New Win 7 system gets random BSOD crashes


Joined
Dec 10, 2010
Messages
3
Reaction score
0
Hi people

I've got some serious problems with my newly assambled PC.
It already started when i began to install the drivers and the basic setup after the OS was installed.

I thought it would go away with the newest drives installed, but it didn't. I now almost tried everything and tried to understand the dump-files. So I gave up for now and hope you could help me.

As the title already says - it happens randomly and with different intensity (crashes per day). I first thought it was my mouse clicking, but the PC crashes also with absolutely no HID activity.

New installed parts in my system are: mobo. cpu, ram, harddisk and win7 64-bit. The other parts are recycled from the old system.

Best regards
bootfailure
 

Attachments

Ad

Advertisements

cybercore

VIP Member
Joined
Sep 22, 2010
Messages
613
Reaction score
102
How lovely - "dumpies". ; )

The latest crash was caused by Realtek 8136/8168/8169, BCCode: d1, update the Realtek driver:

Rt64win7.sys Thu Aug 20 12:05:06 2009



Ensure all the clocks are set as recommended by the manufacturer, no overclocking for now.
Update or uninstall Asrock overclock software:

AsrOcDrv.sys Thu Jan 08 02:43:57 2009


Uninstall Panda:

http://www.pandasecurity.com/homeusers/support/card?id=41209

Prot6Flt.sys Wed Jul 09 06:27:18 2008
IDSFLT64.SYS Fri Sep 25 08:06:10 2009
NETTDI64.SYS Fri Sep 25 08:11:19 2009
WNMFLT64.SYS Fri Sep 25 08:07:56 2009
APPFLT64.SYS Thu Feb 18 12:20:35 2010

Later when you have updated all your outdated drivers and the crashes are gone, feel free, if you wish, to install Panda 2010/11. For now and for sure install MSE:

http://www.microsoft.com/security_essentials/


Update Cisco AnyConnect VPN Client:

vpnva64.sys Mon Aug 31 16:08:08 2009


Update ATI driver:

atikmdag.sys Mon Aug 17 23:05:47 2009




DUMPIES:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121010-18828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c50e50
Debug session time: Fri Dec 10 15:29:24.688 2010 (UTC - 5:00)
System Uptime: 0 days 0:19:44.907
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {ffffba80055ce998, 2, 0, fffff88003ac19ea}

Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+29ea )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffba80055ce998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003ac19ea, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbb0e0
 ffffba80055ce998 

CURRENT_IRQL:  2

FAULTING_IP: 
Rt64win7+29ea
fffff880`03ac19ea 488b4208        mov     rax,qword ptr [rdx+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80003fd5230 -- (.trap 0xfffff80003fd5230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa80055417d8
rdx=ffffba80055ce990 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003ac19ea rsp=fffff80003fd53c0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffffa80048a8020
r11=fffffa80048a8ba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
Rt64win7+0x29ea:
fffff880`03ac19ea 488b4208        mov     rax,qword ptr [rdx+8] ds:ffffba80`055ce998=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a82ca9 to fffff80002a83740

STACK_TEXT:  
fffff800`03fd50e8 fffff800`02a82ca9 : 00000000`0000000a ffffba80`055ce998 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`03fd50f0 fffff800`02a81920 : fffff800`03fd52e8 fffffa80`0553d000 fffff800`03fd5328 fffffa80`0435ba90 : nt!KiBugCheckDispatch+0x69
fffff800`03fd5230 fffff880`03ac19ea : fffffa80`0553d000 fffffa80`05722b30 fffffa80`048a8000 fffff880`0144aace : nt!KiPageFault+0x260
fffff800`03fd53c0 fffffa80`0553d000 : fffffa80`05722b30 fffffa80`048a8000 fffff880`0144aace 00000000`00000000 : Rt64win7+0x29ea
fffff800`03fd53c8 fffffa80`05722b30 : fffffa80`048a8000 fffff880`0144aace 00000000`00000000 fffff880`014c9484 : 0xfffffa80`0553d000
fffff800`03fd53d0 fffffa80`048a8000 : fffff880`0144aace 00000000`00000000 fffff880`014c9484 fffffa80`053481a0 : 0xfffffa80`05722b30
fffff800`03fd53d8 fffff880`0144aace : 00000000`00000000 fffff880`014c9484 fffffa80`053481a0 00000000`00000000 : 0xfffffa80`048a8000
fffff800`03fd53e0 fffff880`01507088 : 00000000`00000000 fffffa80`053481a0 00000000`00000000 fffff800`02b35856 : ndis!ndisXlateReturnPacketToNetBufferList+0xfe
fffff800`03fd5430 fffff880`01508f15 : fffffa80`048a8ba0 00000000`00000001 fffffa80`048a8b30 fffffa80`05535010 : ndis!ndisReturnPacketToNetBufferList+0x28
fffff800`03fd5460 fffff880`014c90eb : fffffa80`053481a0 fffff800`03fd5870 00000000`00000001 fffffa80`06395680 : ndis! ?? ::DELBPBOK::`string'+0x855
fffff800`03fd5530 fffff880`01442ef1 : fffffa80`053481a0 fffff880`0144bf01 00000000`00000001 fffff880`03a22654 : ndis!ndisMDispatchReceiveNetBufferLists+0x2fb
fffff800`03fd59b0 fffff880`03ad3c05 : fffffa80`0553d000 00000000`00000001 00000000`00000001 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff800`03fd5a00 fffffa80`0553d000 : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000001 : Rt64win7+0x14c05
fffff800`03fd5a08 00000000`00000001 : 00000000`00000001 00000000`00000000 00000000`00000001 fffff800`03003090 : 0xfffffa80`0553d000
fffff800`03fd5a10 00000000`00000001 : 00000000`00000000 00000000`00000001 fffff800`03003090 fffff880`00000001 : 0x1
fffff800`03fd5a18 00000000`00000000 : 00000000`00000001 fffff800`03003090 fffff880`00000001 00000000`00000000 : 0x1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Rt64win7+29ea
fffff880`03ac19ea 488b4208        mov     rax,qword ptr [rdx+8]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Rt64win7+29ea

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Rt64win7

IMAGE_NAME:  Rt64win7.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a8d7432

FAILURE_BUCKET_ID:  X64_0xD1_Rt64win7+29ea

BUCKET_ID:  X64_0xD1_Rt64win7+29ea

Followup: MachineOwner
------------------------------------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121010-21312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a04000 PsLoadedModuleList = 0xfffff800`02c41e50
Debug session time: Fri Dec 10 13:13:02.809 2010 (UTC - 5:00)
System Uptime: 0 days 1:16:03.981
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a008e65018, 0, fffff80002d50788, 7}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+218 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a008e65018, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002d50788, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cac0e0
 ffffe8a008e65018 

