New
#1
BSOD Rdyboost.sys HELP
My windows 7 32-bit keeps getting the BSOD with rdyboost.sys. I am unable booting unless I underclock the CPU from 166MHz to 133MHz.
How can I solve this?
Thanks in advance
My windows 7 32-bit keeps getting the BSOD with rdyboost.sys. I am unable booting unless I underclock the CPU from 166MHz to 133MHz.
How can I solve this?
Thanks in advance
Hi and welcome to the forum. Please read this thread, follow the instructions and post back. We will be glad to help you. We need the information in the additional files.
https://www.sevenforums.com/crashes-d...tructions.html
I doubt the readboost.sys is the actual cause of your crash. It ie a Windows system driver and not likely to be the cause. It is more likely that something else is conflicting with it. Out of date drivers can be the cause and you have two very obsolete drivers loaded on your system. Update these two drivers through the links provided.
SI3112r.sys Thu Aug 16 22:00:39 2007 - Silicon Image SiI 3112 SATARaid Controller. Silicon Image - Support.
SiWinAcc.sys Thu Jun 14 20:02:27 2007 - Silicon Image driver - comes with package for the SIxxxx drivers. Silicon Image - Support.Code:Windows 7 Kernel Version 7600 UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.x86fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0x81c39000 PsLoadedModuleList = 0x81d78570 Debug session time: Sun Jan 9 11:40:24.453 2011 (GMT-5) System Uptime: 0 days 0:00:20.968 Loading Kernel Symbols ............................................................... ........................ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007E, {c0000005, 87204931, 80f81a40, 80f81620} Probably caused by : rdyboost.sys ( rdyboost!XpressDecodeClose+7b1 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 87204931, The address that the exception occurred at Arg3: 80f81a40, Exception Record Address Arg4: 80f81620, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: rdyboost!XpressDecodeClose+7b1 87204931 8b3c82 mov edi,dword ptr [edx+eax*4] EXCEPTION_RECORD: 80f81a40 -- (.exr 0xffffffff80f81a40) ExceptionAddress: 87204931 (rdyboost!XpressDecodeClose+0x000007b1) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000b46 Attempt to read from address 00000b46 CONTEXT: 80f81620 -- (.cxr 0xffffffff80f81620) eax=000002be ebx=846858d4 ecx=00000029 edx=0000004e esi=84b92bae edi=000000eb eip=87204931 esp=80f81b08 ebp=10004038 iopl=0 nv up ei ng nz na po cy cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010283 rdyboost!XpressDecodeClose+0x7b1: 87204931 8b3c82 mov edi,dword ptr [edx+eax*4] ds:0023:00000b46=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000b46 READ_ADDRESS: GetPointerFromAddress: unable to read from 81d98700 Unable to read MiSystemVaType memory at 81d780c0 00000b46 FOLLOWUP_IP: rdyboost!XpressDecodeClose+7b1 87204931 8b3c82 mov edi,dword ptr [edx+eax*4] BUGCHECK_STR: 0x7E LAST_CONTROL_TRANSFER: from 8720533f to 87204931 STACK_TEXT: 80f81b18 8720533f 8468c100 80f81c5c 872055b6 rdyboost!XpressDecodeClose+0x7b1 80f81b24 872055b6 872048d0 00000000 00000000 rdyboost!XpressDecodeClose+0x11bf 80f81c5c 87205768 84685100 89d29080 00000fff rdyboost!XpressDecodeClose+0x1436 80f81c80 871fa2d1 84685100 89d29080 00001000 rdyboost!XpressEncode+0x38 80f81ce0 871fa83c 89d29080 80f81cf8 84a9f388 rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageAdd+0x7d 80f81d10 871facf0 84678478 84a9f388 84a9f388 rdyboost!ST_STORE<SMD_TRAITS>::StDmPageAdd+0xc4 80f81d28 871faf08 84678430 84a9f388 00000000 rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x2c 80f81d50 81e20d84 00000000 9b7d5018 00000000 rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0xfe 80f81d90 81cc2159 871fae0a 84678430 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: rdyboost!XpressDecodeClose+7b1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc19a STACK_COMMAND: .cxr 0xffffffff80f81620 ; kb FAILURE_BUCKET_ID: 0x7E_rdyboost!XpressDecodeClose+7b1 BUCKET_ID: 0x7E_rdyboost!XpressDecodeClose+7b1 Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 87204931, The address that the exception occurred at Arg3: 80f81a40, Exception Record Address Arg4: 80f81620, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: rdyboost!XpressDecodeClose+7b1 87204931 8b3c82 mov edi,dword ptr [edx+eax*4] EXCEPTION_RECORD: 80f81a40 -- (.exr 0xffffffff80f81a40) ExceptionAddress: 87204931 (rdyboost!XpressDecodeClose+0x000007b1) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000b46 Attempt to read from address 00000b46 CONTEXT: 80f81620 -- (.cxr 0xffffffff80f81620) eax=000002be ebx=846858d4 ecx=00000029 edx=0000004e esi=84b92bae edi=000000eb eip=87204931 esp=80f81b08 ebp=10004038 iopl=0 nv up ei ng nz na po cy cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010283 rdyboost!XpressDecodeClose+0x7b1: 87204931 8b3c82 mov edi,dword ptr [edx+eax*4] ds:0023:00000b46=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000b46 READ_ADDRESS: GetPointerFromAddress: unable to read from 81d98700 Unable to read MiSystemVaType memory at 81d780c0 00000b46 FOLLOWUP_IP: rdyboost!XpressDecodeClose+7b1 87204931 8b3c82 mov edi,dword ptr [edx+eax*4] BUGCHECK_STR: 0x7E LAST_CONTROL_TRANSFER: from 8720533f to 87204931 STACK_TEXT: 80f81b18 8720533f 8468c100 80f81c5c 872055b6 rdyboost!XpressDecodeClose+0x7b1 80f81b24 872055b6 872048d0 00000000 00000000 rdyboost!XpressDecodeClose+0x11bf 80f81c5c 87205768 84685100 89d29080 00000fff rdyboost!XpressDecodeClose+0x1436 80f81c80 871fa2d1 84685100 89d29080 00001000 rdyboost!XpressEncode+0x38 80f81ce0 871fa83c 89d29080 80f81cf8 84a9f388 rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageAdd+0x7d 80f81d10 871facf0 84678478 84a9f388 84a9f388 rdyboost!ST_STORE<SMD_TRAITS>::StDmPageAdd+0xc4 80f81d28 871faf08 84678430 84a9f388 00000000 rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x2c 80f81d50 81e20d84 00000000 9b7d5018 00000000 rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0xfe 80f81d90 81cc2159 871fae0a 84678430 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: rdyboost!XpressDecodeClose+7b1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc19a STACK_COMMAND: .cxr 0xffffffff80f81620 ; kb FAILURE_BUCKET_ID: 0x7E_rdyboost!XpressDecodeClose+7b1 BUCKET_ID: 0x7E_rdyboost!XpressDecodeClose+7b1 Followup: MachineOwner --------- kd> lmtsmn start end module name 873cb000 873f7000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F) 869be000 86a06000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 86b55000 86b5e000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 86ae3000 86aec000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 86aec000 86b0f000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 