New Comp. Build, random BSOD's. Please Help!


  1. Posts : 14
    Windows 7 Professional 64 Bit
       #1

    New Comp. Build, random BSOD's. Please Help!


    I just put together my new rig today. Everything runs fast and smooth until I randomly get the awful BSOD . It seems to happen every time I try installing software to my storage drive. I'm not a wiz at this stuff, any help is greatly appreciated! Attached are some reports. Thanks in advance!!
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    It's Bugcheck D1 (driver irq not less or equal) caused by your Intel based Ethernet Adapter:


    e1q62x64.sys Thu Nov 05 20:23:03 2009

    Update it:

    Intel® Driver Update Utility
    http://downloadcenter.intel.com/


    Let me go through other stuff, hold on ...
      My Computer


  3. Posts : 670
    Windows 7 x64
       #3

    All your dumps point to this persistent BugCheck D1 {8, 2, ...} caused by e1q62x64.sys.


    Try to update these two:

    e1q62x64.sys Thu Nov 05 20:23:03 2009
    Intel based Ethernet Adapter

    AsUpIO.sys Mon Jul 06 05:21:38 2009
    ASUS driver, probably a utility like ASUS Probe


    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100910-12807-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0304e000 PsLoadedModuleList = 0xfffff800`0328be50
    Debug session time: Sun Oct 10 08:58:34.811 2010 (GMT-5)
    System Uptime: 0 days 0:03:03.122
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {8, 2, 0, fffff8800167a7c0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for e1q62x64.sys
    *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
    Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800167a7c0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f60e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip!IpFlcReceivePreValidatedPackets+270
    fffff880`0167a7c0 440fb63401      movzx   r14d,byte ptr [rcx+rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88008e26f90 -- (.trap 0xfffff88008e26f90)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
    rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800167a7c0 rsp=fffff88008e27120 rbp=fffffa80086724e0
     r8=0000000000000006  r9=0000000000000007 r10=0000000000000007
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    tcpip!IpFlcReceivePreValidatedPackets+0x270:
    fffff880`0167a7c0 440fb63401      movzx   r14d,byte ptr [rcx+rax] ds:00000000`00000008=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030bf469 to fffff800030bff00
    
    STACK_TEXT:  
    fffff880`08e26e48 fffff800`030bf469 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`08e26e50 fffff800`030be0e0 : 00000000`00000000 00000000`00000000 fffff880`01765128 fffffa80`09af3080 : nt!KiBugCheckDispatch+0x69
    fffff880`08e26f90 fffff880`0167a7c0 : 00000000`00005000 fffff880`08e265c0 fffffa80`06d45000 00000000`00000002 : nt!KiPageFault+0x260
    fffff880`08e27120 fffff880`01672682 : fffffa80`089d8740 fffffa80`08a28010 00000000`00000006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
    fffff880`08e27280 fffff800`030cf64a : 00000000`00000000 fffff880`08e22000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
    fffff880`08e272d0 fffff880`016720e2 : fffff880`016725e0 fffff880`08e273e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`08e273b0 fffff880`0156f0eb : fffffa80`08a29010 00000000`00000000 fffffa80`081351a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`08e27420 fffff880`01538fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`08e27490 fffff880`014b2ef1 : fffffa80`081351a0 00000000`00000002 00000000`0000000a fffff880`0156f5ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`08e27910 fffff880`0187a219 : fffffa80`0859e000 fffffa80`085f64e0 fffffa80`085f6450 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`08e27960 fffffa80`0859e000 : fffffa80`085f64e0 fffffa80`085f6450 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
    fffff880`08e27968 fffffa80`085f64e0 : fffffa80`085f6450 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`0859e000
    fffff880`08e27970 fffffa80`085f6450 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`085a2500 : 0xfffffa80`085f64e0
    fffff880`08e27978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`085a2500 fffff880`0187a3b4 : 0xfffffa80`085f6450
    fffff880`08e27980 fffffa80`00000801 : 00000000`00000009 fffffa80`085a2500 fffff880`0187a3b4 fffffa80`08691300 : 0xa
    fffff880`08e27988 00000000`00000009 : fffffa80`085a2500 fffff880`0187a3b4 fffffa80`08691300 fffffa80`085f64e0 : 0xfffffa80`00000801
    fffff880`08e27990 fffffa80`085a2500 : fffff880`0187a3b4 fffffa80`08691300 fffffa80`085f64e0 fffffa80`08691350 : 0x9
    fffff880`08e27998 fffff880`0187a3b4 : fffffa80`08691300 fffffa80`085f64e0 fffffa80`08691350 00000000`0000000a : 0xfffffa80`085a2500
    fffff880`08e279a0 fffffa80`08691300 : fffffa80`085f64e0 fffffa80`08691350 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
    fffff880`08e279a8 fffffa80`085f64e0 : fffffa80`08691350 00000000`0000000a 0000000a`00000000 fffffa80`086912c0 : 0xfffffa80`08691300
    fffff880`08e279b0 fffffa80`08691350 : 00000000`0000000a 0000000a`00000000 fffffa80`086912c0 00000000`00000000 : 0xfffffa80`085f64e0
    fffff880`08e279b8 00000000`0000000a : 0000000a`00000000 fffffa80`086912c0 00000000`00000000 fffff880`08e27c18 : 0xfffffa80`08691350
    fffff880`08e279c0 0000000a`00000000 : fffffa80`086912c0 00000000`00000000 fffff880`08e27c18 00000000`00000000 : 0xa
    fffff880`08e279c8 fffffa80`086912c0 : 00000000`00000000 fffff880`08e27c18 00000000`00000000 fffffa80`080f9140 : 0xa`00000000
    fffff880`08e279d0 00000000`00000000 : fffff880`08e27c18 00000000`00000000 fffffa80`080f9140 00000000`00000000 : 0xfffffa80`086912c0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    e1q62x64+21219
    fffff880`0187a219 ??              ???
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  e1q62x64+21219
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: e1q62x64
    