FAULTING_IP: 
nt!CmpKcbCacheLookup+218
fffff800`02d50788 418b4710        mov     eax,dword ptr [r15+10h]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880096b9fb0 -- (.trap 0xfffff880096b9fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000007d
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d50788 rsp=fffff880096ba140 rbp=fffff8a008100630
 r8=0000000000000005  r9=0000000000000000 r10=0000000000000000
r11=fffff880096ba2d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!CmpKcbCacheLookup+0x218:
fffff800`02d50788 418b4710        mov     eax,dword ptr [r15+10h] ds:a0e0:00000000`00000010=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002af3849 to fffff80002a74740

STACK_TEXT:  
fffff880`096b9e48 fffff800`02af3849 : 00000000`00000050 ffffe8a0`08e65018 00000000`00000000 fffff880`096b9fb0 : nt!KeBugCheckEx
fffff880`096b9e50 fffff800`02a7282e : 00000000`00000000 00000000`00000000 fffff880`096ba100 fffffa80`06165900 : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`096b9fb0 fffff800`02d50788 : fffff8a0`0000b350 00000000`e9fe1463 fffff880`096ba6c4 fffff800`02d4c876 : nt!KiPageFault+0x16e
fffff880`096ba140 fffff800`02d4fd08 : fffff880`096ba2d8 fffff880`00000007 fffff880`096ba6c8 fffff880`096ba6e0 : nt!CmpKcbCacheLookup+0x218
fffff880`096ba230 fffff800`02d4df61 : fffff8a0`0a580c10 fffff880`096ba6e0 fffff880`096ba718 fffff880`096ba700 : nt!CmpBuildHashStackAndLookupCache+0x328
fffff880`096ba610 fffff800`02d6de84 : fffff800`02d4dcc0 00000000`00000000 fffffa80`05b09010 00000000`00000001 : nt!CmpParseKey+0x2a1
fffff880`096ba8e0 fffff800`02d72e4d : fffffa80`05b09010 fffff880`096baa40 00000000`00000040 fffffa80`03ad77b0 : nt!ObpLookupObjectName+0x585
fffff880`096ba9e0 fffff800`02d51dcc : 00000000`00000000 00000000`00000000 fffff8a0`0a580c01 fffff880`096baaa8 : nt!ObOpenObjectByName+0x1cd
fffff880`096baa90 fffff800`02d53f0f : 00000000`00eddba0 00000000`00020019 00000000`00eddc28 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`096babe0 fffff800`02a73993 : fffffa80`07553060 fffff880`096baca0 00000000`00000000 fffffa80`04637ca0 : nt!NtOpenKeyEx+0xf
fffff880`096bac20 00000000`77270caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00eddb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77270caa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!CmpKcbCacheLookup+218
fffff800`02d50788 418b4710        mov     eax,dword ptr [r15+10h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!CmpKcbCacheLookup+218

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x50_nt!CmpKcbCacheLookup+218

BUCKET_ID:  X64_0x50_nt!CmpKcbCacheLookup+218

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121010-19328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Fri Dec 10 01:19:58.746 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:55.980
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 100000020, fffff88009941bb0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000100000020, Address of the instruction which caused the bugcheck
Arg3: fffff88009941bb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
+0
00000001`00000020 ??              ???

CONTEXT:  fffff88009941bb0 -- (.cxr 0xfffff88009941bb0)
rax=0000000000000000 rbx=000000002c5ff8e5 rcx=fffff8a00377182c
rdx=00000000031f55d0 rsi=000000000000ba58 rdi=fffff8a0036c6010
rip=0000000100000020 rsp=fffff88009942588 rbp=fffff8a00377182c
 r8=0000000100000020  r9=000000000000007d r10=000000002c5ff8e5
r11=fffff8a0037718f6 r12=00000000ffffff00 r13=0000000000000000
r14=fffff880099426b0 r15=fffff8a0031f55d0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
00000001`00000020 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  FlashUtil10l_A

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to 0000000100000020

STACK_TEXT:  
fffff880`099412e8 fffff800`02a88ca9 : 00000000`0000003b 00000000`c0000005 00000001`00000020 fffff880`09941bb0 : nt!KeBugCheckEx
fffff880`099412f0 fffff800`02a885fc : fffff880`09942348 fffff880`09941bb0 00000000`00000000 fffff800`02ab7c90 : nt!KiBugCheckDispatch+0x69
fffff880`09941430 fffff800`02aaf40d : fffff800`02cab508 fffff800`02bd0664 fffff800`02a19000 fffff880`09942348 : nt!KiSystemServiceHandler+0x7c
fffff880`09941470 fffff800`02ab6a90 : fffff800`02bd91a0 fffff880`099414e8 fffff880`09942348 fffff800`02a19000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`099414a0 fffff800`02ac39ef : fffff880`09942348 fffff880`09941bb0 fffff880`00000000 fffff8a0`036c6010 : nt!RtlDispatchException+0x410
fffff880`09941b80 fffff800`02a88d82 : fffff880`09942348 00000000`2c5ff8e5 fffff880`099423f0 00000000`0000ba58 : nt!KiDispatchException+0x16f
fffff880`09942210 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceHandler+7c
fffff800`02a885fc b801000000      mov     eax,1

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

Followup: MachineOwner
---------

















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121010-30296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
Debug session time: Fri Dec 10 14:38:13.302 2010 (UTC - 5:00)
System Uptime: 0 days 1:08:42.521
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffba8007080858, 0, fffff88002d20737, 7}


Could not read faulting driver name
Probably caused by : afd.sys ( afd! ?? ::GFJBLGFE::`string'+6a4b )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffba8007080858, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88002d20737, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0e0e0
 ffffba8007080858 

FAULTING_IP: 
afd! ?? ::GFJBLGFE::`string'+6a4b
fffff880`02d20737 488b88b8000000  mov     rcx,qword ptr [rax+0B8h]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  vpnagent.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88005a12410 -- (.trap 0xfffff88005a12410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba80070807a0 rbx=0000000000000000 rcx=fffffa80070801c0
rdx=fffff88002d2e8b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002d20737 rsp=fffff88005a125a0 rbp=fffff88005a12ca0
 r8=fffffa8006dd25e0  r9=0000000000000000 r10=7217888ab475b60b
r11=fffffa80070801c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
afd! ?? ::GFJBLGFE::`string'+0x6a4b:
fffff880`02d20737 488b88b8000000  mov     rcx,qword ptr [rax+0B8h] ds:ad30:ffffba80`07080858=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b55849 to fffff80002ad6740