872ee000 872f5000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 86f39000 86f47000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8684a000 86852000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 873ac000 873cb000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 86894000 8693f000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 87290000 872b5000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 86852000 86894000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 86d86000 86de3000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 86f47000 86f54000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 872ce000 872db000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 8727f000 87290000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 86c00000 86c09000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 872db000 872e6000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 86bb6000 86bc7000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 86c09000 86c13000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 8ce90000 8cea7000 dxg dxg.sys unavailable (00000000) 87000000 8700b000 fdc fdc.sys Mon Jul 13 19:45:45 2009 (4A5BC729) 86b92000 86ba3000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 86ff4000 86ffe000 flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729) 86b5e000 86b92000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 8cf40000 8cf48000 framebuf framebuf.dll unavailable (00000000) 86df1000 86dfa000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8724d000 8727f000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55) 8716b000 8719c000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 81c02000 81c39000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 87245000 8724d000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 86f14000 86f2c000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 86f2c000 86f39000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80bbf000 80bc7000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 86f6e000 86fa2000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0) 86d73000 86d86000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 86eef000 86f14000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 86ba3000 86bb1100 Lbd Lbd.sys Tue May 25 03:45:27 2010 (4BFB8017) 8682e000 86839000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89) 8700b000 87018000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 86acd000 86ae3000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 8732f000 8733a000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 86a0f000 86a17000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 86d48000 86d73000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F) 87018000 87022000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 87235000 87245000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 86dfa000 86eb1000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 86eb1000 86eef000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 8733a000 87348000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 81c39000 82039000 nt ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B) 86c19000 86d48000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 872e7000 872ee000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10) 87219000 87235000 nv_agp nv_agp.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 873f7000 873feb00 nvoclock nvoclock.sys Tue Sep 15 17:59:22 2009 (4AB00E3A) 86a4c000 86a5d000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 86a17000 86a41000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 86ab8000 86abf000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 86abf000 86acd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 86de3000 86df1000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 86839000 8684a000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 86f54000 86f5e000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 871ec000 87219000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 86b2f000 86b55000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733) 86b0f000 86b2f000 SI3112r SI3112r.sys Thu Aug 16 22:00:39 2007 (46C50147) 86bb2000 86bb5100 SiWinAcc SiWinAcc.sys Thu Jun 14 20:02:27 2007 (4671D713) 871e4000 871e5380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 87022000 8716b000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB) 86f5e000 86f6e000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 8cec0000 8cec9000 TSDDD TSDDD.dll unavailable (00000000) 86fa2000 86fb0000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 872b5000 872cc000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883) 872cc000 872cd700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 8739d000 873ac000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 86fb0000 86ff4000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 87348000 87352000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 87352000 8739d000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 86a41000 86a4c000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 872f5000 87301000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 87301000 87322000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 8719c000 871a4380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C) 86a5d000 86a6d000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 86a6d000 86ab8000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 871a5000 871e4000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 87322000 8732f000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8693f000 869b0000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 869b0000 869be000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8cc40000 8ce8b000 win32k win32k.sys unavailable (00000000) 86a06000 86a0f000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) Unloaded modules: 872b5000 872c2000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 872c2000 872cd000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 872cd000 872d6000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 872d6000 872e7000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 871e4000 871ec000 spldr.sys Timestamp: unavailable (00000000) Checksum: 00000000
Last edited by CarlTR6; 09 Jan 2011 at 20:47. Reason: Corredted typos
I have updated these drivers as reccommended. Unfortunately no change - BSOD immediately after Windows starts
Follow the instructions in this tutorial: https://www.sevenforums.com/crashes-d...tructions.html
Here it is. I have re-installed OS only 3 days ago, retail version. The problems pesists for months.