    IMAGE_NAME:  e1q62x64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4af31807
    
    FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101010-10857-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`0300e000 PsLoadedModuleList = 0xfffff800`0324be50
    Debug session time: Sun Oct 10 11:08:50.680 2010 (GMT-5)
    System Uptime: 0 days 0:02:36.007
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {8, 2, 0, fffff8800167ef60}
    
    Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for e1q62x64.sys
    *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
    Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800167ef60, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b60e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip!IpFlcReceivePreValidatedPackets+270
    fffff880`0167ef60 440fb63401      movzx   r14d,byte ptr [rcx+rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88008dc9f90 -- (.trap 0xfffff88008dc9f90)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
    rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800167ef60 rsp=fffff88008dca120 rbp=fffffa80085b4d50
     r8=0000000000000006  r9=0000000000000010 r10=0000000000000010
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    tcpip!IpFlcReceivePreValidatedPackets+0x270:
    fffff880`0167ef60 440fb63401      movzx   r14d,byte ptr [rcx+rax] ds:0001:00000000`00000008=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000307dca9 to fffff8000307e740
    
    STACK_TEXT:  
    fffff880`08dc9e48 fffff800`0307dca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`08dc9e50 fffff800`0307c920 : fffffa80`0857be20 00000000`00000000 fffff880`01767128 fffffa80`078c2f70 : nt!KiBugCheckDispatch+0x69
    fffff880`08dc9f90 fffff880`0167ef60 : fffffa80`07ff81a0 fffffa80`08906000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`08dca120 fffff880`01676e22 : fffffa80`08907740 fffffa80`08906010 fffffa80`08900006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
    fffff880`08dca280 fffff800`0308de5a : 00000000`00000000 fffff880`08dc5000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
    fffff880`08dca2d0 fffff880`01676882 : fffff880`01676d80 fffff880`08dca3e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`08dca3b0 fffff880`0155c0eb : fffffa80`089068d0 00000000`00000000 fffffa80`07ff81a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`08dca420 fffff880`01525fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`08dca490 fffff880`0149fef1 : fffffa80`07ff81a0 00000000`00000002 00000000`0000000a fffff880`0155c5ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`08dca910 fffff880`02cac219 : fffffa80`08421000 fffffa80`084ebd50 fffffa80`085a0c70 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`08dca960 fffffa80`08421000 : fffffa80`084ebd50 fffffa80`085a0c70 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
    fffff880`08dca968 fffffa80`084ebd50 : fffffa80`085a0c70 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`08421000
    fffff880`08dca970 fffffa80`085a0c70 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`08425500 : 0xfffffa80`084ebd50
    fffff880`08dca978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`08425500 fffff880`02cac3b4 : 0xfffffa80`085a0c70
    fffff880`08dca980 fffffa80`00000801 : 00000000`00000009 fffffa80`08425500 fffff880`02cac3b4 fffffa80`086a0000 : 0xa
    fffff880`08dca988 00000000`00000009 : fffffa80`08425500 fffff880`02cac3b4 fffffa80`086a0000 fffffa80`084ebd50 : 0xfffffa80`00000801
    fffff880`08dca990 fffffa80`08425500 : fffff880`02cac3b4 fffffa80`086a0000 fffffa80`084ebd50 fffffa80`086a0030 : 0x9
    fffff880`08dca998 fffff880`02cac3b4 : fffffa80`086a0000 fffffa80`084ebd50 fffffa80`086a0030 00000000`0000000a : 0xfffffa80`08425500
    fffff880`08dca9a0 fffffa80`086a0000 : fffffa80`084ebd50 fffffa80`086a0030 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
    fffff880`08dca9a8 fffffa80`084ebd50 : fffffa80`086a0030 00000000`0000000a 0000000a`00000000 fffffa80`0869f180 : 0xfffffa80`086a0000
    fffff880`08dca9b0 fffffa80`086a0030 : 00000000`0000000a 0000000a`00000000 fffffa80`0869f180 00000000`00000000 : 0xfffffa80`084ebd50
    fffff880`08dca9b8 00000000`0000000a : 0000000a`00000000 fffffa80`0869f180 00000000`00000000 fffff880`08dcac18 : 0xfffffa80`086a0030
    fffff880`08dca9c0 0000000a`00000000 : fffffa80`0869f180 00000000`00000000 fffff880`08dcac18 00000000`00000000 : 0xa
    fffff880`08dca9c8 fffffa80`0869f180 : 00000000`00000000 fffff880`08dcac18 00000000`00000000 fffffa80`08125150 : 0xa`00000000
    fffff880`08dca9d0 00000000`00000000 : fffff880`08dcac18 00000000`00000000 fffffa80`08125150 00000000`00000000 : 0xfffffa80`0869f180
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    e1q62x64+21219
    fffff880`02cac219 ??              ???
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  e1q62x64+21219
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: e1q62x64
    
    IMAGE_NAME:  e1q62x64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4af31807
    
    FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101010-10951-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03064000 PsLoadedModuleList = 0xfffff800`032a1e50
    Debug session time: Sun Oct 10 11:45:18.040 2010 (GMT-5)
    System Uptime: 0 days 0:25:42.351
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {8, 2, 0, fffff8800167ff60}
    
    Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for e1q62x64.sys
    *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
    Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800167ff60, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330c0e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip!IpFlcReceivePreValidatedPackets+270
    fffff880`0167ff60 440fb63401      movzx   r14d,byte ptr [rcx+rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880082a7f90 -- (.trap 0xfffff880082a7f90)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
    rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800167ff60 rsp=fffff880082a8120 rbp=fffffa80082d2d50
     r8=0000000000000006  r9=0000000000000007 r10=0000000000000007
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    tcpip!IpFlcReceivePreValidatedPackets+0x270:
    fffff880`0167ff60 440fb63401      movzx   r14d,byte ptr [rcx+rax] ds:afe8:00000000`00000008=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030d3ca9 to fffff800030d4740
    
    STACK_TEXT:  
    fffff880`082a7e48 fffff800`030d3ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`082a7e50 fffff800`030d2920 : 00000000`00000000 00000000`00000000 fffff880`01768128 fffffa80`07a27000 : nt!KiBugCheckDispatch+0x69
    fffff880`082a7f90 fffff880`0167ff60 : 00000000`00005000 fffffa80`069915c4 00000000`cefa5000 fffff880`03b04000 : nt!KiPageFault+0x260
    fffff880`082a8120 fffff880`01677e22 : fffffa80`0829e750 fffffa80`0829a010 fffffa80`08290006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
    fffff880`082a8280 fffff800`030e3e5a : 00000000`00000000 fffff880`082a3000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
    fffff880`082a82d0 fffff880`01677882 : fffff880`01677d80 fffff880`082a83e0 fffffa80`06995302 fffff8a0`01992470 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`082a83b0 fffff880`015610eb : fffffa80`0829e010 00000000`00000000 fffffa80`074211a0 fffff800`030ecf8f : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`082a8420 fffff880`0152afc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`082a8490 fffff880`014a4ef1 : fffffa80`074211a0 00000000`00000002 00000000`0000000a fffff880`015615ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`082a8910 fffff880`11e21219 : fffffa80`08188000 fffffa80`0817ec30 fffffa80`0817d180 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`082a8960 fffffa80`08188000 : fffffa80`0817ec30 fffffa80`0817d180 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
    fffff880`082a8968 fffffa80`0817ec30 : fffffa80`0817d180 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`08188000
    fffff880`082a8970 fffffa80`0817d180 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`0818c500 : 0xfffffa80`0817ec30
    fffff880`082a8978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`0818c500 fffff880`11e213b4 : 0xfffffa80`0817d180
    fffff880`082a8980 fffffa80`00000801 : 00000000`00000009 fffffa80`0818c500 fffff880`11e213b4 fffffa80`0817d900 : 0xa
    fffff880`082a8988 00000000`00000009 : fffffa80`0818c500 fffff880`11e213b4 fffffa80`0817d900 fffffa80`0817ec30 : 0xfffffa80`00000801
    fffff880`082a8990 fffffa80`0818c500 : fffff880`11e213b4 fffffa80`0817d900 fffffa80`0817ec30 fffffa80`0817d950 : 0x9
    fffff880`082a8998 fffff880`11e213b4 : fffffa80`0817d900 fffffa80`0817ec30 fffffa80`0817d950 00000000`0000000a : 0xfffffa80`0818c500
    fffff880`082a89a0 fffffa80`0817d900 : fffffa80`0817ec30 fffffa80`0817d950 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
    fffff880`082a89a8 fffffa80`0817ec30 : fffffa80`0817d950 00000000`0000000a 0000000a`00000000 fffffa80`0817d8c0 : 0xfffffa80`0817d900
    fffff880`082a89b0 fffffa80`0817d950 : 00000000`0000000a 0000000a`00000000 fffffa80`0817d8c0 00000000`00000000 : 0xfffffa80`0817ec30
    fffff880`082a89b8 00000000`0000000a : 0000000a`00000000 fffffa80`0817d8c0 00000000`00000000 fffff880`082a8c18 : 0xfffffa80`0817d950
    fffff880`082a89c0 0000000a`00000000 : fffffa80`0817d8c0 00000000`00000000 fffff880`082a8c18 00000000`00000000 : 0xa
    fffff880`082a89c8 fffffa80`0817d8c0 : 00000000`00000000 fffff880`082a8c18 00000000`00000000 fffffa80`07cea430 : 0xa`00000000
    fffff880`082a89d0 00000000`00000000 : fffff880`082a8c18 00000000`00000000 fffffa80`07cea430 00000000`00000000 : 0xfffffa80`0817d8c0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    e1q62x64+21219
    fffff880`11e21219 ??              ???
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  e1q62x64+21219
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: e1q62x64
    
    IMAGE_NAME:  e1q62x64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4af31807
    
    FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101010-14430-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
    Debug session time: Sun Oct 10 11:55:50.356 2010 (GMT-5)
    System Uptime: 0 days 0:09:57.306
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {9, 2, 0, fffff8800167cdb6}
    
    Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for e1q62x64.sys
    *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
    Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000009, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800167cdb6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032aa0e0
     0000000000000009 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip!IpFlcReceivePreValidatedPackets+c6
    fffff880`0167cdb6 0fb60411        movzx   eax,byte ptr [rcx+rdx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88007ce9f90 -- (.trap 0xfffff88007ce9f90)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa80078d1820 rbx=0000000000000000 rcx=0000000000000009
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800167cdb6 rsp=fffff88007cea120 rbp=fffffa800823cbc0
     r8=0000000000000010  r9=0000000000000009 r10=0000000000000009
    r11=fffffa80084519a8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    tcpip!IpFlcReceivePreValidatedPackets+0xc6:
    fffff880`0167cdb6 0fb60411        movzx   eax,byte ptr [rcx+rdx] ds:4fb8:00000000`00000009=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003071ca9 to fffff80003072740
    
