BSOD - no idea why


  1. Posts : 5
    Windows 7 ultimate x64
       #1

    BSOD - no idea why


    Hi!
    Ive got BSOD the last weeks now and now im getting really tired of it. Sometimes I can use the computer for a couple of hours atleast, but mostly its only usable around 1-10 min before the bluescreen pops up again. Ive attached a "BSOD Dump & System File Collection" report. Couldnt do the other report, dont know how I do it. Would really appreciate some help!
    Regards
    Axel
      My Computer


  2. Posts : 5
    Windows 7 ultimate x64
    Thread Starter
       #2

    This is the latest bluescreen info:

    Problemsignatur:
    Problemhändelsens namn: BlueScreen
    OS-version: 6.1.7600.2.0.0.256.1
    Språkvariant-ID: 1053

    Ytterligare information om problemet:
    BCCode: a
    BCP1: 000000000000099C
    BCP2: 0000000000000002
    BCP3: 0000000000000000
    BCP4: FFFFF80002AAB436
    OS Version: 6_1_7600
    Service Pack: 0_0
    Product: 256_1
      My Computer


  3. Posts : 670
    Windows 7 x64
       #3

    1. Update Realtek Ethernet NIC driver
    Rtnic64.sys Fri May 30 11:12:23 2008


    2. Uninstall DT driver sptd.sys:
    DuplexSecure - FAQ


    3. Important! Every thread starter please see.
    CPUZ memory tab
    Rammon html






    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030711-29468-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`01e12000 PsLoadedModuleList = 0xfffff800`0204fe50
    Debug session time: Mon Mar  7 14:10:51.480 2011 (UTC - 5:00)
    System Uptime: 0 days 0:10:50.027
    Loading Kernel Symbols
    ...............................................................
    ...........................................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff80001ea2436}
    
    Probably caused by : win32k.sys ( win32k!HmgNextOwned+5b )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80001ea2436, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800020ba0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c73
    fffff800`01ea2436 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  MpCmdRun.exe
    
    IRP_ADDRESS:  ffffffffffffff88
    
    TRAP_FRAME:  fffff88003f82350 -- (.trap 0xfffff88003f82350)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88003f82418 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80001ea2436 rsp=fffff88003f824e0 rbp=fffff88003f82630
     r8=fffffa8003bbadf0  r9=fffff88003f825e0 r10=0000000000000002
    r11=fffffa80036420a0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!IopCompleteRequest+0xc73:
    fffff800`01ea2436 488b09          mov     rcx,qword ptr [rcx] ds:76a8:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80001e81ca9 to fffff80001e82740
    
    STACK_TEXT:  
    fffff880`03f82208 fffff800`01e81ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03f82210 fffff800`01e80920 : fffffa80`019ff790 fffffa80`019ff790 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`03f82350 fffff800`01ea2436 : fffff900`c1b14410 fffff800`01fb72dd fffff900`c1b14410 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`03f824e0 fffff800`01e5f0c7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`00012fec : nt!IopCompleteRequest+0xc73
    fffff880`03f825b0 fffff800`01e5f487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`03f82630 fffff960`0015de2b : fffffa80`01b31c90 00000000`00000030 00000000`00000001 fffff900`c1b2c900 : nt!KiApcInterrupt+0xd7
    fffff880`03f827c0 fffff960`0015d419 : 00000000`0000056c 00000000`0000056c fffff880`03f82c00 00000000`ffffffff : win32k!HmgNextOwned+0x5b
    fffff880`03f827f0 fffff960`00154c00 : 00000000`0000056c fffff880`03f82c00 fffff900`c1b2c900 fffff900`00000000 : win32k!NtGdiCloseProcess+0x85
    fffff880`03f82850 fffff960`00154337 : fffffa80`0333fc00 fffff880`03f82c20 fffffa80`035b0000 fffff8a0`003d1001 : win32k!GdiProcessCallout+0x200
    fffff880`03f828d0 fffff800`02167a01 : fffffa80`0333fc30 00000000`00000000 00000000`00000000 fffffa80`01b31630 : win32k!W32pProcessCallout+0x6b
    fffff880`03f82900 fffff800`02140635 : 00000000`00000000 fffff800`02181101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
    fffff880`03f829c0 fffff800`01e5f1db : fffffa80`035b6601 fffffa80`03c7e010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`03f829f0 fffff800`01e5f620 : 00000000`001e1840 fffff880`03f82a70 fffff800`0214074c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`03f82a70 fffff800`01e81a37 : 00000000`0000052d 00000000`00000000 000007ff`fffae000 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
    fffff880`03f82bb0 00000000`778f008a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`011bedc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778f008a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!HmgNextOwned+5b
    fffff960`0015de2b ebdf            jmp     win32k!HmgNextOwned+0x3c (fffff960`0015de0c)
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  win32k!HmgNextOwned+5b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cbe5d3e
    