I looked at your two most recent dumps. Both are bugcheck 50 and both indicate memory corruption. I looked at the drivers using your very latest dump. I find seven that are out of date and six of these are XP drivers. Software and hardware designed for XP and not updated for Win 7 are not going to run on Win 7 without causing problems. You need to update these drivers or eliminate them by uninstalling the hardware/software they are associated with or renaming them.
Before we can even begin to look at other causes, you need to take care of these drivers. If you ned help with them, please post back.hcw18bda.sys Thu May 28 11:46:17 2009 - Huappage WinTV driver. Hauppauge Computer Works : Support. Update this driver or upgrade to a TV tuner certified campatible with Win 7.
nvax.sys Wed Apr 13 15:32:41 2005 - NVIDIA® nForce(TM) MCP Audio Enumerator. Drivers - Download NVIDIA Drivers. This is an XP driver. Update it or uninstall what ever it is associated with.
nvm60x32.sys Sat Oct 07 00:30:59 2006 - nVidia MCP Networking Function Driver. Drivers - Download NVIDIA Drivers. This is an XP driver. Update it.
nvmpu401.sys Wed Apr 13 15:34:22 2005 - nVidia nForce MPU401 Driver. Drivers - Download NVIDIA Drivers. XP driver. Update.
RTKVAC.SYS Thu Jun 18 15:36:37 2009 - Realtek AC '97 audio. Realtek. Update this driver.
SI3112r.sys Thu Aug 16 22:00:39 2007 - Silicon Image SiI 3112 SATARaid Controller. Silicon Image - Support.
SiWinAcc.sys Thu Jun 14 20:02:27 2007 - Silicon Image driver - comes with package for the SIxxxx drivers. Silicon Image - Support.
I presume that you upgraded your computer to Win 7? Did you You run the Win 7 upgrade advisor before your did so? Windows 7 Upgrade Advisor - Download - Microsoft Windows
Have you checked your hardware and software for compatibility? Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads
Code:Windows 7 Kernel Version 7600 UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.x86fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0x82809000 PsLoadedModuleList = 0x82948570 Debug session time: Sun Jan 9 00:30:01.134 2011 (GMT-5) System Uptime: 0 days 3:06:14.525 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list ..... kd> !Analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {b525a9ac, 0, 959afc10, 0} Could not read faulting driver name Probably caused by : win32k.sys ( win32k!HwndLookupCompareTableData+d ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: b525a9ac, memory referenced. Arg2: 00000000, value 0 = read operation, 1 = write operation. Arg3: 959afc10, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from 82968700 Unable to read MiSystemVaType memory at 829480c0 b525a9ac FAULTING_IP: win32k!HwndLookupCompareTableData+d 959afc10 8b09 mov ecx,dword ptr [ecx] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 TRAP_FRAME: 9f68e684 -- (.trap 0xffffffff9f68e684) ErrCode = 00000000 eax=000100c6 ebx=00000000 ecx=b525a9ac edx=00000001 esi=b525a994 edi=ff9fb008 eip=959afc10 esp=9f68e6f8 ebp=9f68e6f8 iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 win32k!HwndLookupCompareTableData+0xd: 959afc10 8b09 mov ecx,dword ptr [ecx] ds:0023:b525a9ac=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82841988 to 82867c46 STACK_TEXT: 9f68e66c 82841988 00000000 b525a9ac 00000000 nt!MmAccessFault+0xbf 9f68e66c 959afc10 00000000 b525a9ac 00000000 nt!KiTrap0E+0xdc 9f68e6f8 828a344a ff9fb008 9f68e754 b525a9ac win32k!HwndLookupCompareTableData+0xd 9f68e710 828bf767 9f68e754 9f68e748 00200000 nt!SwapSplayLinks+0xf6 9f68e728 828bf7aa ff9fb008 9f68e754 9f68e748 nt!RtlLookupElementGenericTableFull+0x16 9f68e740 959afc5c ff9fb008 9f68e754 9f68e808 nt!RtlLookupElementGenericTable+0x18 9f68e75c 959af869 ff9fb030 00000001 9f68e828 win32k!DWMSPRITEREF::hspLookupWindow+0x31 9f68e76c 959aefd0 000100c6 00000000 fd5fc728 win32k!DWMALTSPRITEREF::DWMALTSPRITEREF+0x19 9f68e828 959afba8 ffb89008 000100c6 00000000 win32k!GreUpdateSprite+0xb7 9f68ea64 959c8ce3 9f68eabc 959cc166 9f68eb3c win32k!GreUpdateSpriteDevLockEnd+0x320 9f68ea6c 959cc166 9f68eb3c fd63d428 9f68ea94 win32k!DEVLOCKBLTOBJ::vFlushSpriteUpdates+0x33 9f68ea80 959cce62 4801098a 38010f95 fd650938 win32k!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x25 9f68eb50 95958ee8 ffbbd550 95b052f0 ffbbd550 win32k!NtGdiBitBltInternal+0x73b 9f68ebb0 95959e0f fd650938 38010f95 9f68ebd0 win32k!CenterOrStretchWallpaper+0xa3 9f68ebe4 9594fb1e fd650938 fe800618 38010f95 win32k!xxxDrawWallpaper+0x86 9f68ec2c 95973213 ff5d1d28 38010f95 9f68ec60 win32k!xxxDesktopPaintCallback+0x166 9f68ec90 9594f91d 38010f95 00000000 9594f9b8 win32k!xxxEnumDisplayMonitors+0x259 9f68ecec 9595481d fe800618 38010f95 fd650938 win32k!xxxInternalPaintDesktop+0x9c 9f68ed28 8283e79a 38010f95 0016f6c0 775d64f4 win32k!NtUserPaintDesktop+0x70 9f68ed28 775d64f4 38010f95 0016f6c0 775d64f4 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0016f6c0 00000000 00000000 00000000 00000000 0x775d64f4 STACK_COMMAND: kb FOLLOWUP_IP: win32k!HwndLookupCompareTableData+d 959afc10 8b09 mov ecx,dword ptr [ecx] SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: win32k!HwndLookupCompareTableData+d FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4cbe5b31 FAILURE_BUCKET_ID: 0x50_win32k!HwndLookupCompareTableData+d BUCKET_ID: 0x50_win32k!HwndLookupCompareTableData+d Followup: MachineOwner --------- Debug session time: Sun Jan 9 10:30:07.621 2011 (GMT-5) System Uptime: 0 days 1:44:32.027 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ....... kd> !Analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {c09d94e8, 1, 828bc1b1, 2} Probably caused by : memory_corruption ( nt!MiReplaceWsleHash+71 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: c09d94e8, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 828bc1b1, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82999700 Unable to read MiSystemVaType memory at 829790c0 c09d94e8 FAULTING_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: Ad-Aware.exe CURRENT_IRQL: 0 TRAP_FRAME: 8f3e9bac -- (.trap 0xffffffff8f3e9bac) ErrCode = 00000002 eax=c0801000 ebx=0007613a