    STACK_TEXT:  
    fffff880`07ce9e48 fffff800`03071ca9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07ce9e50 fffff800`03070920 : fffffa80`08261140 00000000`00000000 fffff880`01765128 1f1f1f1f`1f1f1f1f : nt!KiBugCheckDispatch+0x69
    fffff880`07ce9f90 fffff880`0167cdb6 : 27272727`27275000 27272727`272700c1 28282828`28285000 28282828`28282828 : nt!KiPageFault+0x260
    fffff880`07cea120 fffff880`01674e22 : fffffa80`08174550 fffffa80`08174550 00000000`00000002 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0xc6
    fffff880`07cea280 fffff800`03081e5a : 00000000`00000000 fffff880`07ce5000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
    fffff880`07cea2d0 fffff880`01674882 : fffff880`01674d80 fffff880`07cea3e0 20202020`1f1f1f02 20202020`20202020 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`07cea3b0 fffff880`015ae0eb : fffffa80`07ed98d0 00000000`00000000 fffffa80`0809a1a0 27272727`26262626 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`07cea420 fffff880`01577fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`07cea490 fffff880`014f1ef1 : fffffa80`0809a1a0 00000000`00000002 00000000`0000000a 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`07cea910 fffff880`11e21219 : fffffa80`08282000 fffffa80`0823cbc0 fffffa80`0823cb30 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`07cea960 fffffa80`08282000 : fffffa80`0823cbc0 fffffa80`0823cb30 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
    fffff880`07cea968 fffffa80`0823cbc0 : fffffa80`0823cb30 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`08282000
    fffff880`07cea970 fffffa80`0823cb30 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`08286500 : 0xfffffa80`0823cbc0
    fffff880`07cea978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`08286500 fffff880`11e213b4 : 0xfffffa80`0823cb30
    fffff880`07cea980 fffffa80`00000801 : 00000000`00000009 fffffa80`08286500 fffff880`11e213b4 fffffa80`08268900 : 0xa
    fffff880`07cea988 00000000`00000009 : fffffa80`08286500 fffff880`11e213b4 fffffa80`08268900 fffffa80`0823cbc0 : 0xfffffa80`00000801
    fffff880`07cea990 fffffa80`08286500 : fffff880`11e213b4 fffffa80`08268900 fffffa80`0823cbc0 fffffa80`082689b0 : 0x9
    fffff880`07cea998 fffff880`11e213b4 : fffffa80`08268900 fffffa80`0823cbc0 fffffa80`082689b0 00000000`0000000a : 0xfffffa80`08286500
    fffff880`07cea9a0 fffffa80`08268900 : fffffa80`0823cbc0 fffffa80`082689b0 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
    fffff880`07cea9a8 fffffa80`0823cbc0 : fffffa80`082689b0 00000000`0000000a 0000000a`00000000 fffffa80`08268920 : 0xfffffa80`08268900
    fffff880`07cea9b0 fffffa80`082689b0 : 00000000`0000000a 0000000a`00000000 fffffa80`08268920 00000000`00000000 : 0xfffffa80`0823cbc0
    fffff880`07cea9b8 00000000`0000000a : 0000000a`00000000 fffffa80`08268920 00000000`00000000 fffff880`07ceac18 : 0xfffffa80`082689b0
    fffff880`07cea9c0 0000000a`00000000 : fffffa80`08268920 00000000`00000000 fffff880`07ceac18 00000000`00000000 : 0xa
    fffff880`07cea9c8 fffffa80`08268920 : 00000000`00000000 fffff880`07ceac18 00000000`00000000 fffffa80`07c8c870 : 0xa`00000000
    fffff880`07cea9d0 00000000`00000000 : fffff880`07ceac18 00000000`00000000 fffffa80`07c8c870 00000000`00000000 : 0xfffffa80`08268920
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    e1q62x64+21219
    fffff880`11e21219 ??              ???
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  e1q62x64+21219
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: e1q62x64
    
    IMAGE_NAME:  e1q62x64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4af31807
    
    FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101010-15912-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03000000 PsLoadedModuleList = 0xfffff800`0323de50
    Debug session time: Sun Oct 10 10:59:11.137 2010 (GMT-5)
    System Uptime: 0 days 0:39:07.464
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ....................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {8, 2, 0, fffff8800167df60}
    
    Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for e1q62x64.sys
    *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
    Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800167df60, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a80e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip!IpFlcReceivePreValidatedPackets+270
    fffff880`0167df60 440fb63401      movzx   r14d,byte ptr [rcx+rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88003ccdf90 -- (.trap 0xfffff88003ccdf90)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
    rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800167df60 rsp=fffff88003cce120 rbp=fffffa8008876540
     r8=0000000000000006  r9=0000000000000002 r10=0000000000000002
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    tcpip!IpFlcReceivePreValidatedPackets+0x270:
    fffff880`0167df60 440fb63401      movzx   r14d,byte ptr [rcx+rax] ds:1fe8:00000000`00000008=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000306fca9 to fffff80003070740
    
