Thanks much. I will take a look. All three of the dumps show different error codes. This indicates a hardware or hardware related problem. Two of the dumps indicate memory corruption.
Error code A, IRQL_NOT_LESS_OR_EQUAL. Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.
Error code 109, CRITICAL_STRUCTURE_CORRUPTION. Usual causes: Device driver, Breakpoint set with no debugger attached, Hardware (Memory in particular).
Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.
Notice what causes are in common in all three error codes.
Code:
Kernel base = 0xfffff800`02e52000 PsLoadedModuleList = 0xfffff800`0308fe50
Debug session time: Thu Oct 7 20:43:51.098 2010 (GMT-4)
System Uptime: 0 days 0:00:08.191
Loading Kernel Symbols
...............................................................
...................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002ee2436}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ee2436, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fa0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02ee2436 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880033763a0 -- (.trap 0xfffff880033763a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88003376f80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ee2436 rsp=fffff88003376530 rbp=fffff88003376680
r8=fffff88003376638 r9=fffff88003376630 r10=0000000000000002
r11=fffff80002ee17d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xc73:
fffff800`02ee2436 488b09 mov rcx,qword ptr [rcx] ds:000c:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec1ca9 to fffff80002ec2740
STACK_TEXT:
fffff880`03376258 fffff800`02ec1ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03376260 fffff800`02ec0920 : fffff880`03376320 fffff980`016d0ee0 fffff980`02f4cf68 fffff880`033769d0 : nt!KiBugCheckDispatch+0x69
fffff880`033763a0 fffff800`02ee2436 : 00000000`00000000 fffff800`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`03376530 fffff800`02e9f0c7 : 00000000`00000000 fffffa80`078ea950 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xc73
fffff880`03376600 fffff800`02e9f487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`03376680 fffff800`02e629f8 : 0000abdf`00000035 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
fffff880`03376810 fffff800`02e62967 : fffffa80`05a08218 fffff880`00000011 00000000`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x70
fffff880`03376eb0 fffff800`02f85c2b : 00000000`00000003 fffffa80`05a08218 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
fffff880`03376ee0 fffff800`033590dc : fffffa80`05a08200 00000000`00000040 00000000`00000002 fffff800`02fb91d1 : nt!RtlCaptureStackBackTrace+0x4b
fffff880`03376f10 fffff800`0335b33a : fffff880`03372000 fffff880`03378000 00000000`00000000 00000000`00000000 : nt!IovpLogStackCallout+0x1c
fffff880`03376f40 fffff800`00000000 : 00000000`00000008 00000001`00000084 00000000`00000000 00000000`00000002 : nt!ViPoolLogStackTrace+0x8a
fffff880`03376f70 00000000`00000008 : 00000001`00000084 00000000`00000000 00000000`00000002 00000000`00000000 : 0xfffff800`00000000
fffff880`03376f78 00000001`00000084 : 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`02ff567c : 0x8
fffff880`03376f80 00000000`00000000 : 00000000`00000002 00000000`00000000 fffff800`02ff567c fffffa80`07809300 : 0x1`00000084
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ec0920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Sat Oct 9 12:17:51.111 2010 (GMT-4)
System Uptime: 0 days 1:45:35.172
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 109, {a3a039d897e0a744, b3b7465eea5d793a, fffff80003173ec0, 1}
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See Patching Policy for x64-Based Systems: Information for Driver Developers
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d897e0a744, Reserved
Arg2: b3b7465eea5d793a, Reserved
Arg3: fffff80003173ec0, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Debugging Details:
------------------
BUGCHECK_STR: 0x109
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002e73740
STACK_TEXT:
fffff880`033625d8 00000000`00000000 : 00000000`00000109 a3a039d8`97e0a744 b3b7465e`ea5d793a fffff800`03173ec0 : nt!KeBugCheckEx
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: BAD_STACK
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02e64000 PsLoadedModuleList = 0xfffff800`030a1e50
Debug session time: Mon Oct 11 21:06:35.939 2010 (GMT-4)
System Uptime: 0 days 0:24:47.000
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : rdyboost.sys ( rdyboost!SmdProcessReadWrite+8f )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+53e4952f0190dd60
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88008df0908 -- (.exr 0xfffff88008df0908)
ExceptionAddress: fffff8800105553f (rdyboost!SmdProcessReadWrite+0x000000000000008f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000006464db0
Attempt to read from address 0000000006464db0
TRAP_FRAME: fffff88008df09b0 -- (.trap 0xfffff88008df09b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8005718a10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800105553f rsp=fffff88008df0b40 rbp=00000000ffffffff
r8=0000000000000002 r9=0000000000000004 r10=fffffa80065d9c80
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
rdyboost!SmdProcessReadWrite+0x8f:
fffff880`0105553f 45844520 test byte ptr [r13+20h],r8b ds:6ff0:00000000`00000020=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ecc46e to fffff80002ed4710
STACK_TEXT:
fffff880`08def9f8 fffff800`02ecc46e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`02f28f6b : nt!KeBugCheck