STACK_TEXT:  
fffff880`05a122a8 fffff800`02b55849 : 00000000`00000050 ffffba80`07080858 00000000`00000000 fffff880`05a12410 : nt!KeBugCheckEx
fffff880`05a122b0 fffff800`02ad482e : 00000000`00000000 00000000`0000059d fffffa80`06d80800 fffff880`038aecaf : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`05a12410 fffff880`02d20737 : 00000000`0000059d fffff880`05a12ca0 fffff880`05a127d0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`05a125a0 fffff880`02cf4cf9 : fffffa80`04a8fe30 fffff880`05a127d0 00000000`0000059d fffffa80`03c65010 : afd! ?? ::GFJBLGFE::`string'+0x6a4b
fffff880`05a126a0 fffff800`02df1473 : 00000000`00000000 fffffa80`050d6070 00000000`00ca8920 fffffa80`07360e01 : afd!AfdFastIoDeviceControl+0xce9
fffff880`05a12a10 fffff800`02df1f66 : fffff880`05a12bf8 00000000`00000750 00000000`00000001 00000000`00ca8920 : nt!IopXxxControlFile+0x373
fffff880`05a12b40 fffff800`02ad5993 : fffff880`05a12ca0 fffffa80`05c00cc0 fffff880`05a12bf8 fffff800`02df5001 : nt!NtDeviceIoControlFile+0x56
fffff880`05a12bb0 00000000`752b2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00fbefd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x752b2dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
afd! ?? ::GFJBLGFE::`string'+6a4b
fffff880`02d20737 488b88b8000000  mov     rcx,qword ptr [rax+0B8h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  afd! ?? ::GFJBLGFE::`string'+6a4b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: afd

IMAGE_NAME:  afd.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc184

FAILURE_BUCKET_ID:  X64_0x50_afd!_??_::GFJBLGFE::_string_+6a4b

BUCKET_ID:  X64_0x50_afd!_??_::GFJBLGFE::_string_+6a4b

Followup: MachineOwner
---------





DRIVERS:

Code:
start             end                 module name
fffff880`00f5f000 fffff880`00fb6000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c9d000 fffff880`02d27000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03b1a000 fffff880`03b30000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dd5000 fffff880`00de0000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0121b000 fffff880`01230000   amm6460  amm6460.sys  Fri May 21 07:48:19 2010 (4BF67303)
fffff880`055d7000 fffff880`055fa000   APPFLT64 APPFLT64.SYS Thu Feb 18 12:20:35 2010 (4B7D76E3)
fffff880`05d36000 fffff880`05d3e000   AsrOcDrv AsrOcDrv.sys Thu Jan 08 02:43:57 2009 (4965AEBD)
fffff880`05d2b000 fffff880`05d36000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00ce4000 fffff880`00ced000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dab000 fffff880`00dd5000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04852000 fffff880`04e69000   atikmdag atikmdag.sys Mon Aug 17 23:05:47 2009 (4A8A1A8B)
fffff880`01948000 fffff880`0194f000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`01800000 fffff880`01811000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05503000 fffff880`05521000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`01905000 fffff880`0192f000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0189f000 fffff880`018cf000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d4d000 fffff880`00dab000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010cf000 fffff880`01142000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03b0a000 fffff880`03b1a000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04fea000 fffff880`04ff8000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c77000 fffff880`02c95000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01889000 fffff880`0189f000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0439d000 fffff880`043bf000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05400000 fffff880`05418000   DSAFLT64 DSAFLT64.SYS Fri Sep 25 08:04:23 2009 (4ABCB1C7)
fffff880`03bf6000 fffff880`03bff000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04843000 fffff880`0484f000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`018cf000 fffff880`018e2000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`018e2000 fffff880`018ee000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04e69000 fffff880`04f5d000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04f5d000 fffff880`04fa3000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0105d000 fffff880`01071000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01011000 fffff880`0105d000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`05418000 fffff880`05424000   fnetm64  fnetm64.SYS  Fri Sep 25 08:10:37 2009 (4ABCB33D)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0184f000 fffff880`01889000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01142000 fffff880`0118c000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02fef000 fffff800`03038000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04fa3000 fffff880`04fc7000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04304000 fffff880`04360000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`043e3000 fffff880`043fc000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04200000 fffff880`04208080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`043d5000 fffff880`043e3000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0543b000 fffff880`05503000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01412000 fffff880`0141b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02b88000 fffff880`02be2000   IDSFLT64 IDSFLT64.SYS Fri Sep 25 08:06:10 2009 (4ABCB232)
fffff880`01837000 fffff880`0184d000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`02a75000 fffff880`02a98000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`03a5a000 fffff880`03a69000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04287000 fffff880`04295000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9e000 fffff800`00ba8000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04800000 fffff880`04843000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d8000 fffff880`013f2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01593000 fffff880`015be000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`043bf000 fffff880`043c4200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0420b000 fffff880`04220000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`02af5000 fffff880`02b0a000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0422d000 fffff880`04241000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`0141b000 fffff880`0143e000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`043c5000 fffff880`043d5000   LUsbFilt LUsbFilt.Sys Tue Aug 24 13:21:47 2010 (4C73FFAB)
fffff880`00cf5000 fffff880`00d39000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`018ee000 fffff880`018fc000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03be5000 fffff880`03bf4000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04220000 fffff880`0422d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05521000 fffff880`05539000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05539000 fffff880`05566000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05566000 fffff880`055b4000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`055b4000 fffff880`055d7000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019ad000 fffff880`019b8000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fbf000 fffff880`00fc9000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01071000 fffff880`010cf000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01400000 fffff880`01412000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`03a00000 fffff880`03a5a000   n64i1642 n64i1642.sys Thu Feb 18 11:22:39 2010 (4B7D694F)
fffff880`01441000 fffff880`01533000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03b54000 fffff880`03b60000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02b5d000 fffff880`02b70000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03b60000 fffff880`03b8f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`042ef000 fffff880`04304000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d9b000 fffff880`02daa000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d27000 fffff880`02d6c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01533000 fffff880`01593000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02a98000 fffff880`02ad9000   NETTDI64 NETTDI64.SYS Fri Sep 25 08:11:19 2009 (4ABCB367)
fffff880`019b8000 fffff880`019c9000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a13000 fffff800`02fef000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01235000 fffff880`013d8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0193f000 fffff880`01948000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02b0a000 fffff880`02b5d000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d75000 fffff880`02d9b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e0d000 fffff880`00e22000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cda000 fffff880`00ce4000   pavboot64 pavboot64.sys Tue Jun 22 12:19:28 2010 (4C20E290)
fffff880`011d8000 fffff880`011e7000   PavTPK   PavTPK.sys   Thu Apr 29 11:25:25 2010 (4BD9A4E5)
fffff880`00fc9000 fffff880`00ffc000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e93000 fffff880`00e9a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e9a000 fffff880`00eaa000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`058c0000 fffff880`05966000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04360000 fffff880`0439d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`05ca8000 fffff880`05cb2000   Prot6Flt Prot6Flt.sys Wed Jul 09 06:27:18 2008 (48749286)
fffff880`00d39000 fffff880`00d4d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03b30000 fffff880`03b54000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03b8f000 fffff880`03baa000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03baa000 fffff880`03bcb000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03bcb000 fffff880`03be5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01992000 fffff880`0199b000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0199b000 fffff880`019a4000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019a4000 fffff880`019ad000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015c6000 fffff880`01600000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02b70000 fffff880`02b88000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03abf000 fffff880`03afe000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`05966000 fffff880`05971000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03afe000 fffff880`03b0a000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02daa000 fffff880`02dc7000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0192f000 fffff880`0193f000   ShldFlt  ShldFlt.sys  Tue Oct 27 06:04:22 2009 (4AE6C5A6)
fffff880`04279000 fffff880`04287000   skfiltv  skfiltv.sys  Thu Apr 10 04:20:29 2008 (47FDCDCD)
fffff880`02ad9000 fffff880`02af5000   smb      smb.sys      Mon Jul 13 20:09:09 2009 (4A5BCCA5)
fffff880`015be000 fffff880`015c6000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05c12000 fffff880`05ca8000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05800000 fffff880`05867000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05971000 fffff880`0599e000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03bf4000 fffff880`03bf5480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0599e000 fffff880`059b0000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019e7000 fffff880`019f4000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`019c9000 fffff880`019e7000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02de2000 fffff880`02df6000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00560000 fffff960`0056a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`01811000 fffff880`01837000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04fd8000 fffff880`04fea000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0425e000 fffff880`04278c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04241000 fffff880`0425e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04209000 fffff880`0420af00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04fc7000 fffff880`04fd8000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04295000 fffff880`042ef000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03a69000 fffff880`03abf000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e00000 fffff880`00e0d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0194f000 fffff880`0195d000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0195d000 fffff880`01982000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e22000 fffff880`00e37000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e37000 fffff880`00e93000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0118c000 fffff880`011d8000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`05d3e000 fffff880`05d48000   vpnva64  vpnva64.sys  Mon Aug 31 16:08:08 2009 (4A9C2DA8)
fffff880`02dc7000 fffff880`02de2000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01982000 fffff880`01992000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eac000 fffff880`00f50000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f50000 fffff880`00f5f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d6c000 fffff880`02d75000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`0035f000   win32k   win32k.sys   unavailable (00000000)
fffff880`00fb6000 fffff880`00fbf000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`059b0000 fffff880`059c5000   WNMFLT64 WNMFLT64.SYS Fri Sep 25 08:07:56 2009 (4ABCB29C)