    STACK_TEXT:  
    fffff880`03ccde48 fffff800`0306fca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03ccde50 fffff800`0306e920 : fffffa80`08888540 00000000`00000000 fffff880`01766128 fffffa80`07a48000 : nt!KiBugCheckDispatch+0x69
    fffff880`03ccdf90 fffff880`0167df60 : 00000000`00009669 fffff880`03cc90c1 00000000`ffff9669 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`03cce120 fffff880`01675e22 : fffffa80`088bbc00 fffffa80`088b7010 fffffa80`088b0006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
    fffff880`03cce280 fffff800`0307fe5a : 00000000`00000000 fffff880`03cc9000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
    fffff880`03cce2d0 fffff880`01675882 : fffff880`01675d80 fffff880`03cce3e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`03cce3b0 fffff880`014c90eb : fffffa80`088b3010 00000000`00000000 fffffa80`07fe61a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`03cce420 fffff880`01492fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`03cce490 fffff880`0140cef1 : fffffa80`07fe61a0 00000000`00000002 00000000`00000007 fffff880`014c95ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`03cce910 fffff880`04c47219 : fffffa80`084b5000 fffffa80`088903c0 fffffa80`08890330 00000000`00000007 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`03cce960 fffffa80`084b5000 : fffffa80`088903c0 fffffa80`08890330 00000000`00000007 00000000`00000801 : e1q62x64+0x21219
    fffff880`03cce968 fffffa80`088903c0 : fffffa80`08890330 00000000`00000007 00000000`00000801 00000000`00000007 : 0xfffffa80`084b5000
    fffff880`03cce970 fffffa80`08890330 : 00000000`00000007 00000000`00000801 00000000`00000007 fffffa80`084b9500 : 0xfffffa80`088903c0
    fffff880`03cce978 00000000`00000007 : 00000000`00000801 00000000`00000007 fffffa80`084b9500 fffff880`04c473b4 : 0xfffffa80`08890330
    fffff880`03cce980 00000000`00000801 : 00000000`00000007 fffffa80`084b9500 fffff880`04c473b4 00000000`00000001 : 0x7
    fffff880`03cce988 00000000`00000007 : fffffa80`084b9500 fffff880`04c473b4 00000000`00000001 fffffa80`088903c0 : 0x801
    fffff880`03cce990 fffffa80`084b9500 : fffff880`04c473b4 00000000`00000001 fffffa80`088903c0 fffffa80`087f3c30 : 0x7
    fffff880`03cce998 fffff880`04c473b4 : 00000000`00000001 fffffa80`088903c0 fffffa80`087f3c30 00000000`00000007 : 0xfffffa80`084b9500
    fffff880`03cce9a0 00000000`00000001 : fffffa80`088903c0 fffffa80`087f3c30 00000000`00000007 0000000a`00000001 : e1q62x64+0x213b4
    fffff880`03cce9a8 fffffa80`088903c0 : fffffa80`087f3c30 00000000`00000007 0000000a`00000001 00000000`00000000 : 0x1
    fffff880`03cce9b0 fffffa80`087f3c30 : 00000000`00000007 0000000a`00000001 00000000`00000000 00000000`00000000 : 0xfffffa80`088903c0
    fffff880`03cce9b8 00000000`00000007 : 0000000a`00000001 00000000`00000000 00000000`00000000 fffff880`03ccec18 : 0xfffffa80`087f3c30
    fffff880`03cce9c0 0000000a`00000001 : 00000000`00000000 00000000`00000000 fffff880`03ccec18 00000000`00000000 : 0x7
    fffff880`03cce9c8 00000000`00000000 : 00000000`00000000 fffff880`03ccec18 00000000`00000000 fffffa80`081fd9b0 : 0xa`00000001
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    e1q62x64+21219
    fffff880`04c47219 ??              ???
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  e1q62x64+21219
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: e1q62x64
    
    IMAGE_NAME:  e1q62x64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4af31807
    
    FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    BUCKET_ID:  X64_0xD1_e1q62x64+21219
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
              
        Loaded symbol image file: e1q62x64.sys
        Image path: \SystemRoot\system32\DRIVERS\e1q62x64.sys
        Image name: e1q62x64.sys
        Timestamp:        Thu Nov 05 20:23:03 2009 (4AF31807)
        CheckSum:         0004943F
        ImageSize:        0004A000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    
    
    
    
    
    
