidump\031911-15350-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x70740)
Bugcheck code: 0xDA (0x504, 0xFFFFF6FC40022800, 0x1, 0x4500)
Error: SYSTEM_PTE_MISUSE
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a page table entry (PTE) routine has been used in an improper way.
There is a possibility this problem was caused by a virus or other malware.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.

On Sun 3/20/2011 8:15:53 AM GMT your computer crashed
crash dump file: C:\Windows\Minidump\032011-16863-01.dmp
This was probably caused by the following module: usbohci.sys (usbohci+0x2D29)
Bugcheck code: 0xD1 (0x28, 0x2, 0x1, 0xFFFFF880051C5D29)
Error: DRIVER_IRQL_NOT_LESS_OR_EQUAL
file path: C:\Windows\system32\drivers\usbohci.sys
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: OHCI USB Miniport Driver
Bug check description: This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
0x7E_atikmdag
0xD1_usbehci
0xD1_usbohci!OHCI_PollAsyncEndpoint
0xFE_INVALID_PHYSICAL_ADDR_usbohci!OHCI_PollAsyncEndpoint


----> Give me this information:


http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html


1. CPU-Z memory and CPU tab
2. RAMMon report saved as HTML






----> Uninstall Webroot Spysweeper. Uninstall Trend Micro.
Install MSE http://www.microsoft.com/security_essentials/



----> Update drivers:


VIA Audio
viahduaa.sys Thu Jul 09 23:07:01 2009
www.via.com.tw › home › resources › download-center


ATI
atikmdag.sys Wed Jan 26 17:48:28 2011
http://sites.amd.com/us/game/downloads/Pages/radeon_win7-64.aspx


Realtek LAN
Rt64win7.sys Wed Jun 23 05:10:45 2010
http://218.210.127.131/downloads/do...n=4&DownTypeID=3&GetDown=false&Downloads=true














CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-15350-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e14000 PsLoadedModuleList = 0xfffff800`03051e50
Debug session time: Sat Mar 19 03:50:38.657 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:59.000
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck DA, {504, fffff6fc40022800, 1, 4500}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+b43b )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_PTE_MISUSE (da)
The stack trace identifies the guilty driver.
Arguments:
Arg1: 0000000000000504, Type of error.
Arg2: fffff6fc40022800
Arg3: 0000000000000001
Arg4: 0000000000004500

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xDA

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002edce11 to fffff80002e84740

STACK_TEXT:  
fffff880`02fe69d8 fffff800`02edce11 : 00000000`000000da 00000000`00000504 fffff6fc`40022800 00000000`00000001 : nt!KeBugCheckEx
fffff880`02fe69e0 fffff800`02e945e4 : 00000000`00000003 fffff800`03039720 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0xb43b
fffff880`02fe6af0 fffff800`02e97df5 : fffffa80`06a0a040 00000000`00000008 00004500`0002eb84 00000000`00000001 : nt!MiEmptyPteBins+0x10d
fffff880`02fe6b40 fffff800`02e98eb4 : 00000000`00000008 00000000`00000001 fffffa80`06a0a040 fffff800`02e980cb : nt!MiAdjustPteBins+0x29
fffff880`02fe6b80 fffff800`02e99173 : 00000000`00000008 fffff880`02fe6c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x40
fffff880`02fe6bd0 fffff800`031277c6 : fffffa80`06a23680 00000000`00000080 fffffa80`06a0a040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`02fe6d40 fffff800`02e62c26 : fffff880`02d64180 fffffa80`06a23680 fffff880`02d6f040 85119485`33665533 : nt!PspSystemThreadStartup+0x5a
fffff880`02fe6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+b43b
fffff800`02edce11 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+b43b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xDA_nt!_??_::FNODOBFM::_string_+b43b

BUCKET_ID:  X64_0xDA_nt!_??_::FNODOBFM::_string_+b43b

Followup: MachineOwner
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031811-15834-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e1a000 PsLoadedModuleList = 0xfffff800`03057e50
Debug session time: Fri Mar 18 22:18:28.078 2011 (UTC - 4:00)
System Uptime: 0 days 4:09:07.420
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff880050516b8, The address that the exception occurred at
Arg3: fffff8800570b338, Exception Record Address
Arg4: fffff8800570aba0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