Unloaded modules:
fffff880`05cba000 fffff880`05d2b000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`05cb2000 fffff880`05cba000   AsrOcDrv.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
fffff880`018cf000 fffff880`018dd000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018dd000 fffff880`018e9000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018e9000 fffff880`018f2000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`018f2000 fffff880`01905000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Dec 10, 2010
Messages
3
Reaction score
0
BSOD's keep coming

Hi again and many thanks for the help so far.

Regarding the things you pointed out, it sadly didn't help i think. :-(

The first thing i did was uninstalling panda and replacing it with MSE.
I did also uninstal every piece of overclocking software (which i do not use anyway).
And last but not least i did update the drivers you pointed out plus additional drivers, wich i could come in mind of. Furthermore I updatet the BIOS on the mobo.

But for some reason or another the BSOD's still come. But I thought a little bit more about the times, they did happen...
Yesterday I played LOTRO for two hours with high load on both graphics card, cpu and memory without any problems. But when i choosed to exit the game, a BSOD followed. I kept thinking about that most BSOD's happen, when I close / start programs or click to open menu's in the programs. But the BSOD's also happen, while the computer is working, like a antivirus scan or so.
The othing thing is that in the most crashes apparently "ntoskrnl.exe" is the culprint.

But either way, i'm uploading the newest dump files, and hope it could help to find out whats wrong with my PC. =)
 

Attachments

cybercore

VIP Member
Joined
Sep 22, 2010
Messages
613
Reaction score
102
1. Uninstalled Panda - yes but not completely, you still have Panda Boot Driver loaded in RAM:

pavboot64.sys Tue Jun 22 12:19:28

Did you use the tool I linked to? Navigate to C:\Windows\system32\drivers and delete pavboot64.sys. If it's not there then it's somewhere else on your system partition - search disk C.



2. Update Creative Audio Driver:

skfiltv.sys Thu Apr 10 04:20:29 2008


3. Check for update for Logitech Setpoint.


Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121210-25734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a15000 PsLoadedModuleList = 0xfffff800`02c52e50
Debug session time: Sun Dec 12 06:06:53.023 2010 (UTC - 5:00)
System Uptime: 0 days 2:01:22.257
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff28004d80030, 0, fffff80002aa139c, 7}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ObReferenceObjectSafe+c )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff28004d80030, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002aa139c, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbd0e0
 fffff28004d80030 

FAULTING_IP: 
nt!ObReferenceObjectSafe+c
fffff800`02aa139c 498b02          mov     rax,qword ptr [r10]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  SetPoint.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006fb9530 -- (.trap 0xfffff88006fb9530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80046e65f0 rbx=0000000000000000 rcx=fffff28004d80060
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa139c rsp=fffff88006fb96c0 rbp=fffff88006fb9ca0
 r8=0000000000000000  r9=00000000021556d0 r10=fffff28004d80030
r11=fffffa8004cca930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ObReferenceObjectSafe+0xc:
fffff800`02aa139c 498b02          mov     rax,qword ptr [r10] ds:6d10:fffff280`04d80030=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b04849 to fffff80002a85740

STACK_TEXT:  
fffff880`06fb93c8 fffff800`02b04849 : 00000000`00000050 fffff280`04d80030 00000000`00000000 fffff880`06fb9530 : nt!KeBugCheckEx
fffff880`06fb93d0 fffff800`02a8382e : 00000000`00000000 fffff280`04d80060 fffffa80`04dbaa00 fffff800`02d2dcd3 : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`06fb9530 fffff800`02aa139c : 00000000`00000000 00000000`021559c8 fffffa80`04c20060 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`06fb96c0 fffff800`02d1cb26 : fffff880`06fb9ca0 fffffa80`046e65f0 fffffa80`046e6a10 00000000`021555d0 : nt!ObReferenceObjectSafe+0xc
fffff880`06fb96f0 fffff800`02d83116 : 00000000`02140000 00000402`00010000 fffff880`06fb9880 00000000`00000000 : nt!ExpGetProcessInformation+0x498
fffff880`06fb9840 fffff800`02d841e5 : 00000000`02140000 fffff960`00133bb7 00000000`0012f570 00000000`000808de : nt!ExpQuerySystemInformation+0xf14
fffff880`06fb9be0 fffff800`02a84993 : fffffa80`0527eb60 00000000`00000002 00000000`00000020 fffffa80`052ad670 : nt!NtQuerySystemInformation+0x4d
fffff880`06fb9c20 00000000`77a300ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012f3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a300ba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ObReferenceObjectSafe+c
fffff800`02aa139c 498b02          mov     rax,qword ptr [r10]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ObReferenceObjectSafe+c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x50_nt!ObReferenceObjectSafe+c