ecx=00000003 edx=c0800001 esi=c0402000 edi=8466ac70 eip=828bc1b1 esp=8f3e9c20 ebp=8f3e9c24 iopl=0 nv up ei pl nz ac pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216 nt!MiReplaceWsleHash+0x71: 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx ds:0023:c09d94e8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82872988 to 82898c46 STACK_TEXT: 8f3e9b94 82872988 00000001 c09d94e8 00000000 nt!MmAccessFault+0xbf 8f3e9b94 828bc1b1 00000001 c09d94e8 00000000 nt!KiTrap0E+0xdc 8f3e9c24 828b8326 7613a005 00000003 0000093a nt!MiReplaceWsleHash+0x71 8f3e9c5c 828b0899 8466ac70 8466aa80 00000000 nt!MiRemoveWorkingSetPages+0xdd 8f3e9c88 82a4b296 99d445e9 00000000 84674930 nt!MmCleanProcessAddressSpace+0x493 8f3e9cfc 82a52cd9 00000000 ffffffff 0012fe80 nt!PspExitThread+0x683 8f3e9d24 8286f79a ffffffff 00000012 0012fe8c nt!NtTerminateProcess+0x1fa 8f3e9d24 778664f4 ffffffff 00000012 0012fe8c nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0012fe8c 00000000 00000000 00000000 00000000 0x778664f4 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!MiReplaceWsleHash+71 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3f9b IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: c09d94e8, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 828bc1b1, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82999700 Unable to read MiSystemVaType memory at 829790c0 c09d94e8 FAULTING_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: Ad-Aware.exe CURRENT_IRQL: 0 TRAP_FRAME: 8f3e9bac -- (.trap 0xffffffff8f3e9bac) ErrCode = 00000002 eax=c0801000 ebx=0007613a ecx=00000003 edx=c0800001 esi=c0402000 edi=8466ac70 eip=828bc1b1 esp=8f3e9c20 ebp=8f3e9c24 iopl=0 nv up ei pl nz ac pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216 nt!MiReplaceWsleHash+0x71: 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx ds:0023:c09d94e8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82872988 to 82898c46 STACK_TEXT: 8f3e9b94 82872988 00000001 c09d94e8 00000000 nt!MmAccessFault+0xbf 8f3e9b94 828bc1b1 00000001 c09d94e8 00000000 nt!KiTrap0E+0xdc 8f3e9c24 828b8326 7613a005 00000003 0000093a nt!MiReplaceWsleHash+0x71 8f3e9c5c 828b0899 8466ac70 8466aa80 00000000 nt!MiRemoveWorkingSetPages+0xdd 8f3e9c88 82a4b296 99d445e9 00000000 84674930 nt!MmCleanProcessAddressSpace+0x493 8f3e9cfc 82a52cd9 00000000 ffffffff 0012fe80 nt!PspExitThread+0x683 8f3e9d24 8286f79a ffffffff 00000012 0012fe8c nt!NtTerminateProcess+0x1fa 8f3e9d24 778664f4 ffffffff 00000012 0012fe8c nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0012fe8c 00000000 00000000 00000000 00000000 0x778664f4 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!MiReplaceWsleHash+71 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3f9b IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 Followup: MachineOwner --------- kd> lmtsmn start end module name 8df66000 8df92000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F) 875be000 87606000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 87b12000 87b6c000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 8dfdc000 8dfee000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954) 8dcf4000 8dd05000 amdppm amdppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 87755000 8775e000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 898ff000 89901b00 aswFsBlk aswFsBlk.SYS Fri Dec 31 11:27:02 2010 (4D1E0456) 898c8000 898ff000 aswMonFlt aswMonFlt.sys Fri Dec 31 11:27:12 2010 (4D1E0460) 87fad000 87fb1200 aswRdr aswRdr.SYS Fri Dec 31 11:27:24 2010 (4D1E046C) 8dc8c000 8dcd2200 aswSP aswSP.SYS Fri Dec 31 15:00:16 2010 (4D1E3650) 87fa3000 87facf00 aswTdi aswTdi.SYS Fri Dec 31 11:29:58 2010 (4D1E0506) 89bb8000 89bc1000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946) 876e3000 876ec000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 876ec000 8770f000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 8f435000 8fadb000 atikmdag atikmdag.sys Thu Nov 25 21:43:13 2010 (4CEF1EC1) 8df92000 8dfcf000 atikmpag atikmpag.sys Thu Nov 25 21:16:27 2010 (4CEF187B) 8ebfb000 8ebfe000 BdaSup BdaSup.SYS Mon Jul 13 19:51:23 2009 (4A5BC87B) 87f0f000 87f16000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 8dc7e000 8dc8c000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8744a000 87452000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 899ea000 89a03000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD) 95f40000 95f5e000 cdd cdd.dll unavailable (00000000) 87ee9000 87f08000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 87494000 8753f000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 87e92000 87eb7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 87452000 87494000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 87984000 879e1000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 8dfcf000 8dfdc000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 8fcc8000 8fcd5000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 8dc02000 8dc66000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 8dc66000 8dc7e000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 87800000 8780c000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 87e81000 87e92000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 8de68000 8de81000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5) 8fce0000 8fce9000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8fcd5000 8fce0000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8fce9000 8fcfa000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 8fd13000 8fd1d000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 8fadb000 8fb92000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1) 8fb92000 8fbcb000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 8fbcb000 8fbd6000 fdc fdc.sys unavailable (00000000) 87792000 877a3000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 8fcad000 8fcb7000 flpydisk flpydisk.sys unavailable (00000000) 8775e000 87792000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 879ef000 879f8000 Fs_Rec Fs_Rec.sys unavailable (00000000) 87e4f000 