fffff880`08defa00 fffff800`02efa40d : fffff800`030e0cf8 fffff800`03023af0 fffff800`02e64000 fffff880`08df0908 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`08defa30 fffff800`02f01a90 : fffff800`03023ae8 fffff880`08defaa8 fffff880`08df0908 fffff800`02e64000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`08defa60 fffff800`02f0e9ef : fffff880`08df0908 fffff880`08df0170 fffff880`00000000 00000000`00000003 : nt!RtlDispatchException+0x410
fffff880`08df0140 fffff800`02ed3d82 : fffff880`08df0908 00000000`00000020 fffff880`08df09b0 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`08df07d0 fffff800`02ed28fa : 00000000`00000000 00000000`00000020 00000000`00000000 fffff800`02ef210e : nt!KiExceptionDispatch+0xc2
fffff880`08df09b0 fffff880`0105553f : fffff800`00000010 fffff800`00008fed fffff880`00400000 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`08df0b40 fffff880`0105547d : fffffa80`06464d90 fffffa80`05718a10 00000000`00000000 fffffa80`096e7160 : rdyboost!SmdProcessReadWrite+0x8f
fffff880`08df0cb0 fffff880`0100445b : fffffa80`05718a10 00000000`b83c7000 fffffa80`05718d68 fffffa80`05718a10 : rdyboost!SmdDispatchReadWrite+0xd9
fffff880`08df0ce0 fffff880`0126154a : fffff880`0334c740 fffffa80`0551c680 00000000`00000000 00000000`00000000 : volsnap! ?? ::FNODOBFM::`string'+0x19e8
fffff880`08df0d30 fffff800`02ecc5c7 : fffff900`c080bdc0 000007ff`fffa4800 00000000`000100e8 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`08df0d60 fffff800`02ecc581 : 00000000`00000000 fffffa80`0551c680 fffff880`08df1000 fffff800`02ee401a : nt!KySwitchKernelStackCallout+0x27
fffff880`0334c530 fffff800`02ee401a : fffff880`0334c6f0 fffffa80`0551c680 fffff880`0334caf0 fffffa80`064c7d10 : nt!KiSwitchKernelStackContinue
fffff880`0334c550 fffff880`0125fb69 : fffff880`01261534 fffff880`0334c668 fffff6fc`00003000 fffffa80`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x29a
fffff880`0334c630 fffff880`0125f036 : fffffa80`06752510 00000000`00000000 fffffa80`064c7d10 00000000`00000004 : Ntfs!NtfsMultipleAsync+0xa9
fffff880`0334c6a0 fffff880`0126ddc4 : fffff880`0334caf0 fffffa80`05718a10 fffffa80`065f4100 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x216
fffff880`0334c870 fffff880`012661c2 : fffff880`0334caf0 fffffa80`05718a10 fffffa80`064c7d10 00000000`0061a000 : Ntfs!NtfsNonCachedUsaWrite+0x64
fffff880`0334c900 fffff880`0126a413 : fffff880`0334caf0 fffffa80`05718a10 fffff880`0334cc00 fffff880`0334dc01 : Ntfs!NtfsCommonWrite+0x1022
fffff880`0334cac0 fffff880`010d123f : fffffa80`05718db0 fffffa80`05718a10 fffffa80`057b70f0 00000000`00000000 : Ntfs!NtfsFsdWrite+0x1c3
fffff880`0334cd40 fffff880`010cf6df : fffffa80`064c19e0 fffffa80`064c7b80 fffffa80`064c1900 fffffa80`05718a10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0334cdd0 fffff800`02ec32ff : fffffa80`05718a10 fffff880`0334d360 fffff880`0334cfe0 fffff880`009b2180 : fltmgr!FltpDispatch+0xcf
fffff880`0334ce30 fffff800`02ec2987 : 00000000`00000000 fffff880`0334d360 fffffa80`0000a6e0 00000000`00000000 : nt!IoSynchronousPageWrite+0x24f
fffff880`0334ceb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFlushSectionInternal+0xa58
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!SmdProcessReadWrite+8f
fffff880`0105553f 45844520 test byte ptr [r13+20h],r8b
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: rdyboost!SmdProcessReadWrite+8f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc48a
FAILURE_BUCKET_ID: X64_0x1E_rdyboost!SmdProcessReadWrite+8f
BUCKET_ID: X64_0x1E_rdyboost!SmdProcessReadWrite+8f
Followup: MachineOwner
---------
4: kd> lmtsmn
start end module name
fffff880`04317000 fffff880`04355000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f73000 fffff880`00fca000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`01800000 fffff880`0188a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043bf000 fffff880`043d5000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c5d000 fffff880`00c68000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04355000 fffff880`0435d000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`06071000 fffff880`0607c000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c2a000 fffff880`00c33000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c33000 fffff880`00c5d000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00820000 fffff960`00881000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`0193e000 fffff880`01945000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02dcb000 fffff880`02ddc000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03ee8000 fffff880`03f06000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00600000 fffff960`00627000 cdd cdd.dll unavailable (00000000)
fffff880`0190b000 fffff880`01935000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00e00000 fffff880`00ec0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018a5000 fffff880`018d5000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cf2000 fffff880`00d50000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0118c000 fffff880`011ff000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043af000 fffff880`043bf000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05c00000 fffff880`05c0e000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c00000 fffff880`02c83000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`0592a000 fffff880`0595f000 CT20XUT CT20XUT.SYS Wed May 05 09:01:28 2010 (4BE16C28)
fffff880`05829000 fffff880`058d7000 ctac32k ctac32k.sys Wed Jul 02 04:38:22 2008 (486B3E7E)