FAULTING_IP: 
atikmdag+8026b8
fffff880`050516b8 cc              int     3

EXCEPTION_RECORD:  fffff8800570b338 -- (.exr 0xfffff8800570b338)
ExceptionAddress: fffff880050516b8 (atikmdag+0x00000000008026b8)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 1
   Parameter[0]: 0000000000000000

CONTEXT:  fffff8800570aba0 -- (.cxr 0xfffff8800570aba0)
rax=fffff88005082330 rbx=fffff88005082370 rcx=0000000000000002
rdx=0000000000000001 rsi=fffffa8007478970 rdi=0000000000000000
rip=fffff880050516b8 rsp=fffff8800570b570 rbp=0000000000000000
 r8=0000000000000000  r9=fffff88004b55cc4 r10=fffff8800570b640
r11=fffff88004b55be4 r12=0000000000000001 r13=0000000000000001
r14=fffffa8008b4a000 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000286
atikmdag+0x8026b8:
fffff880`050516b8 cc              int     3
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x7E

PROCESS_NAME:  System

CURRENT_IRQL:  1

ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION}  Breakpoint  A breakpoint has been reached.

EXCEPTION_PARAMETER1:  0000000000000000

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880050516b8

STACK_TEXT:  
fffff880`0570b570 00000000`00000000 : fffff880`04b58658 00000000`00000002 00000000`00000000 fffff880`0570b5e0 : atikmdag+0x8026b8


FOLLOWUP_IP: 
atikmdag+8026b8
fffff880`050516b8 cc              int     3

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  atikmdag+8026b8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d40a4bc

STACK_COMMAND:  .cxr 0xfffff8800570aba0 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_atikmdag+8026b8

BUCKET_ID:  X64_0x7E_atikmdag+8026b8

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-14601-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e5e000 PsLoadedModuleList = 0xfffff800`0309be50
Debug session time: Sun Mar 20 01:19:30.020 2011 (UTC - 4:00)
System Uptime: 0 days 3:31:55.002
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff88085658140, 2, 0, fffff88004249d42}

Unable to load image \SystemRoot\system32\DRIVERS\usbehci.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for usbehci.sys
*** ERROR: Module load completed but symbols could not be loaded for usbehci.sys
Probably caused by : usbehci.sys ( usbehci+5d42 )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88085658140, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88004249d42, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031060e0
 fffff88085658140 

CURRENT_IRQL:  2

FAULTING_IP: 
usbehci+5d42
fffff880`04249d42 8b4140          mov     eax,dword ptr [rcx+40h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880030b08c0 -- (.trap 0xfffff880030b08c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880057271b4 rbx=0000000000000000 rcx=fffff88085658100
rdx=fffff88005727180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004249d42 rsp=fffff880030b0a58 rbp=fffffa80078216a0
 r8=fffffa800872cf00  r9=0000000000000001 r10=fffffa800872cc50
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
usbehci+0x5d42:
fffff880`04249d42 8b4140          mov     eax,dword ptr [rcx+40h] ds:fffff880`85658140=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ecdca9 to fffff80002ece740

STACK_TEXT:  
fffff880`030b0778 fffff800`02ecdca9 : 00000000`0000000a fffff880`85658140 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`030b0780 fffff800`02ecc920 : fffffa80`07820050 fffffa80`0872cee0 fffffa80`08712410 fffffa80`0872ca10 : nt!KiBugCheckDispatch+0x69
fffff880`030b08c0 fffff880`04249d42 : fffff880`0424a4ca 00000000`00000012 fffff880`05727180 fffffa80`0872cee0 : nt!KiPageFault+0x260
fffff880`030b0a58 fffff880`0424a4ca : 00000000`00000012 fffff880`05727180 fffffa80`0872cee0 00000000`00000000 : usbehci+0x5d42
fffff880`030b0a60 00000000`00000012 : fffff880`05727180 fffffa80`0872cee0 00000000`00000000 fffffa80`087127a8 : usbehci+0x64ca
fffff880`030b0a68 fffff880`05727180 : fffffa80`0872cee0 00000000`00000000 fffffa80`087127a8 00000000`00000012 : 0x12
fffff880`030b0a70 fffffa80`0872cee0 : 00000000`00000000 fffffa80`087127a8 00000000`00000012 fffffa80`0872cf00 : 0xfffff880`05727180
fffff880`030b0a78 00000000`00000000 : fffffa80`087127a8 00000000`00000012 fffffa80`0872cf00 fffffa80`08712540 : 0xfffffa80`0872cee0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
usbehci+5d42
fffff880`04249d42 8b4140          mov     eax,dword ptr [rcx+40h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  usbehci+5d42