BUCKET_ID:  X64_0x50_nt!ObReferenceObjectSafe+c

Followup: MachineOwner
---------

0: kd> lmsmtn
start             end                 module name
fffff880`00f32000 fffff880`00f89000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c84000 fffff880`02d0e000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04124000 fffff880`0413a000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c4d000 fffff880`00c58000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`05e00000 fffff880`05e0b000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c1a000 fffff880`00c23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c23000 fffff880`00c4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`042da000 fffff880`042fa000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`04808000 fffff880`04ffd000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
fffff880`03e2b000 fffff880`03e76000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
fffff880`0190d000 fffff880`01914000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`019b9000 fffff880`019ca000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03b3d000 fffff880`03b5b000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018ad000 fffff880`018d7000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d2b000 fffff880`00deb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01847000 fffff880`01877000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ccd000 fffff880`00d2b000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01185000 fffff880`011f8000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04114000 fffff880`04124000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`057e6000 fffff880`057f4000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02ddd000 fffff880`02dfb000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`013db000 fffff880`013f1000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04337000 fffff880`04359000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05600000 fffff880`05609000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`057f4000 fffff880`05800000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05609000 fffff880`0561c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0402e000 fffff880`0403a000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e76000 fffff880`03f6a000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03f6a000 fffff880`03fb0000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`05e26000 fffff880`05e5c000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01113000 fffff880`01127000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010c7000 fffff880`01113000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d1000 fffff880`013db000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ff1000 fffff800`0303a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03fb0000 fffff880`03fd4000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`043b3000 fffff880`043cc000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`043cc000 fffff880`043d4080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`043a5000 fffff880`043b3000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03a75000 fffff880`03b3d000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015ec000 fffff880`015f5000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01800000 fffff880`01816000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01877000 fffff880`0189a000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`04000000 fffff880`0400f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04020000 fffff880`0402e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bbe000 fffff800`00bc8000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04216000 fffff880`04259000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013a6000 fffff880`013c0000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015af000 fffff880`015da000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04359000 fffff880`0435e200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`043d5000 fffff880`043ea000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`03fe5000 fffff880`03ffa000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04200000 fffff880`04214000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`03e00000 fffff880`03e23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c75000 fffff880`00cb9000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0403a000 fffff880`04048000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0400f000 fffff880`0401e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`043ea000 fffff880`043f7000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`018d7000 fffff880`01904000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`05f7c000 fffff880`05f8c000   MpNWMon  MpNWMon.sys  Sat Mar 20 01:58:00 2010 (4BA463E8)
fffff880`03b5b000 fffff880`03b73000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03b73000 fffff880`03ba0000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03ba0000 fffff880`03bee000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03a00000 fffff880`03a23000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01972000 fffff880`0197d000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f92000 fffff880`00f9c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01127000 fffff880`01185000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015da000 fffff880`015ec000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0145d000 fffff880`0154f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0415e000 fffff880`0416a000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0416a000 fffff880`04199000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`042c5000 fffff880`042da000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d82000 fffff880`02d91000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d0e000 fffff880`02d53000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0154f000 fffff880`015af000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0197d000 fffff880`0198e000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a15000 fffff800`02ff1000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01203000 fffff880`013a6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01904000 fffff880`0190d000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d5c000 fffff880`02d82000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fdc000 fffff880`00ff1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ff1000 fffff880`00ffb000   pavboot64 pavboot64.sys Tue Jun 22 12:19:28 2010 (4C20E290)
fffff880`00f9c000 fffff880`00fcf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e71000 fffff880`00e78000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00deb000 fffff880`00dfb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c0000 fffff880`013d1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`058ee000 fffff880`05994000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`042fa000 fffff880`04337000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cb9000 fffff880`00ccd000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0413a000 fffff880`0415e000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04199000 fffff880`041b4000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`041b4000 fffff880`041d5000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`041d5000 fffff880`041ef000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01957000 fffff880`01960000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01960000 fffff880`01969000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01969000 fffff880`01972000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`00c58000 fffff880`00c70000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`040a3000 fffff880`04108000   Rt64win7 Rt64win7.sys Mon Oct 25 05:33:07 2010 (4CC54ED3)
fffff880`05994000 fffff880`0599f000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04108000 fffff880`04114000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d91000 fffff880`02dae000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`04397000 fffff880`043a5000   skfiltv  skfiltv.sys  Thu Apr 10 04:20:29 2008 (47FDCDCD)
fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05ee6000 fffff880`05f7c000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05800000 fffff880`05867000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0599f000 fffff880`059cc000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0401e000 fffff880`0401f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`059cc000 fffff880`059de000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019ac000 fffff880`019b9000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0198e000 fffff880`019ac000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dc9000 fffff880`02ddd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`019ca000 fffff880`019f0000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04259000 fffff880`0426b000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0437c000 fffff880`04396c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0435f000 fffff880`0437c000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0561c000 fffff880`0561df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fd4000 fffff880`03fe5000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0426b000 fffff880`042c5000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0404d000 fffff880`040a3000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fcf000 fffff880`00fdc000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01914000 fffff880`01922000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`05625000 fffff880`057e6000   viahduaa viahduaa.sys Wed Aug 04 03:51:53 2010 (4C591C19)
fffff880`01922000 fffff880`01947000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02dae000 fffff880`02dc9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01947000 fffff880`01957000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e7f000 fffff880`00f23000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f23000 fffff880`00f32000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d53000 fffff880`02d5c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003bf000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`00f89000 fffff880`00f92000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01816000 fffff880`01837000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`05e8d000 fffff880`05e96000   pcwiz_x64.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`05e5c000 fffff880`05e8d000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`05e0b000 fffff880`05e26000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`05f8c000 fffff880`05ffd000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`041ef000 fffff880`041f9000   vpnva64.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`01877000 fffff880`01885000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01885000 fffff880`01891000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01891000 fffff880`0189a000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`0189a000 fffff880`018ad000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Last edited:
Joined
Dec 10, 2010
Messages
3
Reaction score
0
Still BSOD's :(

Hi again

I first forgot to use the tool you linked to. But I used it a few days ago, actually removed the creative audio drivers and I have the newest Setpoint software.

For a few days, the BSOD's didn't come so often, but they happen more frquently again. I'm about to think that the problem may be bad ram. I already did some memory testing, but with no findings. I will try to test 'harder'.