    start             end                 module name
    fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Tue Jul 14 04:31:07 2009 (4A5BDFDB)
    fffff800`03000000 fffff800`035dc000   nt       ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
    fffff800`035dc000 fffff800`03625000   hal      hal.dll      Tue Jul 14 04:27:36 2009 (4A5BDF08)
    fffff880`00c00000 fffff880`00c0f000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00c1a000 fffff880`00c27000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
    fffff880`00c27000 fffff880`00c3b000   PSHED    PSHED.dll    Tue Jul 14 04:32:23 2009 (4A5BE027)
    fffff880`00c3b000 fffff880`00c99000   CLFS     CLFS.SYS     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00c99000 fffff880`00d59000   CI       CI.dll       Tue Jul 14 04:32:13 2009 (4A5BE01D)
    fffff880`00d59000 fffff880`00dfd000   Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
    fffff880`00e02000 fffff880`00e59000   ACPI     ACPI.sys     Tue Jul 14 02:19:34 2009 (4A5BC106)
    fffff880`00e59000 fffff880`00e62000   WMILIB   WMILIB.SYS   Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00e62000 fffff880`00e6c000   msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
    fffff880`00e6c000 fffff880`00e9f000   pci      pci.sys      Tue Jul 14 02:19:51 2009 (4A5BC117)
    fffff880`00e9f000 fffff880`00eac000   vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
    fffff880`00eac000 fffff880`00ec1000   partmgr  partmgr.sys  Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`00ec1000 fffff880`00ed6000   volmgr   volmgr.sys   Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`00ed6000 fffff880`00f32000   volmgrx  volmgrx.sys  Tue Jul 14 02:20:33 2009 (4A5BC141)
    fffff880`00f32000 fffff880`00f39000   pciide   pciide.sys   Tue Jul 14 02:19:49 2009 (4A5BC115)
    fffff880`00f39000 fffff880`00f49000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`00f49000 fffff880`00f69000   jraid    jraid.sys    Mon Jan 11 13:28:18 2010 (4B4B0B52)
    fffff880`00f69000 fffff880`00f98000   SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
    fffff880`00f98000 fffff880`00fb2000   mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`00fb2000 fffff880`00fbb000   atapi    atapi.sys    Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`00fbb000 fffff880`00fe5000   ataport  ataport.SYS  Tue Jul 14 02:19:52 2009 (4A5BC118)
    fffff880`00fe5000 fffff880`00ff0000   amdxata  amdxata.sys  Tue May 19 20:56:59 2009 (4A12F2EB)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Tue Jul 14 02:49:40 2009 (4A5BC814)
    fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Tue Jul 14 02:20:08 2009 (4A5BC128)
    fffff880`010dc000 fffff880`01128000   fltmgr   fltmgr.sys   Tue Jul 14 02:19:59 2009 (4A5BC11F)
    fffff880`01128000 fffff880`0113c000   fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
    fffff880`0113c000 fffff880`0119a000   msrpc    msrpc.sys    Tue Jul 14 02:21:32 2009 (4A5BC17C)
    fffff880`0119a000 fffff880`011d4000   rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
    fffff880`01211000 fffff880`013b4000   Ntfs     Ntfs.sys     Tue Jul 14 02:20:47 2009 (4A5BC14F)
    fffff880`013b4000 fffff880`013ce000   ksecdd   ksecdd.sys   Tue Jul 14 02:20:54 2009 (4A5BC156)
    fffff880`013ce000 fffff880`013df000   pcw      pcw.sys      Tue Jul 14 02:19:27 2009 (4A5BC0FF)
    fffff880`013df000 fffff880`013e9000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`01409000   hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
    fffff880`0140b000 fffff880`014fd000   ndis     ndis.sys     Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`014fd000 fffff880`0155d000   NETIO    NETIO.SYS    Tue Jul 14 02:21:46 2009 (4A5BC18A)
    fffff880`0155d000 fffff880`01588000   ksecpkg  ksecpkg.sys  Fri Dec 11 08:03:32 2009 (4B21E0B4)
    fffff880`01588000 fffff880`015d2000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
    fffff880`015d2000 fffff880`015e2000   vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
    fffff880`015e2000 fffff880`015ea000   spldr    spldr.sys    Mon May 11 19:56:27 2009 (4A0858BB)
    fffff880`015ea000 fffff880`015fc000   mup      mup.sys      Tue Jul 14 02:23:45 2009 (4A5BC201)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jun 14 06:39:04 2010 (4C15A458)
    fffff880`0182e000 fffff880`01868000   fvevol   fvevol.sys   Sat Sep 26 05:34:26 2009 (4ABD7DB2)
    fffff880`01868000 fffff880`0187e000   disk     disk.sys     Tue Jul 14 02:19:57 2009 (4A5BC11D)
    fffff880`0187e000 fffff880`018ae000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
    fffff880`018e4000 fffff880`0190e000   cdrom    cdrom.sys    Tue Jul 14 02:19:54 2009 (4A5BC11A)
    fffff880`0190e000 fffff880`01917000   Null     Null.SYS     Tue Jul 14 02:19:37 2009 (4A5BC109)
    fffff880`01917000 fffff880`0191e000   Beep     Beep.SYS     Tue Jul 14 03:00:13 2009 (4A5BCA8D)
    fffff880`0191e000 fffff880`0192c000   vga      vga.sys      Tue Jul 14 02:38:47 2009 (4A5BC587)
    fffff880`0192c000 fffff880`01951000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
    fffff880`01951000 fffff880`01961000   watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
    fffff880`01961000 fffff880`0196a000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`0196a000 fffff880`01973000   rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
    fffff880`01973000 fffff880`0197c000   rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
    fffff880`0197c000 fffff880`01987000   Msfs     Msfs.SYS     Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`01987000 fffff880`01998000   Npfs     Npfs.SYS     Tue Jul 14 02:19:48 2009 (4A5BC114)
    fffff880`01998000 fffff880`019b6000   tdx      tdx.sys      Tue Jul 14 02:21:15 2009 (4A5BC16B)
    fffff880`019b6000 fffff880`019c3000   TDI      TDI.SYS      Tue Jul 14 02:21:18 2009 (4A5BC16E)
    fffff880`02c2d000 fffff880`02cb7000   afd      afd.sys      Tue Jul 14 02:21:40 2009 (4A5BC184)
    fffff880`02cb7000 fffff880`02cfc000   netbt    netbt.sys    Tue Jul 14 02:21:28 2009 (4A5BC178)
    fffff880`02cfc000 fffff880`02d05000   wfplwf   wfplwf.sys   Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02d05000 fffff880`02d2b000   pacer    pacer.sys    Tue Jul 14 03:09:41 2009 (4A5BCCC5)
    fffff880`02d2b000 fffff880`02d3a000   netbios  netbios.sys  Tue Jul 14 03:09:26 2009 (4A5BCCB6)
    fffff880`02d3a000 fffff880`02d55000   wanarp   wanarp.sys   Tue Jul 14 03:10:21 2009 (4A5BCCED)
    fffff880`02d55000 fffff880`02d69000   termdd   termdd.sys   Tue Jul 14 03:16:36 2009 (4A5BCE64)
    fffff880`02d69000 fffff880`02dba000   rdbss    rdbss.sys    Tue Jul 14 02:24:09 2009 (4A5BC219)
    fffff880`02dba000 fffff880`02dc6000   nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
    fffff880`02dc6000 fffff880`02dd1000   mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
    fffff880`02dd1000 fffff880`02de0000   discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
    fffff880`04015000 fffff880`04098000   csc      csc.sys      Tue Jul 14 02:24:26 2009 (4A5BC22A)
    fffff880`04098000 fffff880`040b6000   dfsc     dfsc.sys     Tue Jul 14 02:23:44 2009 (4A5BC200)
    fffff880`040b6000 fffff880`040c7000   blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
    fffff880`040c7000 fffff880`040cd000   AsUpIO   AsUpIO.sys   Mon Jul 06 05:21:38 2009 (4A515FB2)
    fffff880`040cd000 fffff880`040d3000   AsIO     AsIO.sys     Mon Jun 28 08:19:38 2010 (4C2830EA)
    fffff880`040d3000 fffff880`040f9000   tunnel   tunnel.sys   Tue Jul 14 03:09:37 2009 (4A5BCCC1)
    fffff880`040f9000 fffff880`0410e000   amdppm   amdppm.sys   Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    fffff880`0410e000 fffff880`04132000   HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