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: usbehci

IMAGE_NAME:  usbehci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ae28235

FAILURE_BUCKET_ID:  X64_0xD1_usbehci+5d42

BUCKET_ID:  X64_0xD1_usbehci+5d42

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-16863-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e0a000 PsLoadedModuleList = 0xfffff800`03047e50
Debug session time: Sun Mar 20 04:15:53.698 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:03.041
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {28, 2, 1, fffff880051c5d29}

Probably caused by : usbohci.sys ( usbohci!OHCI_PollAsyncEndpoint+37d )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880051c5d29, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b20e0
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
usbohci!OHCI_PollAsyncEndpoint+37d
fffff880`051c5d29 f0834b2808      lock or dword ptr [rbx+28h],8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880030b0990 -- (.trap 0xfffff880030b0990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008109c20
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880051c5d29 rsp=fffff880030b0b20 rbp=fffff88005727000
 r8=000000004f444648  r9=0000000000000000 r10=00000000ffffffff
r11=00000000bf23d002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
usbohci!OHCI_PollAsyncEndpoint+0x37d:
fffff880`051c5d29 f0834b2808      lock or dword ptr [rbx+28h],8 ds:0022:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e79ca9 to fffff80002e7a740

STACK_TEXT:  
fffff880`030b0848 fffff800`02e79ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`030b0850 fffff800`02e78920 : fffffa80`07ff3000 00000000`00000000 fffffa80`089eb000 fffffa80`089eb000 : nt!KiBugCheckDispatch+0x69
fffff880`030b0990 fffff880`051c5d29 : 00000000`00000000 fffffa80`0872cb28 00000000`00000000 fffff880`05727000 : nt!KiPageFault+0x260
fffff880`030b0b20 fffff880`051c7737 : fffffa80`0872caa0 fffffa80`0872c860 00000000`00000000 fffffa80`080e61a0 : usbohci!OHCI_PollAsyncEndpoint+0x37d
fffff880`030b0b80 fffff880`0414de8b : 00000000`00000002 fffffa80`0872c860 fffffa80`080e61a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x3f
fffff880`030b0bb0 fffff880`041529b1 : 00000000`00000030 00000000`00000004 fffffa80`0872c860 fffffa80`080e6050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`030b0be0 fffff880`0415e043 : fffffa80`080e61a0 00000000`00000030 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`030b0c40 fffff880`0414ef89 : fffffa80`080e6050 00000000`00000000 fffffa80`080e6a02 fffffa80`080e6a10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`030b0ca0 fffff800`02e85bfc : fffff880`03088180 fffffa80`080e6a10 fffffa80`080e6a28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`030b0cd0 fffff800`02e82eea : fffff880`03088180 fffff880`03093040 00000000`00000000 fffff880`0414edb0 : nt!KiRetireDpcList+0x1bc
fffff880`030b0d80 00000000`00000000 : fffff880`030b1000 fffff880`030ab000 fffff880`030b0d40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
usbohci!OHCI_PollAsyncEndpoint+37d
fffff880`051c5d29 f0834b2808      lock or dword ptr [rbx+28h],8

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  usbohci!OHCI_PollAsyncEndpoint+37d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: usbohci

IMAGE_NAME:  usbohci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc06

FAILURE_BUCKET_ID:  X64_0xD1_usbohci!OHCI_PollAsyncEndpoint+37d

BUCKET_ID:  X64_0xD1_usbohci!OHCI_PollAsyncEndpoint+37d

Followup: MachineOwner
---------


























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-18704-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50
Debug session time: Sun Mar 20 21:34:37.587 2011 (UTC - 4:00)
System Uptime: 0 days 1:10:36.569
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck FE, {5, fffffa80080651a0, 10024398, fffffa80087daf60}