fffff880`03c00000 fffff880`03ca5700 ctaud2k ctaud2k.sys Wed May 05 08:59:48 2010 (4BE16BC4)
fffff880`05c8c000 fffff880`05de9000 CTEXFIFX CTEXFIFX.SYS Wed May 05 09:01:21 2010 (4BE16C21)
fffff880`0590f000 fffff880`0592a000 CTHWIUT CTHWIUT.SYS Wed May 05 09:01:32 2010 (4BE16C2C)
fffff880`042d8000 fffff880`04309000 ctoss2k ctoss2k.sys Wed May 05 08:57:46 2010 (4BE16B4A)
fffff880`04309000 fffff880`04311000 ctprxy2k ctprxy2k.sys Wed May 05 08:59:51 2010 (4BE16BC7)
fffff880`049a4000 fffff880`049dc000 ctsfm2k ctsfm2k.sys Wed May 05 08:57:33 2010 (4BE16B3D)
fffff880`02c83000 fffff880`02ca1000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dbc000 fffff880`02dcb000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`00c68000 fffff880`00c7e000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04273000 fffff880`04295000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05c1a000 fffff880`05c23000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05c0e000 fffff880`05c1a000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05c23000 fffff880`05c36000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05de9000 fffff880`05df5000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03d06000 fffff880`03dfa000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`10b30000 fffff880`10b76000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`05600000 fffff880`0564a000 emupia2k emupia2k.sys Wed May 05 08:57:27 2010 (4BE16B37)
fffff880`0111a000 fffff880`0112e000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010ce000 fffff880`0111a000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`04399000 fffff880`043a6000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff880`05656000 fffff880`057d7000 ha20x2k ha20x2k.sys Wed May 05 08:59:10 2010 (4BE16B9E)
fffff800`02e1b000 fffff800`02e64000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10b76000 fffff880`10b9a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0597d000 fffff880`05996000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05df5000 fffff880`05dfd080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0596f000 fffff880`0597d000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03e20000 fffff880`03ee8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01235000 fffff880`0123e000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0435d000 fffff880`0437b000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03cf0000 fffff880`03d06000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0437b000 fffff880`0438a000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bba000 fffff800`00bc4000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04295000 fffff880`042d8000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04311000 fffff880`04316200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05996000 fffff880`059ab000 LHidFilt LHidFilt.Sys Thu Mar 18 04:51:17 2010 (4BA1E985)
fffff880`059cc000 fffff880`059e1000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`059b8000 fffff880`059cc000 LMouFilt LMouFilt.Sys Thu Mar 18 04:51:24 2010 (4BA1E98C)
fffff880`05c44000 fffff880`05c67000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`0595f000 fffff880`0596f000 LUsbFilt LUsbFilt.Sys Thu Mar 18 04:51:28 2010 (4BA1E990)
fffff880`00c9a000 fffff880`00cde000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05c36000 fffff880`05c44000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0438a000 fffff880`04399000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`059ab000 fffff880`059b8000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c10000 fffff880`00c2a000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f06000 fffff880`03f1e000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03f1e000 fffff880`03f4b000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03f4b000 fffff880`03f99000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03f99000 fffff880`03fbc000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019a3000 fffff880`019ae000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fd3000 fffff880`00fdd000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0112e000 fffff880`0118c000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02db1000 fffff880`02dbc000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e6000 fffff880`015f8000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014dc000 fffff880`015ce000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04200000 fffff880`0420c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`048a6000 fffff880`048d5000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`058d7000 fffff880`058ec000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d16000 fffff880`02d25000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ca2000 fffff880`02ce7000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019ae000 fffff880`019bf000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02da5000 fffff880`02db1000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e64000 fffff800`03440000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01253000 fffff880`013f6000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01935000 fffff880`0193e000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b2e000 fffff880`10b2f180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`058ec000 fffff880`0590f000 nvhda64v nvhda64v.sys Mon Jun 21 18:07:25 2010 (4C1FE29D)