    FAILURE_BUCKET_ID:  X64_0xA_win32k!HmgNextOwned+5b
    
    BUCKET_ID:  X64_0xA_win32k!HmgNextOwned+5b
    
    Followup: MachineOwner
    ---------



    Drivers:

    Code:
    start             end                 module name
    fffff880`02bad000 fffff880`02beb000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`01137000 fffff880`011c1000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02c0b000 fffff880`02c21000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`02502000 fffff880`02516000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
    fffff880`00fdc000 fffff880`00fe7000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00e86000 fffff880`00e8f000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fb2000 fffff880`00fdc000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`02c43000 fffff880`02dca000   athrx    athrx.sys    Wed Jan 27 20:25:39 2010 (4B60E793)
    fffff880`011f3000 fffff880`011ff000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`0124c000 fffff880`01253000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02dd7000 fffff880`02de8000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`03ad3000 fffff880`03af1000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff880`02b64000 fffff880`02b8e000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cb9000 fffff880`00d79000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c5b000 fffff880`00cb9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`014f8000 fffff880`0156b000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`011ea000 fffff880`011f3000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`02de8000 fffff880`02df8000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02597000 fffff880`025a5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02741000 fffff880`027c4000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`027c4000 fffff880`027e2000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`015d2000 fffff880`015e8000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`025b1000 fffff880`025ba000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`025a5000 fffff880`025b1000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`025ba000 fffff880`025cd000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0240e000 fffff880`0241a000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff960`00460000 fffff960`0047e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`02442000 fffff880`02478000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`00fe7000 fffff880`00ffb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00d79000 fffff880`00dc5000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff960`008b0000 fffff960`008b9000   framebuf framebuf.dll unavailable (00000000)
    fffff880`0157c000 fffff880`01586000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01446000 fffff880`01480000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0162b000 fffff880`01675000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`02b8e000 fffff880`02b9b000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`023ee000 fffff800`02437000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`025db000 fffff880`025f4000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`025f4000 fffff880`025fc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`025cd000 fffff880`025db000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`0143a000 fffff880`01446000   hotcore3 hotcore3.sys Thu Jan 14 17:35:31 2010 (4B4F9C33)
    fffff880`017f6000 fffff880`017ff000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`02abd000 fffff880`02acc000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02400000 fffff880`0240e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc1000 fffff800`00bc4000   kdcom    kdcom.dll    Thu Feb 17 06:33:32 2011 (4D5D078C)
    fffff880`024bf000 fffff880`02502000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`014de000 fffff880`014f8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01600000 fffff880`0162b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`00c3a000 fffff880`00c47000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`02acc000 fffff880`02adb000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02435000 fffff880`02442000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e6c000 fffff880`00e86000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03af1000 fffff880`03b09000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03b09000 fffff880`03b36000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`03b36000 fffff880`03b84000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`03b84000 fffff880`03ba7000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`010f0000 fffff880`010fb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01480000 fffff880`014de000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02c00000 fffff880`02c0b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`017e4000 fffff880`017f6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01692000 fffff880`01784000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02c21000 fffff880`02c2d000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03ac0000 fffff880`03ad3000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`02a24000 fffff880`02a53000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02582000 fffff880`02597000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`026d5000 fffff880`026e4000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`0264b000 fffff880`02690000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01784000 fffff880`017e4000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`010fb000 fffff880`0110c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02735000 fffff880`02741000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`01e12000 fffff800`023ee000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01255000 fffff880`013f8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`01243000 fffff880`0124c000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03a6d000 fffff880`03ac0000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02699000 fffff880`026bf000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`011d5000 fffff880`011ea000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f6a000 fffff880`00f9d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0109d000 fffff880`010a4000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00e5c000 fffff880`00e6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0156b000 fffff880`0157c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`00c47000 fffff880`00c5b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02a00000 fffff880`02a24000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02a53000 fffff880`02a6e000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`02a6e000 fffff880`02a8f000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`02a8f000 fffff880`02aa9000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`026e4000 fffff880`02735000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02c2d000 fffff880`02c38000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`010e7000 fffff880`010f0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02b9b000 fffff880`02bad000   Rtnic64  Rtnic64.sys  Fri May 30 11:12:23 2008 (48401957)
    fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`02c38000 fffff880`02c39480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`0112a000 fffff880`01137000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0110c000 fffff880`0112a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02aa9000 fffff880`02abd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`006c0000 fffff960`006ca000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02516000 fffff880`02528000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`025fd000 fffff880`025fef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`02b53000 fffff880`02b64000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`02528000 fffff880`02582000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`02626000 fffff880`02631000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`02afd000 fffff880`02b53000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0241a000 fffff880`02435000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`010a4000 fffff880`010b2000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`010b2000 fffff880`010d7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01675000 fffff880`01685000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f9d000 fffff880`00fb2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01586000 fffff880`015d2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02dca000 fffff880`02dd7000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`026bf000 fffff880`026d5000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03ba7000 fffff880`03bb1000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
    fffff880`010d7000 fffff880`010e7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eb7000 fffff880`00f5b000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f5b000 fffff880`00f6a000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02690000 fffff880`02699000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00090000 fffff960`003a0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`011cc000 fffff880`011d5000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02478000 fffff880`02499000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`015e8000 fffff880`015f6000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01685000 fffff880`01691000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`015f6000 fffff880`015ff000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01230000 fffff880`01243000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`02600000 fffff880`02626000   tunnel.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00026000
    fffff880`01685000 fffff880`0168d000   spldr.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffff880`010a6000 fffff880`011cc000   sptd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00126000
      My Computer