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: usbport!_DEVICE_EXTENSION                     ***
***                                                                   ***
*************************************************************************
Probably caused by : usbohci.sys ( usbohci!OHCI_PollAsyncEndpoint+99 )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000005, USBBUGCODE_INVALID_PHYSICAL_ADDRESS The host controller is
	using a physical memory address that was not allocated by
	the USBport driver.
Arg2: fffffa80080651a0, Device extension pointer of the host controller
Arg3: 0000000010024398, PCI Vendor,Product id for the controller
Arg4: fffffa80087daf60, Pointer to Endpoint data structure

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: usbport!_DEVICE_EXTENSION                     ***
***                                                                   ***
*************************************************************************

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xFE

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8800402de4e to fffff80002ecf740

STACK_TEXT:  
fffff880`030b0ad8 fffff880`0402de4e : 00000000`000000fe 00000000`00000005 fffffa80`080651a0 00000000`10024398 : nt!KeBugCheckEx
fffff880`030b0ae0 fffff880`051c3a45 : 00000000`00000001 fffffa80`087dad20 00000000`00000000 fffff880`06897000 : USBPORT!USBPORTSVC_MapHwPhysicalToVirtual+0x18a
fffff880`030b0b20 fffff880`051c5737 : fffffa80`087daf60 fffffa80`087dad20 00000000`00000000 fffffa80`080651a0 : usbohci!OHCI_PollAsyncEndpoint+0x99
fffff880`030b0b80 fffff880`04001e8b : 00000000`00000002 fffffa80`087dad20 fffffa80`080651a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x3f
fffff880`030b0bb0 fffff880`040069b1 : 00000000`00000050 00000000`00000004 fffffa80`087dad20 fffffa80`08065050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`030b0be0 fffff880`04012043 : fffffa80`080651a0 00000000`00000050 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`030b0c40 fffff880`04002f89 : fffffa80`08065050 00000000`00000000 fffffa80`08065a02 fffffa80`08065a10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`030b0ca0 fffff800`02edabfc : fffff880`03088180 fffffa80`08065a10 fffffa80`08065a28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`030b0cd0 fffff800`02ed7eea : fffff880`03088180 fffff880`03093040 00000000`00000000 fffff880`04002db0 : nt!KiRetireDpcList+0x1bc
fffff880`030b0d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
usbohci!OHCI_PollAsyncEndpoint+99
fffff880`051c3a45 8bd3            mov     edx,ebx

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  usbohci!OHCI_PollAsyncEndpoint+99

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: usbohci

IMAGE_NAME:  usbohci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc06

FAILURE_BUCKET_ID:  X64_0xFE_INVALID_PHYSICAL_ADDR_usbohci!OHCI_PollAsyncEndpoint+99