87e81000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55) 87d6d000 87d9e000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 82803000 8283a000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 8df06000 8df65880 hcw18bda hcw18bda.sys Thu May 28 11:46:17 2009 (4A1EB1C9) 89965000 899ea000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75) 87e47000 87e4f000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 8f400000 8f418000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 8f425000 8f432000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80bca000 80bd2000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 89bc1000 89bc3180 KernExplorer KernExplorer.sys Mon Oct 25 03:11:19 2010 (4CC52D97) 8de81000 8deb5000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0) 87971000 87984000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 87aed000 87b12000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 877a3000 877b1100 Lbd Lbd.sys Tue May 25 03:45:27 2010 (4BFB8017) 89902000 89912000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE) 898ad000 898c8000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020) 89bb3000 89bb7a80 LVPr2Mon LVPr2Mon.sys Fri May 07 21:36:25 2010 (4BE4C019) 8985e000 898a1a00 lvrs lvrs.sys Tue Nov 09 21:38:10 2010 (4CDA0592) 8942c000 89849c80 lvuvc lvuvc.sys Tue Nov 09 21:38:23 2010 (4CDA059F) 8742e000 87439000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89) 898a2000 898ad000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286) 8f418000 8f425000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 876cd000 876e3000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 89a03000 89a15000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4) 89a15000 89a38000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72) 89a38000 89a73000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85) 89a73000 89a8e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B) 87f68000 87f73000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8760f000 87617000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 87946000 87971000 msrpc msrpc.sys unavailable (00000000) 87bf4000 87bfe000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 87e37000 87e47000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 879f8000 87aaf000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 8dfee000 8dff9000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930) 877ce000 877f0000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A) 8fcb7000 8fcc8000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933) 87feb000 87ff9000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 87fb2000 87fe4000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 87aaf000 87aed000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 87f73000 87f81000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 87bea000 87bf4000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 8283a000 82c3a000 nt ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B) 87817000 87946000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 87f08000 87f0f000 Null Null.SYS unavailable (00000000) 87e1b000 87e37000 nv_agp nv_agp.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 8de2b000 8de38080 nvax nvax.sys Wed Apr 13 15:32:41 2005 (425D73D9) 8dd69000 8de2b000 nvm60x32 nvm60x32.sys Sat Oct 07 00:30:59 2006 (45272D83) 8f432000 8f434800 nvmpu401 nvmpu401.sys Wed Apr 13 15:34:22 2005 (425D743E) 8fc53000 8fc5ab00 nvoclock nvoclock.sys Tue Sep 15 17:59:22 2009 (4AB00E3A) 87c00000 87c1f000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 8fbe0000 8fbf8000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E) 8764c000 8765d000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 89a8e000 89a95000 parvdm parvdm.sys unavailable (00000000) 87617000 87641000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 876b8000 876bf000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 876bf000 876cd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 879e1000 879ef000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 89a95000 89b2c000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0) 8de39000 8de68000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864) 87439000 8744a000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 877b6000 877ce000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939) 87400000 87418000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D) 8fc19000 8fc30000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947) 8fc30000 8fc47000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951) 87ba9000 87bea000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 8fc47000 8fc51000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 87f50000 87f58000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 87f58000 87f60000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 87f60000 87f68000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 87dee000 87e1b000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 89912000 89925000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0) 8e801000 8ebfa200 RTKVAC RTKVAC.SYS Thu Jun 18 15:36:37 2009 (4A3A9745) 8772f000 87755000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733) 89b2c000 89b36000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528) 8fbd6000 8fbe0000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717) 87b6c000 87b86000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D) 8770f000 8772f000 SI3112r SI3112r.sys Thu Aug 16 22:00:39 2007 (46C50147) 877b2000 877b5100 SiWinAcc SiWinAcc.sys Thu Jun 14 20:02:27 2007 (4671D713) 87de6000 87dee000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) 8fd34000 8fd85000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E) 89b64000 89bb3000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165) 89b36000 89b57000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F) 8fc51000 8fc52380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 87c24000 87d6d000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB) 89b57000 89b64000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926) 