    fffff880`04132000 fffff880`04162000   nusb3xhc nusb3xhc.sys Fri Apr 23 04:34:36 2010 (4BD0F92C)
    fffff880`04162000 fffff880`041b8000   USBPORT  USBPORT.SYS  Tue Jul 14 03:06:31 2009 (4A5BCC07)
    fffff880`041b8000 fffff880`041c0000   ASACPI   ASACPI.sys   Thu Jul 16 06:31:29 2009 (4A5E9F11)
    fffff880`04200000 fffff880`04205200   ksthunk  ksthunk.sys  Tue Jul 14 03:00:19 2009 (4A5BCA93)
    fffff880`04206000 fffff880`04244000   1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
    fffff880`04245000 fffff880`04316d80   ctaud2k  ctaud2k.sys  Thu Mar 18 14:18:42 2010 (4BA21A22)
    fffff880`04317000 fffff880`04354000   portcls  portcls.sys  Tue Jul 14 03:06:27 2009 (4A5BCC03)
    fffff880`04354000 fffff880`04376000   drmk     drmk.sys     Tue Jul 14 04:01:25 2009 (4A5BD8E5)
    fffff880`04376000 fffff880`043b9000   ks       ks.sys       Thu Mar 04 06:32:25 2010 (4B8F37D9)
    fffff880`043b9000 fffff880`043f4000   ctoss2k  ctoss2k.sys  Thu Mar 18 14:17:56 2010 (4BA219F4)
    fffff880`043f4000 fffff880`043fc000   ctprxy2k ctprxy2k.sys Thu Mar 18 14:18:45 2010 (4BA21A25)
    fffff880`04c26000 fffff880`04c70000   e1q62x64 e1q62x64.sys Thu Nov 05 20:23:03 2009 (4AF31807)
    fffff880`04c70000 fffff880`04c79000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:31:02 2009 (4A5BC3B6)
    fffff880`04c79000 fffff880`04c89000   CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
    fffff880`04c89000 fffff880`04c9f000   AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
    fffff880`04c9f000 fffff880`04cc3000   rasl2tp  rasl2tp.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`04cc3000 fffff880`04ccf000   ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
    fffff880`04ccf000 fffff880`04cfe000   ndiswan  ndiswan.sys  Tue Jul 14 03:10:11 2009 (4A5BCCE3)
    fffff880`04cfe000 fffff880`04d19000   raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
    fffff880`04d19000 fffff880`04d3a000   raspptp  raspptp.sys  Tue Jul 14 03:10:18 2009 (4A5BCCEA)
    fffff880`04d3a000 fffff880`04d54000   rassstp  rassstp.sys  Tue Jul 14 03:10:25 2009 (4A5BCCF1)
    fffff880`04d54000 fffff880`04d5f000   rdpbus   rdpbus.sys   Tue Jul 14 03:17:46 2009 (4A5BCEAA)
    fffff880`04d5f000 fffff880`04d6e000   kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`04d6e000 fffff880`04d7d000   mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
    fffff880`04d7d000 fffff880`04d7e480   swenum   swenum.sys   Tue Jul 14 03:00:18 2009 (4A5BCA92)
    fffff880`04d7f000 fffff880`04d91000   umbus    umbus.sys    Tue Jul 14 03:06:56 2009 (4A5BCC20)
    fffff880`04d91000 fffff880`04da9000   nusb3hub nusb3hub.sys Fri Apr 23 04:34:35 2010 (4BD0F92B)
    fffff880`0503a000 fffff880`05094000   usbhub   usbhub.sys   Tue Jul 14 03:07:09 2009 (4A5BCC2D)
    fffff880`05094000 fffff880`050d6000   hap16v2k hap16v2k.sys Thu Mar 18 14:18:03 2010 (4BA219FB)
    fffff880`050d6000 fffff880`05128000   emupia2k emupia2k.sys Thu Mar 18 14:17:45 2010 (4BA219E9)
    fffff880`05128000 fffff880`05172000   ctsfm2k  ctsfm2k.sys  Thu Mar 18 14:17:48 2010 (4BA219EC)
    fffff880`05837000 fffff880`059f0000   ha10kx2k ha10kx2k.sys Thu Mar 18 14:17:59 2010 (4BA219F7)
    fffff880`05c13000 fffff880`05cc1000   ctac32k  ctac32k.sys  Thu Mar 18 14:20:26 2010 (4BA21A8A)
    fffff880`05cc1000 fffff880`05cec000   COMMONFX COMMONFX.SYS Thu Mar 18 14:19:04 2010 (4BA21A38)
    fffff880`05cec000 fffff880`05d97000   CTSBLFX  CTSBLFX.SYS  Thu Mar 18 14:19:13 2010 (4BA21A41)
    fffff880`05e53000 fffff880`05f03000   CTAUDFX  CTAUDFX.SYS  Thu Mar 18 14:19:07 2010 (4BA21A3B)
    fffff880`05f03000 fffff880`05f18000   NDProxy  NDProxy.SYS  Tue Jul 14 03:10:05 2009 (4A5BCCDD)
    fffff880`05f18000 fffff880`05f3b000   nvhda64v nvhda64v.sys Tue Jun 22 01:07:25 2010 (4C1FE29D)
    fffff880`05f3b000 fffff880`05fe1000   peauth   peauth.sys   Tue Jul 14 04:01:19 2009 (4A5BD8DF)
    fffff880`0620a000 fffff880`062d2000   HTTP     HTTP.sys     Tue Jul 14 02:22:16 2009 (4A5BC1A8)
    fffff880`062d2000 fffff880`062f0000   bowser   bowser.sys   Tue Jul 14 02:23:50 2009 (4A5BC206)
    fffff880`062f0000 fffff880`06308000   mpsdrv   mpsdrv.sys   Tue Jul 14 03:08:25 2009 (4A5BCC79)
    fffff880`06308000 fffff880`06335000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:52:19 2010 (4B88CF33)
    fffff880`06335000 fffff880`06383000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
    fffff880`06383000 fffff880`063a6000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
    fffff880`063a6000 fffff880`063b1000   secdrv   secdrv.SYS   Wed Sep 13 16:18:38 2006 (4508052E)
    fffff880`063b1000 fffff880`063de000   srvnet   srvnet.sys   Tue Jun 22 06:20:32 2010 (4C202C00)
    fffff880`063de000 fffff880`063f0000   tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
    fffff880`0642c000 fffff880`06652300   RTKVHD64 RTKVHD64.sys Fri Jan 29 08:48:35 2010 (4B6284C3)
    fffff880`06653000 fffff880`0665f000   Dxapi    Dxapi.sys    Tue Jul 14 02:38:28 2009 (4A5BC574)
    fffff880`0665f000 fffff880`0666d000   monitor  monitor.sys  Tue Jul 14 02:38:52 2009 (4A5BC58C)
    fffff880`0666d000 fffff880`0668a000   usbccgp  usbccgp.sys  Tue Jul 14 03:06:45 2009 (4A5BCC15)
    fffff880`0668a000 fffff880`06698000   hidusb   hidusb.sys   Tue Jul 14 03:06:22 2009 (4A5BCBFE)
    fffff880`06698000 fffff880`066b1000   HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
    fffff880`066b1000 fffff880`066b9080   HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
    fffff880`066ba000 fffff880`066c7000   mouhid   mouhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`066c7000 fffff880`066d5000   kbdhid   kbdhid.sys   Tue Jul 14 03:00:20 2009 (4A5BCA94)
    fffff880`066d5000 fffff880`066f2000   cdfs     cdfs.sys     Tue Jul 14 02:19:46 2009 (4A5BC112)
    fffff880`06728000 fffff880`0674b000   luafv    luafv.sys    Tue Jul 14 02:26:13 2009 (4A5BC295)
    fffff880`0674b000 fffff880`06760000   lltdio   lltdio.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`06760000 fffff880`06778000   rspndr   rspndr.sys   Tue Jul 14 03:08:50 2009 (4A5BCC92)
    fffff880`06778000 fffff880`067e0000   srv2     srv2.sys     Tue Jun 22 06:20:47 2010 (4C202C0F)
    fffff880`072b6000 fffff880`0734c000   srv      srv.sys      Tue Jun 22 06:21:11 2010 (4C202C27)
    fffff880`07374000 fffff880`07382000   crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
    fffff880`07382000 fffff880`0738e000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`0738e000 fffff880`07397000   dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
    fffff880`07397000 fffff880`073aa000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    fffff880`073bd000 fffff880`073c8000   asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
    fffff880`11e00000 fffff880`11e46000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:38:32 2009 (4A5BC578)
    fffff880`11e46000 fffff880`11e47f00   USBD     USBD.SYS     Tue Jul 14 03:06:23 2009 (4A5BCBFF)
    fffff880`11e48000 fffff880`11e55000   usbfilter usbfilter.sys Tue Dec 22 10:26:22 2009 (4B3082AE)
    fffff880`11e5c000 fffff880`12aede00   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
    fffff880`12aee000 fffff880`12aef180   nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
    fffff880`12af0000 fffff880`12be4000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 04:00:14 2009 (4AC5509E)
    fffff880`12be4000 fffff880`12bef000   usbohci  usbohci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff880`12bef000 fffff880`12c00000   usbehci  usbehci.sys  Tue Jul 14 03:06:30 2009 (4A5BCC06)
    fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   unavailable (00000000)
    fffff960`00450000 fffff960`0045a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      unavailable (00000000)
    