BUCKET_ID:  X64_0xFE_INVALID_PHYSICAL_ADDR_usbohci!OHCI_PollAsyncEndpoint+99

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00e86000 fffff880`00edd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c4e000 fffff880`02cd8000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04066000 fffff880`0407c000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04338000 fffff880`0434c000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`013d9000 fffff880`013ee000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e4d000 fffff880`00e58000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`051ea000 fffff880`051f2000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`02c17000 fffff880`02c1d000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`02c11000 fffff880`02c17000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e23000 fffff880`00e4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`043cd000 fffff880`043ed000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`0485b000 fffff880`05157000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`04080000 fffff880`040ce000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`0188b000 fffff880`01893000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`018fc000 fffff880`01903000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c00000 fffff880`02c11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02ac8000 fffff880`02ae6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00710000 fffff960`00737000   cdd      cdd.dll      unavailable (00000000)
fffff880`018c9000 fffff880`018f3000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c9a000 fffff880`00d5a000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0185b000 fffff880`0188b000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c3c000 fffff880`00c9a000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04056000 fffff880`04066000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`065e7000 fffff880`065f5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02de2000 fffff880`02e00000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dd3000 fffff880`02de2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01845000 fffff880`0185b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`011d2000 fffff880`011f4000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0640c000 fffff880`06415000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06400000 fffff880`0640c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06415000 fffff880`06428000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06445000 fffff880`06451000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`040ce000 fffff880`041c2000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`05157000 fffff880`0519d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01126000 fffff880`0113a000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010da000 fffff880`01126000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013cf000 fffff880`013d9000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0180b000 fffff880`01845000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`051dd000 fffff880`051ea000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02e16000 fffff800`02e5f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0519d000 fffff880`051c1000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`01893000 fffff880`018ac000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`065f5000 fffff880`065fd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`043ed000 fffff880`043fb000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02a00000 fffff880`02ac8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015ed000 fffff880`015f6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`042d5000 fffff880`042e4000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041f2000 fffff880`04200000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba7000 fffff800`00bb1000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`042f5000 fffff880`04338000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013a4000 fffff880`013be000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0423d000 fffff880`04242200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02b08000 fffff880`02b1d000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`00e58000 fffff880`00e7b000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c1b000 fffff880`00c28000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`013ee000 fffff880`013fc000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`042e4000 fffff880`042f3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04243000 fffff880`04250000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b9b000 fffff880`02bb3000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02bb3000 fffff880`02be0000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06e84000 fffff880`06ed2000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`06ed2000 fffff880`06ef5000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01961000 fffff880`0196c000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ee6000 fffff880`00ef0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0113a000 fffff880`01198000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dc8000 fffff880`02dd3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015db000 fffff880`015ed000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01489000 fffff880`0157b000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`041e6000 fffff880`041f2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02b70000 fffff880`02b83000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04250000 fffff880`0427f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043b8000 fffff880`043cd000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d62000 fffff880`02d71000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cd8000 fffff880`02d1d000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0157b000 fffff880`015db000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0196c000 fffff880`0197d000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dbc000 fffff880`02dc8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e5f000 fffff800`0343c000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01201000 fffff880`013a4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018f3000 fffff880`018fc000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02b1d000 fffff880`02b70000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d26000 fffff880`02d4c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f30000 fffff880`00f45000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ef0000 fffff880`00f23000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fdc000 fffff880`00fe3000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fe3000 fffff880`00ff3000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013be000 fffff880`013cf000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06f50000 fffff880`06ff6000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c28000 fffff880`00c3c000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`041c2000 fffff880`041e6000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0427f000 fffff880`0429a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0429a000 fffff880`042bb000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`042bb000 fffff880`042d5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`019a8000 fffff880`019f9000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01946000 fffff880`0194f000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0194f000 fffff880`01958000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01958000 fffff880`01961000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01198000 fffff880`011d2000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02b83000 fffff880`02b9b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`04856000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06e00000 fffff880`06e0b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`01475000 fffff880`0147d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`09131000 fffff880`091c7000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`090ca000 fffff880`09131000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06e0b000 fffff880`06e38000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`010bf000 fffff880`010cf000   ssfmonm  ssfmonm.sys  Tue Oct 12 18:25:27 2010 (4CB4E057)
fffff880`00f45000 fffff880`00f6b000   ssidrv   ssidrv.sys   Tue Oct 12 18:25:44 2010 (4CB4E068)
fffff880`042f3000 fffff880`042f4480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06e38000 fffff880`06e4a000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0199b000 fffff880`019a8000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0197d000 fffff880`0199b000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02da8000 fffff880`02dbc000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`06f32000 fffff880`06f50000   tmactmon tmactmon.sys Wed Jul 21 03:31:24 2010 (4C46A24C)
fffff880`06ef5000 fffff880`06f1c000   tmcomm   tmcomm.sys   Wed Jul 21 03:31:15 2010 (4C46A243)
fffff880`06f1c000 fffff880`06f32000   tmevtmgr tmevtmgr.sys Wed Jul 21 03:31:15 2010 (4C46A243)
fffff880`02d8c000 fffff880`02da8000   tmtdi    tmtdi.sys    Tue Jul 20 04:58:07 2010 (4C45651F)
fffff960`005d0000 fffff960`005da000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02c1d000 fffff880`02c43000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0434c000 fffff880`0435e000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`018ac000 fffff880`018c9000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`06443000 fffff880`06444f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`051cc000 fffff880`051dd000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0435e000 fffff880`043b8000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`051c1000 fffff880`051cc000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06428000 fffff880`06443000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00f23000 fffff880`00f30000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01903000 fffff880`01911000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`06453000 fffff880`065e7000   viahduaa viahduaa.sys Thu Jul 09 23:07:01 2009 (4A56B055)
fffff880`01911000 fffff880`01936000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f6b000 fffff880`00f80000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f80000 fffff880`00fdc000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d4c000 fffff880`02d62000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02d71000 fffff880`02d8c000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01936000 fffff880`01946000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d5a000 fffff880`00dfe000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00c00000 fffff880`00c0f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d1d000 fffff880`02d26000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00030000 fffff960`00340000   win32k   win32k.sys   unavailable (00000000)
fffff880`051f2000 fffff880`051fb000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00edd000 fffff880`00ee6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02ae7000 fffff880`02b08000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`091c7000 fffff880`091f8000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`09000000 fffff880`09071000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01893000 fffff880`018a1000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018a1000 fffff880`018ad000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018ad000 fffff880`018b6000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018b6000 fffff880`018c9000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Mar 21, 2011
Messages
3
Reaction score
0
so here is the RAM info that you asked for
along with the Screen shots of the spd
i will also UN-install the programs you said and update drivers as well ill let you know if any of that helped
 