fffff880`0fe9c000 fffff880`10b2de00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02cf0000 fffff880`02d16000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fea000 fffff880`00fff000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d50000 fffff880`00d83000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00df4000 fffff880`00dfb000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c00000 fffff880`00c10000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04800000 fffff880`048a6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04236000 fffff880`04273000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cde000 fffff880`00cf2000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`043d5000 fffff880`043f9000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`048d5000 fffff880`048f0000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`048f0000 fffff880`04911000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04911000 fffff880`0492b000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d54000 fffff880`02da5000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0492b000 fffff880`04936000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01988000 fffff880`01991000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01991000 fffff880`0199a000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0199a000 fffff880`019a3000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`059e1000 fffff880`059f9000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`061ed000 fffff880`061f3000 RTCore64 RTCore64.sys Wed May 25 02:39:12 2005 (42941D90)
fffff880`03fbc000 fffff880`03fc7000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`015de000 fffff880`015e6000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06157000 fffff880`061ed000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`060ef000 fffff880`06157000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`03fc7000 fffff880`03ff4000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`04936000 fffff880`04937480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`03e00000 fffff880`03e12000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019dd000 fffff880`019ea000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`019bf000 fffff880`019dd000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d40000 fffff880`02d54000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00550000 fffff960`0055a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03cca000 fffff880`03cf0000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04938000 fffff880`0494a000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05dfe000 fffff880`05dfff00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0fe00000 fffff880`0fe11000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0494a000 fffff880`049a4000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`10ba7000 fffff880`10bfd000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`10b9a000 fffff880`10ba7000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fdd000 fffff880`00fea000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01945000 fffff880`01953000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01953000 fffff880`01978000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015ce000 fffff880`015de000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00d83000 fffff880`00d98000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d98000 fffff880`00df4000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d25000 fffff880`02d40000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01978000 fffff880`01988000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ec0000 fffff880`00f64000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f64000 fffff880`00f73000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ce7000 fffff880`02cf0000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00040000 fffff960`0034f000 win32k win32k.sys unavailable (00000000)
fffff880`043a6000 fffff880`043af000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fca000 fffff880`00fd3000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05c67000 fffff880`05c88000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`0fe11000 fffff880`0fe76000 yk62x64 yk62x64.sys Mon Sep 28 04:19:31 2009 (4AC07193)
Unloaded modules:
fffff880`0607c000 fffff880`060ed000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`06000000 fffff880`06071000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018d5000 fffff880`018e3000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018e3000 fffff880`018ef000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018ef000 fffff880`018f8000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018f8000 fffff880`0190b000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
I find two out of date third party drivers on your system. Outdated drivers can and do cause memory corruption and crashes. While I cannot say these drivers caused your crashes, they definitely do not contribute to the stability of your system. Update these drivers.
ctac32k.sys Wed Jul 02 04:38:22 2008 - Creative Audio Driver
Creative Worldwide Support. Update this driver.
RTCore64.sys Wed May 25 02:39:12 2005 - This is an XP driver. RivaTuner/EVGA Precision (issues w/Win7)
RivaTuner. This tuner is obsolete. I recommend that you uninstall it and up grade to a tuner certified compatible with Win 7.
Update/uninstall these two drivers. Reboot and let's see what your system does. If you get another BSOD, upload it and then run Memtest86 following the instructions in this tutorial. Post back with your Memtest results. It will take 7-8 hours to run.
RAM - Test with Memtest86+