Until then I post the newest dumpfiles. Thanks for the help. =)
 

Attachments

Ad

Advertisements

cybercore

VIP Member
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Your 3 most recent crash records show this:

Code:
121910-14703-01.dmp
BugCheck DE, {2, fffff8a00979f5a0, fffff8a00979f3a3, 256d48c0}
[B]POOL_CORRUPTION_IN_FILE_AREA (de)
A driver corrupted pool memory used for holding pages destined for disk.[/B]
PROCESS_NAME:  explorer.exe
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2d260 )

-------------------

121910-17656-01.dmp
BugCheck 50, {ffffffffffffffff, 0, ffffffffffffffff, 0}
[B]PAGE_FAULT_IN_NONPAGED_AREA (50)[/B]
Invalid system memory was referenced.
PROCESS_NAME:  VDeck.exe (VIA HD Audio CPL)
Probably caused by : dxgkrnl.sys ( dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>::Clear+42 )

-------------------

121810-15734-01.dmp
BugCheck D1, {40, 2, 0, fffff880040e1507}
[B]DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)[/B]
This is usually
caused by drivers using improper addresses.
PROCESS_NAME:  System
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_ProcessNeoStateChangeList+9f )


1. Your drivers are in excellent shape now except this one:

skfiltv.sys Thu Apr 10 04:20:29 2008
Creative Audio Driver


Navigate to C:\Windows\system32\drivers and rename skfiltv.sys to skfiltv.bak - so it doesn't get loaded in RAM.


2. If it crashes again, attach the latest crash dump(s) and check your memory settings with CPU-Z. Run memtest overnight:

https://www.w7forums.com/memtest86-memory-testing-t9067.html



Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-15734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a67000 PsLoadedModuleList = 0xfffff800`02ca4e50
Debug session time: Sat Dec 18 15:52:11.944 2010 (UTC - 5:00)
System Uptime: 0 days 4:44:10.163
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {40, 2, 0, fffff880040e1507}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_ProcessNeoStateChangeList+9f )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880040e1507, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0f0e0
 0000000000000040 

CURRENT_IRQL:  2

FAULTING_IP: 
USBPORT!USBPORT_ProcessNeoStateChangeList+9f
fffff880`040e1507 4c8b4540        mov     r8,qword ptr [rbp+40h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f8ca70 -- (.trap 0xfffff88002f8ca70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8004db0a00
rdx=000000003c40a895 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880040e1507 rsp=fffff88002f8cc00 rbp=0000000000000000
 r8=fffffa8004db5280  r9=0000000000000000 r10=000000000001b122
r11=000000000002625a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
USBPORT!USBPORT_ProcessNeoStateChangeList+0x9f:
fffff880`040e1507 4c8b4540        mov     r8,qword ptr [rbp+40h] ss:0018:00000000`00000040=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ad6ca9 to fffff80002ad7740

STACK_TEXT:  
fffff880`02f8c928 fffff800`02ad6ca9 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8c930 fffff800`02ad5920 : fffffa80`05219dc0 00001f80`00f600c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f8ca70 fffff880`040e1507 : 00000000`ffffffff fffffa80`04db0050 fffffa80`04db01a0 00001f80`00f600c0 : nt!KiPageFault+0x260
fffff880`02f8cc00 fffff880`041074ef : fffffa80`04db01a0 3d588593`3de77501 fffffa80`04db01a0 fffffa80`04db01a0 : USBPORT!USBPORT_ProcessNeoStateChangeList+0x9f
fffff880`02f8cc70 fffff800`02ae2bfc : fffff880`02f64180 fffffa80`04db0050 fffffa80`04db1178 00000000`00000000 : USBPORT!USBPORT_IsrDpc+0x1f3
fffff880`02f8ccd0 fffff800`02adfeea : fffff880`02f64180 fffff880`02f6efc0 00000000`00000000 fffff880`041072fc : nt!KiRetireDpcList+0x1bc
fffff880`02f8cd80 00000000`00000000 : fffff880`02f8d000 fffff880`02f87000 fffff880`02f8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
USBPORT!USBPORT_ProcessNeoStateChangeList+9f
fffff880`040e1507 4c8b4540        mov     r8,qword ptr [rbp+40h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBPORT!USBPORT_ProcessNeoStateChangeList+9f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc07

FAILURE_BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_ProcessNeoStateChangeList+9f

BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_ProcessNeoStateChangeList+9f

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-17656-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1c000 PsLoadedModuleList = 0xfffff800`02c59e50
Debug session time: Sun Dec 19 03:11:05.493 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:58.665
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffffffffffffff, 0, ffffffffffffffff, 0}


Could not read faulting driver name
Probably caused by : dxgkrnl.sys ( dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>::Clear+42 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffffffffffffffff, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc40e0
 ffffffffffffffff 

FAULTING_IP: 
+3730653162626364
ffffffff`ffffffff ??              ???

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  VDeck.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88006f59680 -- (.trap 0xfffff88006f59680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88001a775f0 rbx=0000000000000000 rcx=fffff8a0034b5900
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffffffffffffff rsp=fffff88006f59818 rbp=fffff88003a773f8
 r8=0000000000013060  r9=0000000000000080 r10=fffff80002a1c000
r11=000000000000079c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffffff`ffffffff ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b0cf14 to fffff80002a8c740

FAILED_INSTRUCTION_ADDRESS: 
+3730653162626364
ffffffff`ffffffff ??              ???