87f98000 87fa3000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 87f81000 87f98000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 87b99000 87ba9000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 95f10000 95f19000 TSDDD TSDDD.dll unavailable (00000000) 8dcd3000 8dcf4000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 89925000 89965000 udfs udfs.sys Mon Jul 13 19:14:09 2009 (4A5BBFC1) 8fc5b000 8fc69000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 8984a000 8985db00 usbaudio usbaudio.sys Mon Jul 13 19:51:23 2009 (4A5BC87B) 8fd1d000 8fd34000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883) 8fd11000 8fd12700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 8dd5a000 8dd69000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 8fc69000 8fcad000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 8dd05000 8dd0f000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 8dd0f000 8dd5a000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 87641000 8764c000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 87f16000 87f22000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 87f22000 87f43000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 87d9e000 87da7000 vmstorfl vmstorfl.sys unavailable (00000000) 8765d000 8766d000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8766d000 876b8000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 87da7000 87de6000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 87b86000 87b99000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 87f43000 87f50000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8753f000 875b0000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 875b0000 875be000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 87fe4000 87feb000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 95cb0000 95efb000 win32k win32k.sys Tue Oct 19 23:00:01 2010 (4CBE5B31) 87606000 8760f000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) 8deb5000 8df06000 yk62x86 yk62x86.sys Mon Sep 28 02:33:34 2009 (4AC058BE) Unloaded modules: 8fcfa000 8fd11000 USBSTOR.SYS Timestamp: unavailable (00000000) Checksum: 00000000 8fdef000 8fe59000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 8fd85000 8fdef000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 87eb7000 87ec4000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 87ec4000 87ecf000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 87ecf000 87ed8000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 87ed8000 87ee9000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 Debug session time: Sun Jan 9 10:30:07.621 2011 (GMT-5) System Uptime: 0 days 1:44:32.027 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ....... kd> !Analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {c09d94e8, 1, 828bc1b1, 2} Probably caused by : memory_corruption ( nt!MiReplaceWsleHash+71 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: c09d94e8, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 828bc1b1, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82999700 Unable to read MiSystemVaType memory at 829790c0 c09d94e8 FAULTING_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: Ad-Aware.exe CURRENT_IRQL: 0 TRAP_FRAME: 8f3e9bac -- (.trap 0xffffffff8f3e9bac) ErrCode = 00000002 eax=c0801000 ebx=0007613a ecx=00000003 edx=c0800001 esi=c0402000 edi=8466ac70 eip=828bc1b1 esp=8f3e9c20 ebp=8f3e9c24 iopl=0 nv up ei pl nz ac pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216 nt!MiReplaceWsleHash+0x71: 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx ds:0023:c09d94e8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82872988 to 82898c46 STACK_TEXT: 8f3e9b94 82872988 00000001 c09d94e8 00000000 nt!MmAccessFault+0xbf 8f3e9b94 828bc1b1 00000001 c09d94e8 00000000 nt!KiTrap0E+0xdc 8f3e9c24 828b8326 7613a005 00000003 0000093a nt!MiReplaceWsleHash+0x71 8f3e9c5c 828b0899 8466ac70 8466aa80 00000000 nt!MiRemoveWorkingSetPages+0xdd 8f3e9c88 82a4b296 99d445e9 00000000 84674930 nt!MmCleanProcessAddressSpace+0x493 8f3e9cfc 82a52cd9 00000000 ffffffff 0012fe80 nt!PspExitThread+0x683 8f3e9d24 8286f79a ffffffff 00000012 0012fe8c nt!NtTerminateProcess+0x1fa 8f3e9d24 778664f4 ffffffff 00000012 0012fe8c nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0012fe8c 00000000 00000000 00000000 00000000 0x778664f4 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!MiReplaceWsleHash+71 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3f9b IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: c09d94e8, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 828bc1b1, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82999700 Unable to read MiSystemVaType memory at 829790c0 c09d94e8 FAULTING_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: Ad-Aware.exe CURRENT_IRQL: 0 TRAP_FRAME: 8f3e9bac -- (.trap 0xffffffff8f3e9bac) ErrCode = 00000002 eax=c0801000 ebx=0007613a ecx=00000003 edx=c0800001 esi=c0402000 edi=8466ac70 eip=828bc1b1 esp=8f3e9c20 ebp=8f3e9c24 iopl=0 nv up ei pl nz ac pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216 nt!MiReplaceWsleHash+0x71: 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx ds:0023:c09d94e8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82872988 to 82898c46 STACK_TEXT: 8f3e9b94 82872988 00000001 c09d94e8 00000000 nt!MmAccessFault+0xbf 8f3e9b94 828bc1b1 00000001 c09d94e8 00000000 nt!KiTrap0E+0xdc 8f3e9c24 828b8326 7613a005 00000003 0000093a nt!MiReplaceWsleHash+0x71 8f3e9c5c 828b0899 8466ac70 8466aa80 00000000 nt!MiRemoveWorkingSetPages+0xdd 8f3e9c88 82a4b296 99d445e9 00000000 84674930 nt!MmCleanProcessAddressSpace+0x493 8f3e9cfc 82a52cd9 00000000 ffffffff 0012fe80 nt!PspExitThread+0x683 8f3e9d24 8286f79a ffffffff 00000012 0012fe8c nt!NtTerminateProcess+0x1fa 8f3e9d24 778664f4 ffffffff 00000012 0012fe8c nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0012fe8c 00000000 00000000 00000000 00000000 0x778664f4 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiReplaceWsleHash+71 828bc1b1 890c98 mov dword ptr [eax+ebx*4],ecx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!MiReplaceWsleHash+71 