Attachments

Joined
Mar 21, 2011
Messages
3
Reaction score
0
So I Un-installed what you told me to and installed what you said as well
after that i restarted and everything i played MOH for atleast 1 hour so i quit i thought it was fine but after the game closed BAM another BSOD could you take a look at this and any other suggestions ? please thank you
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
032111-15880-01.dmp
MEMORY_MANAGEMENT (1a)

You didn't attach CPU-Z MEMORY tab.

Update VIA Audio:
viahduaa.sys Thu Jul 09 23:07:01 2009




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032111-15880-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e12000 PsLoadedModuleList = 0xfffff800`0304fe50
Debug session time: Tue Mar 22 01:55:56.872 2011 (UTC - 4:00)
System Uptime: 0 days 1:27:15.214
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 80000000, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )

Followup: MachineOwner
---------

5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000080000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  MoHMPGame.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800ab5e920 -- (.trap 0xfffff8800ab5e920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000002bed0002 rbx=0000000000000000 rcx=fffffa8006905bd0
rdx=0000000080000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e85905 rsp=fffff8800ab5eab0 rbp=fffff8800ab5eb40
 r8=0000000080000000  r9=0000098000000000 r10=fffffa8006905bd0
r11=fffff8800ab5ec20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02e85905 498b08          mov     rcx,qword ptr [r8] ds:b340:00000000`80000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e2eb7a to fffff80002e82740