    Unloaded modules:
    fffff880`07200000 fffff880`07271000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07200000 fffff880`07271000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07200000 fffff880`07271000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`072a7000 fffff880`072b5000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0734c000 fffff880`07358000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07358000 fffff880`07361000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07361000 fffff880`07374000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07271000 fffff880`0727f000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0727f000 fffff880`0728b000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0728b000 fffff880`07294000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07294000 fffff880`072a7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`066f2000 fffff880`06700000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`06700000 fffff880`0670c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0670c000 fffff880`06715000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`06715000 fffff880`06728000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0734c000 fffff880`073bd000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018ae000 fffff880`018bc000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018bc000 fffff880`018c8000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018c8000 fffff880`018d1000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`018d1000 fffff880`018e4000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  4. Posts : 14
    Windows 7 Professional 64 Bit
    Thread Starter
       #4

    I updated my Ethernet adapter and just deleted AsUpIO.sys. I thought my problem were fixed. My computer ran fine for a couple hours, but I just got like 3 BSOD's in a row when I was downloading a few things. It seems to happen every time I have multiple things downloading, I'm not really sure. I will upload some more reports, if someone could take a look at them I'd appreciate it. This is pretty frustrating.
    Last edited by SDQuattroDriver; 10 Oct 2010 at 14:49.
      My Computer


  5. Posts : 14
    Windows 7 Professional 64 Bit
    Thread Starter
       #5

    Did a fresh install of windows 7 x64. All drivers are updated and I'm still getting random BSOD's. I'm pretty sure I'm having the same problems as before, with all my drivers updated what am I to do? Attached are the crash reports. Any help/suggestions are greatly appreciated, thanks!
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 16:54.
Find Us