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3f9b IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 BUCKET_ID: 0x50_nt!MiReplaceWsleHash+71 Followup: MachineOwner --------- kd> lmtsmn start end module name 8df66000 8df92000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F) 875be000 87606000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 87b12000 87b6c000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 8dfdc000 8dfee000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954) 8dcf4000 8dd05000 amdppm amdppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 87755000 8775e000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 898ff000 89901b00 aswFsBlk aswFsBlk.SYS Fri Dec 31 11:27:02 2010 (4D1E0456) 898c8000 898ff000 aswMonFlt aswMonFlt.sys Fri Dec 31 11:27:12 2010 (4D1E0460) 87fad000 87fb1200 aswRdr aswRdr.SYS Fri Dec 31 11:27:24 2010 (4D1E046C) 8dc8c000 8dcd2200 aswSP aswSP.SYS Fri Dec 31 15:00:16 2010 (4D1E3650) 87fa3000 87facf00 aswTdi aswTdi.SYS Fri Dec 31 11:29:58 2010 (4D1E0506) 89bb8000 89bc1000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946) 876e3000 876ec000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 876ec000 8770f000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 8f435000 8fadb000 atikmdag atikmdag.sys Thu Nov 25 21:43:13 2010 (4CEF1EC1) 8df92000 8dfcf000 atikmpag atikmpag.sys Thu Nov 25 21:16:27 2010 (4CEF187B) 8ebfb000 8ebfe000 BdaSup BdaSup.SYS Mon Jul 13 19:51:23 2009 (4A5BC87B) 87f0f000 87f16000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 8dc7e000 8dc8c000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8744a000 87452000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 899ea000 89a03000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD) 95f40000 95f5e000 cdd cdd.dll unavailable (00000000) 87ee9000 87f08000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 87494000 8753f000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 87e92000 87eb7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 87452000 87494000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 87984000 879e1000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 8dfcf000 8dfdc000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 8fcc8000 8fcd5000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 8dc02000 8dc66000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 8dc66000 8dc7e000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 87800000 8780c000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 87e81000 87e92000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 8de68000 8de81000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5) 8fce0000 8fce9000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8fcd5000 8fce0000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8fce9000 8fcfa000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 8fd13000 8fd1d000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 8fadb000 8fb92000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1) 8fb92000 8fbcb000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 8fbcb000 8fbd6000 fdc fdc.sys unavailable (00000000) 87792000 877a3000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 8fcad000 8fcb7000 flpydisk flpydisk.sys unavailable (00000000) 8775e000 87792000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 879ef000 879f8000 Fs_Rec Fs_Rec.sys unavailable (00000000) 87e4f000 87e81000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55) 87d6d000 87d9e000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 82803000 8283a000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 8df06000 8df65880 hcw18bda hcw18bda.sys Thu May 28 11:46:17 2009 (4A1EB1C9) 89965000 899ea000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75) 87e47000 87e4f000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 8f400000 8f418000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 8f425000 8f432000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80bca000 80bd2000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 89bc1000 89bc3180 KernExplorer KernExplorer.sys Mon Oct 25 03:11:19 2010 (4CC52D97) 8de81000 8deb5000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0) 87971000 87984000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 87aed000 87b12000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 877a3000 877b1100 Lbd Lbd.sys Tue May 25 03:45:27 2010 (4BFB8017) 89902000 89912000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE) 898ad000 898c8000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020) 89bb3000 89bb7a80 LVPr2Mon LVPr2Mon.sys Fri May 07 21:36:25 2010 (4BE4C019) 8985e000 898a1a00 lvrs lvrs.sys Tue Nov 09 21:38:10 2010 (4CDA0592) 8942c000 89849c80 lvuvc lvuvc.sys Tue Nov 09 21:38:23 2010 (4CDA059F) 8742e000 87439000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89) 898a2000 898ad000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286) 8f418000 8f425000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 876cd000 876e3000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 89a03000 89a15000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4) 89a15000 89a38000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72) 89a38000 89a73000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85) 89a73000 89a8e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B) 87f68000 87f73000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8760f000 87617000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 87946000 87971000 msrpc msrpc.sys unavailable (00000000) 87bf4000 87bfe000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 87e37000 87e47000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 879f8000 87aaf000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 8dfee000 8dff9000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930) 877ce000 877f0000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A) 8fcb7000 8fcc8000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933) 87feb000 87ff9000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 87fb2000 87fe4000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 87aaf000 87aed000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 87f73000 87f81000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 87bea000 87bf4000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 8283a000 82c3a000 nt ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B) 87817000 87946000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 87f08000 87f0f000 Null Null.SYS unavailable (00000000) 87e1b000 87e37000 nv_agp nv_agp.