STACK_TEXT:  
fffff880`0ab5e7b8 fffff800`02e2eb7a : 00000000`0000001a 00000000`00041287 00000000`80000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ab5e7c0 fffff800`02e8082e : 00000000`00000000 fffff680`0024a208 fffffa80`03187000 fffff800`02ea7d4e : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`0ab5e920 fffff800`02e85905 : fffff680`0024a208 fffff800`02e9cf4b 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0ab5eab0 fffff800`02e9cf4b : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!ExpInterlockedPopEntrySListFault16
fffff880`0ab5eac0 fffff800`02e8082e : 00000000`00000001 00000000`0163b6d8 00000000`48d50001 00000000`49127f90 : nt!MmAccessFault+0xb4b
fffff880`0ab5ec20 00000000`72a772f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`15abc930 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72a772f9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`02e2eb7a cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00f66000 fffff880`00fbd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c6e000 fffff880`02cf8000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`041c4000 fffff880`041da000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04356000 fffff880`0436a000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`019e1000 fffff880`019f6000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ea4000 fffff880`00eaf000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`051e9000 fffff880`051f1000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`019b5000 fffff880`019bb000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`02c68000 fffff880`02c6e000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`00e9b000 fffff880`00ea4000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fd0000 fffff880`00ffa000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04200000 fffff880`04220000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`0485a000 fffff880`05156000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`040fc000 fffff880`0414a000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`01867000 fffff880`0186f000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`01909000 fffff880`01910000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ded000 fffff880`02dfe000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02bc8000 fffff880`02be6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00720000 fffff960`00747000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018a5000 fffff880`018cf000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ce9000 fffff880`00da9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01837000 fffff880`01867000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c8b000 fffff880`00ce9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01281000 fffff880`012f4000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`041b4000 fffff880`041c4000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05538000 fffff880`05541000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`065a5000 fffff880`065b3000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02dcf000 fffff880`02ded000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dc0000 fffff880`02dcf000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`013cf000 fffff880`013e5000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0180c000 fffff880`0182e000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`065bf000 fffff880`065c8000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`065b3000 fffff880`065bf000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`065c8000 fffff880`065db000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`01888000 fffff880`01894000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04000000 fffff880`040f4000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`05156000 fffff880`0519c000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0101b000 fffff880`0102f000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00da9000 fffff880`00df5000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01305000 fffff880`0130f000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01395000 fffff880`013cf000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`051dc000 fffff880`051e9000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`033ef000 fffff800`03438000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0519c000 fffff880`051c0000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0186f000 fffff880`01888000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04263000 fffff880`0426b080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06400000 fffff880`0640e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02b00000 fffff880`02bc8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015ec000 fffff880`015f5000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`042f3000 fffff880`04302000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`043eb000 fffff880`043f9000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b99000 fffff800`00ba3000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04313000 fffff880`04356000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01267000 fffff880`01281000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015a0000 fffff880`015cb000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0425d000 fffff880`04262200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02a6d000 fffff880`02a82000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02a29000 fffff880`02a4c000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c6a000 fffff880`00c77000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`011d2000 fffff880`011e0000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04302000 fffff880`04311000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`01894000 fffff880`018a1000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e81000 fffff880`00e9b000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`018cf000 fffff880`01900000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`05528000 fffff880`05538000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`02be6000 fffff880`02bfe000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0548a000 fffff880`054b7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`054b7000 fffff880`05505000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05505000 fffff880`05528000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0196e000 fffff880`01979000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc6000 fffff880`00fd0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01209000 fffff880`01267000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015da000 fffff880`015ec000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0144e000 fffff880`01540000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01800000 fffff880`0180c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02ad5000 fffff880`02ae8000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0426e000 fffff880`0429d000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043d6000 fffff880`043eb000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d82000 fffff880`02d91000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cf8000 fffff880`02d3d000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01540000 fffff880`015a0000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01979000 fffff880`0198a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e12000 fffff800`033ef000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0102f000 fffff880`011d2000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01900000 fffff880`01909000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02a82000 fffff880`02ad5000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d46000 fffff880`02d6c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e6a000 fffff880`00e71000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e71000 fffff880`00e81000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`012f4000 fffff880`01305000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05541000 fffff880`055e7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04220000 fffff880`0425d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c77000 fffff880`00c8b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`041da000 fffff880`041fe000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0429d000 fffff880`042b8000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`042b8000 fffff880`042d9000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`042d9000 fffff880`042f3000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01953000 fffff880`0195c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0195c000 fffff880`01965000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01965000 fffff880`0196e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0135b000 fffff880`01395000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02ae8000 fffff880`02b00000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0414a000 fffff880`041b4000   Rt64win7 Rt64win7.sys Wed Jan 26 08:34:03 2011 (4D4022CB)
fffff880`055e7000 fffff880`055f2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`015d3000 fffff880`015da000   SmartDefragDriver SmartDefragDriver.sys Wed Feb 23 03:37:56 2011 (4D64C764)
fffff880`015cb000 fffff880`015d3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0828e000 fffff880`08324000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08227000 fffff880`0828e000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05400000 fffff880`0542d000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04311000 fffff880`04312480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0542d000 fffff880`0543f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019a8000 fffff880`019b5000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0198a000 fffff880`019a8000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dac000 fffff880`02dc0000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00590000 fffff960`0059a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019bb000 fffff880`019e1000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0436a000 fffff880`0437c000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`065db000 fffff880`065f8000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`065f8000 fffff880`065f9f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`051cb000 fffff880`051dc000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0437c000 fffff880`043d6000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`051c0000 fffff880`051cb000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04800000 fffff880`04856000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`013e5000 fffff880`01400000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01910000 fffff880`0191e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`06411000 fffff880`065a5000   viahduaa viahduaa.sys Thu Jul 09 23:07:01 2009 (4A56B055)
fffff880`0191e000 fffff880`01943000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0130f000 fffff880`0135b000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d6c000 fffff880`02d82000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02d91000 fffff880`02dac000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01943000 fffff880`01953000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eb3000 fffff880`00f57000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f57000 fffff880`00f66000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d3d000 fffff880`02d46000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003f0000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`051f1000 fffff880`051fa000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fbd000 fffff880`00fc6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02a4c000 fffff880`02a6d000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`08324000 fffff880`08355000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`08355000 fffff880`083c6000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`0186f000 fffff880`0187d000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0187d000 fffff880`01889000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01889000 fffff880`01892000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01892000 fffff880`018a5000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top