STACK_TEXT:  
fffff880`06f59518 fffff800`02b0cf14 : 00000000`00000050 ffffffff`ffffffff 00000000`00000000 fffff880`06f59680 : nt!KeBugCheckEx
fffff880`06f59520 fffff800`02a8a82e : 00000000`00000000 fffff8a0`03483b50 fffff880`06f59700 fffff800`02bbdceb : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`06f59680 ffffffff`ffffffff : fffff880`03a6b646 00000000`000007ff 00000000`000000b0 fffff8a0`034b7840 : nt!KiPageFault+0x16e
fffff880`06f59818 fffff880`03a6b646 : 00000000`000007ff 00000000`000000b0 fffff8a0`034b7840 00000000`00000801 : 0xffffffff`ffffffff
fffff880`06f59820 fffff880`03a6b7c7 : 00000000`000007ff fffff8a0`03483b20 fffff8a0`034717c0 00000000`00000000 : dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>::Clear+0x42
fffff880`06f59850 fffff880`03a6b6dc : 00000000`00000001 fffff8a0`03471790 fffff880`03a773f8 fffff880`03a773f8 : dxgkrnl!DMMVIDPNTARGETMODESET::~DMMVIDPNTARGETMODESET+0xbf
fffff880`06f59880 fffff880`03a65e34 : 00000000`00000000 00000000`00000001 fffff8a0`4e506456 fffff880`00000798 : dxgkrnl!DMMVIDPNSOURCEMODESET::`scalar deleting destructor'+0x14
fffff880`06f598b0 fffff880`03a6f035 : fffff8a0`03486680 fffff8a0`034b7850 fffffa80`054ea010 00000000`00000000 : dxgkrnl!ReferenceCounted::Release+0x20
fffff880`06f598e0 fffff880`03a6eea4 : 00000000`000007ff 00000000`00000001 00000000`00000000 00000000`00000798 : dxgkrnl!DMMVIDPNSOURCE::~DMMVIDPNSOURCE+0x165
fffff880`06f59910 fffff880`03a6f4ae : fffff8a0`0347c1e8 fffff8a0`03489c40 fffffa80`054ea010 00000000`00000000 : dxgkrnl!DMMVIDPNSOURCE::`vector deleting destructor'+0x14
fffff880`06f59940 fffff880`03a6f583 : 00000000`00000005 00000000`00000001 00000000`4e506456 00000000`00000798 : dxgkrnl!DoublyLinkedList<DMMVIDPNTARGET>::Clear+0x42
fffff880`06f59970 fffff880`03b1ca1a : fffff8a0`034b6660 fffff8a0`034b6660 00000000`00000000 fffffa80`054ea010 : dxgkrnl!DMMVIDPNTARGETSET::`scalar deleting destructor'+0x63
fffff880`06f599a0 fffff880`03a6d350 : fffff880`fffffdfc 00000000`00000001 00000000`00000000 fffff880`03ad45ee : dxgkrnl!DMMVIDPN::~DMMVIDPN+0x262
fffff880`06f599e0 fffff880`03a65e34 : 00000000`00000000 fffffa80`054ea010 fffff880`06f59b60 fffffa80`054eb000 : dxgkrnl!DMMVIDPN::`vector deleting destructor'+0x14
fffff880`06f59a10 fffff880`03ad4970 : fffff8a0`034b6660 00000000`00000000 00000000`00000000 fffffa80`054ea010 : dxgkrnl!ReferenceCounted::Release+0x20
fffff880`06f59a40 fffff880`03abcb5d : fffff900`c1cb0100 fffffa80`00000001 fffffa80`00000001 fffff960`00000001 : dxgkrnl!CalcActivePathDisplayConfigBufferSizeCallback+0x1c0
fffff880`06f59ae0 fffff880`03ad4a71 : 00000000`00000001 fffff880`06f59c38 fffff880`06f59be0 fffffa80`06233b60 : dxgkrnl!DXGGLOBAL::IterateAdaptersWithCallback+0x71
fffff880`06f59b40 fffff960`0029de2b : 00000000`00000000 00000000`00000002 fffff880`06f59ca0 fffff880`06f59c38 : dxgkrnl!DxgkGetDisplayConfigBufferSizes+0xc5
fffff880`06f59b90 fffff960`001c0add : fffff900`ffffc8cc 00000000`00000000 00000000`08f9f548 00000000`00000000 : win32k!DrvGetDisplayConfigBufferSizes+0xcb
fffff880`06f59bc0 fffff800`02a8b993 : fffffa80`06233b60 00000000`08f9f628 00000000`00000020 00000000`00000000 : win32k!NtUserGetDisplayConfigBufferSizes+0x89
fffff880`06f59c20 00000000`773c725a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`08f9f498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773c725a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>::Clear+42
fffff880`03a6b646 48391b          cmp     qword ptr [rbx],rbx

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>::Clear+42

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ac5509e

FAILURE_BUCKET_ID:  X64_0x50_CODE_AV_BAD_IP_dxgkrnl!DoublyLinkedList_DMMVIDPNSOURCEMODE_::Clear+42

BUCKET_ID:  X64_0x50_CODE_AV_BAD_IP_dxgkrnl!DoublyLinkedList_DMMVIDPNSOURCEMODE_::Clear+42

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-14703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a4e000 PsLoadedModuleList = 0xfffff800`02c8be50
Debug session time: Sun Dec 19 04:26:56.310 2010 (UTC - 5:00)
System Uptime: 0 days 0:25:46.513
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck DE, {2, fffff8a00979f5a0, fffff8a00979f3a3, 256d48c0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2d260 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

POOL_CORRUPTION_IN_FILE_AREA (de)
A driver corrupted pool memory used for holding pages destined for disk.
This was discovered by the memory manager when dereferencing the file.
Arguments:
Arg1: 0000000000000002
Arg2: fffff8a00979f5a0
Arg3: fffff8a00979f3a3
Arg4: 00000000256d48c0

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xDE

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002a633f3 to fffff80002abe740

STACK_TEXT:  
fffff880`07d8ca28 fffff800`02a633f3 : 00000000`000000de 00000000`00000002 fffff8a0`0979f5a0 fffff8a0`0979f3a3 : nt!KeBugCheckEx
fffff880`07d8ca30 fffff800`02aa3b82 : 00000000`00000000 fffffa80`04478500 00000000`00000000 fffff880`07d8cc00 : nt! ?? ::FNODOBFM::`string'+0x2d260
fffff880`07d8cb20 fffff800`02a904e1 : fffffa80`06299280 fffff880`02f647f0 00000028`00000000 fffff800`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`07d8cb90 fffff800`02ae3076 : fffffa80`04478500 fffff880`02f647f0 00000000`00000001 fffffa80`04478500 : nt!CcPurgeAndClearCacheSection+0x75
fffff880`07d8cc40 fffff880`01264f5c : 00000000`314a0000 00000000`314a0000 fffff8a0`08a5d140 fffffa80`04b07180 : nt!CcSetFileSizesEx+0x2c6
fffff880`07d8ccc0 fffff880`012dc6a0 : 00000000`00000000 7fffffff`ffffffff 00000000`000314a0 00000000`00000000 : Ntfs!NtfsSetBothCacheSizes+0x50
fffff880`07d8cd20 fffff880`012ca8dd : fffff880`07d8d730 fffffa80`043fb620 00000000`00000001 00000000`00000000 : Ntfs!NtfsDeleteAllocation+0x2cc
fffff880`07d8ce00 fffff880`012d7212 : fffff880`07d8d730 00000000`00000001 fffff980`0b736438 00000000`00000001 : Ntfs!NtfsDeleteAllocationFromRecord+0x16d
fffff880`07d8cec0 fffff880`012f0c0a : fffff880`07d8d730 fffff8a0`08a5d010 fffff8a0`0abaf9d0 fffff880`07d8d1bc : Ntfs!NtfsDeleteFile+0x346
fffff880`07d8d140 fffff880`0125eaa9 : fffffa80`04a29c68 fffffa80`04a29c68 fffff880`07d8d690 fffff880`07d7c000 : Ntfs!NtfsCommonCleanup+0x15da
fffff880`07d8d550 fffff800`02acde5a : fffff880`07d8d690 fffffa80`04a2aa80 fffff8a0`07e529d8 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`07d8d580 fffff880`0125e662 : fffff880`0125ea90 fffff880`07d8d690 fffff880`07d8d900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`07d8d660 fffff880`01300244 : fffff880`07d8d730 fffff880`07d8d730 fffff880`07d8d730 00000000`00000000 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`07d8d6d0 fffff880`0103823f : fffff880`07d8d730 fffffa80`04d6cab0 fffffa80`04d6ce50 fffffa80`04382010 : Ntfs!NtfsFsdCleanup+0x144
fffff880`07d8d940 fffff880`010366df : fffffa80`049af950 00000000`00000000 fffffa80`03ab9200 fffffa80`04d6cab0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`07d8d9d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltpDispatch+0xcf