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 8de2b000 8de38080 nvax nvax.sys Wed Apr 13 15:32:41 2005 (425D73D9) 8dd69000 8de2b000 nvm60x32 nvm60x32.sys Sat Oct 07 00:30:59 2006 (45272D83) 8f432000 8f434800 nvmpu401 nvmpu401.sys Wed Apr 13 15:34:22 2005 (425D743E) 8fc53000 8fc5ab00 nvoclock nvoclock.sys Tue Sep 15 17:59:22 2009 (4AB00E3A) 87c00000 87c1f000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 8fbe0000 8fbf8000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E) 8764c000 8765d000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 89a8e000 89a95000 parvdm parvdm.sys unavailable (00000000) 87617000 87641000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 876b8000 876bf000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 876bf000 876cd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 879e1000 879ef000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 89a95000 89b2c000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0) 8de39000 8de68000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864) 87439000 8744a000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 877b6000 877ce000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939) 87400000 87418000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D) 8fc19000 8fc30000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947) 8fc30000 8fc47000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951) 87ba9000 87bea000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 8fc47000 8fc51000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 87f50000 87f58000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 87f58000 87f60000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 87f60000 87f68000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 87dee000 87e1b000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 89912000 89925000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0) 8e801000 8ebfa200 RTKVAC RTKVAC.SYS Thu Jun 18 15:36:37 2009 (4A3A9745) 8772f000 87755000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733) 89b2c000 89b36000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528) 8fbd6000 8fbe0000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717) 87b6c000 87b86000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D) 8770f000 8772f000 SI3112r SI3112r.sys Thu Aug 16 22:00:39 2007 (46C50147) 877b2000 877b5100 SiWinAcc SiWinAcc.sys Thu Jun 14 20:02:27 2007 (4671D713) 87de6000 87dee000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) 8fd34000 8fd85000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E) 89b64000 89bb3000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165) 89b36000 89b57000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F) 8fc51000 8fc52380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 87c24000 87d6d000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB) 89b57000 89b64000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926) 87f98000 87fa3000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 87f81000 87f98000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 87b99000 87ba9000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 95f10000 95f19000 TSDDD TSDDD.dll unavailable (00000000) 8dcd3000 8dcf4000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 89925000 89965000 udfs udfs.sys Mon Jul 13 19:14:09 2009 (4A5BBFC1) 8fc5b000 8fc69000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 8984a000 8985db00 usbaudio usbaudio.sys Mon Jul 13 19:51:23 2009 (4A5BC87B) 8fd1d000 8fd34000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883) 8fd11000 8fd12700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 8dd5a000 8dd69000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 8fc69000 8fcad000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 8dd05000 8dd0f000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 8dd0f000 8dd5a000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 87641000 8764c000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 87f16000 87f22000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 87f22000 87f43000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 87d9e000 87da7000 vmstorfl vmstorfl.sys unavailable (00000000) 8765d000 8766d000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8766d000 876b8000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 87da7000 87de6000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 87b86000 87b99000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 87f43000 87f50000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8753f000 875b0000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 875b0000 875be000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 87fe4000 87feb000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 95cb0000 95efb000 win32k win32k.sys Tue Oct 19 23:00:01 2010 (4CBE5B31) 87606000 8760f000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) 8deb5000 8df06000 yk62x86 yk62x86.sys Mon Sep 28 02:33:34 2009 (4AC058BE) Unloaded modules: 8fcfa000 8fd11000 USBSTOR.SYS Timestamp: unavailable (00000000) Checksum: 00000000 8fdef000 8fe59000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 8fd85000 8fdef000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 87eb7000 87ec4000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 87ec4000 87ecf000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 87ecf000 87ed8000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 87ed8000 87ee9000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000