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+2d260
fffff800`02a633f3 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2d260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xDE_nt!_??_::FNODOBFM::_string_+2d260

BUCKET_ID:  X64_0xDE_nt!_??_::FNODOBFM::_string_+2d260

Followup: MachineOwner
---------

2: kd> lmsmtn


Drivers:

Code:
start             end                 module name
fffff880`00ed2000 fffff880`00f29000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cfb000 fffff880`02d85000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c72000 fffff880`03c88000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0102a000 fffff880`01035000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`05bc5000 fffff880`05bd0000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fd7000 fffff880`00fe0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0102a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04324000 fffff880`04344000   AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`04807000 fffff880`04ffc000   atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
fffff880`03b1a000 fffff880`03b65000   atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
fffff880`01984000 fffff880`0198b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0183c000 fffff880`0184d000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02bdb000 fffff880`02bf9000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`01924000 fffff880`0194e000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cd0000 fffff880`00d90000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018be000 fffff880`018ee000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c72000 fffff880`00cd0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010f3000 fffff880`01166000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03c62000 fffff880`03c72000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`057d0000 fffff880`057de000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02cd2000 fffff880`02cf0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02cc3000 fffff880`02cd2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`018a8000 fffff880`018be000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04381000 fffff880`043a3000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`057ea000 fffff880`057f3000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`057de000 fffff880`057ea000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043a9000 fffff880`043bc000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`057f3000 fffff880`057ff000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c8e000 fffff880`03d82000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03d82000 fffff880`03dc8000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01081000 fffff880`01095000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01035000 fffff880`01081000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0186e000 fffff880`018a8000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015b0000 fffff880`015fa000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a05000 fffff800`02a4e000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03dc8000 fffff880`03dec000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0421c000 fffff880`04235000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05602000 fffff880`0560a080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0420e000 fffff880`0421c000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02b13000 fffff880`02bdb000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0141a000 fffff880`01423000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03b04000 fffff880`03b1a000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`02ac3000 fffff880`02ae6000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`03a85000 fffff880`03a94000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03ab7000 fffff880`03ac5000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba5000 fffff800`00baf000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04260000 fffff880`042a3000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01585000 fffff880`015b0000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`043a3000 fffff880`043a8200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04235000 fffff880`0424a000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`02ae6000 fffff880`02afb000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03aa3000 fffff880`03ab7000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`018ee000 fffff880`01911000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c1a000 fffff880`00c5e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`03ac5000 fffff880`03ad3000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03a94000 fffff880`03aa3000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0424a000 fffff880`04257000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fbd000 fffff880`00fd7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0194e000 fffff880`0197b000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`05b44000 fffff880`05b54000   MpNWMon  MpNWMon.sys  Sat Mar 20 01:58:00 2010 (4BA463E8)
fffff880`02a00000 fffff880`02a18000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02a18000 fffff880`02a45000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02a45000 fffff880`02a93000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`02a93000 fffff880`02ab6000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019e9000 fffff880`019f4000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f32000 fffff880`00f3c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01095000 fffff880`010f3000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02cb8000 fffff880`02cc3000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01408000 fffff880`0141a000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01433000 fffff880`01525000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03bee000 fffff880`03bfa000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03a00000 fffff880`03a2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0430f000 fffff880`04324000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c00000 fffff880`02c0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d85000 fffff880`02dca000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01525000 fffff880`01585000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01800000 fffff880`01811000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02cac000 fffff880`02cb8000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a4e000 fffff800`0302a000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0124d000 fffff880`013f0000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0197b000 fffff880`01984000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02dd3000 fffff880`02df9000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f7c000 fffff880`00f91000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f3c000 fffff880`00f6f000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fa6000 fffff880`00fad000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fad000 fffff880`00fbd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0583a000 fffff880`058e0000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04344000 fffff880`04381000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5e000 fffff880`00c72000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03bca000 fffff880`03bee000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03a2f000 fffff880`03a4a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03a4a000 fffff880`03a6b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03a6b000 fffff880`03a85000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c5b000 fffff880`02cac000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019ce000 fffff880`019d7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019d7000 fffff880`019e0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e0000 fffff880`019e9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011b2000 fffff880`011ec000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02afb000 fffff880`02b13000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03b65000 fffff880`03bca000   Rt64win7 Rt64win7.sys Mon Oct 25 05:33:07 2010 (4CC54ED3)
fffff880`058e0000 fffff880`058eb000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03c56000 fffff880`03c62000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02c0f000 fffff880`02c2c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`04200000 fffff880`0420e000   skfiltv  skfiltv.sys  Thu Apr 10 04:20:29 2008 (47FDCDCD)
fffff880`01400000 fffff880`01408000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05aae000 fffff880`05b44000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0592a000 fffff880`05991000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`058eb000 fffff880`05918000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03c88000 fffff880`03c89480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05918000 fffff880`0592a000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0182f000 fffff880`0183c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01811000 fffff880`0182f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c47000 fffff880`02c5b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00420000 fffff960`0042a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03ade000 fffff880`03b04000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`042a3000 fffff880`042b5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`043d9000 fffff880`043f3c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`043bc000 fffff880`043d9000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05600000 fffff880`05601f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03dec000 fffff880`03dfd000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042b5000 fffff880`0430f000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03c00000 fffff880`03c56000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f6f000 fffff880`00f7c000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0198b000 fffff880`01999000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0560f000 fffff880`057d0000   viahduaa viahduaa.sys Wed Aug 04 03:51:53 2010 (4C591C19)
fffff880`01999000 fffff880`019be000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f91000 fffff880`00fa6000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d90000 fffff880`00dec000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01166000 fffff880`011b2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c2c000 fffff880`02c47000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019be000 fffff880`019ce000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e1f000 fffff880`00ec3000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec3000 fffff880`00ed2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dca000 fffff880`02dd3000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`00390000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`00f29000 fffff880`00f32000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0184d000 fffff880`0186e000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`05b54000 fffff880`05bc5000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`018ee000 fffff880`018fc000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018fc000 fffff880`01908000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01908000 fffff880`01911000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01911000 fffff880`01924000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Ad

Advertisements


Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top