  4. Posts : 5
    Windows 7 ultimate x64
    Thread Starter
       #4

    I think Ive updated the realtek now, maybe there is a newer but I cant seem to find it then. And I also removed DT and sptd.sys but I still get BSOD. The latest one told me this:

    Problemsignatur:
    Problemhändelsens namn: BlueScreen
    OS-version: 6.1.7600.2.0.0.256.1
    Språkvariant-ID: 1053

    Ytterligare information om problemet:
    BCCode: a
    BCP1: 00000000000000DC
    BCP2: 0000000000000002
    BCP3: 0000000000000001
    BCP4: FFFFF80002AB2055
    OS Version: 6_1_7600
    Service Pack: 0_0
    Product: 256_1


    I will try to reboot in normalmode so I can post more dumps and RAMMon and CPU-Z prints
      My Computer


  5. Posts : 670
    Windows 7 x64
       #5

    Follow 3 and also attach your latest crash dump.
      My Computer


  6. Posts : 5
    Windows 7 ultimate x64
    Thread Starter
       #6

    RAMMon v1.0 Build: 1002 built with SysInfo v1.0 Build: 1006
    PassMark (R) Software
    PassMark Software - PC Benchmark and Test Software

    Memmory summary for AXEL-PC:
    Number of Memory Devices: 2 Total Physical Memory: 2046 MB (2048 MB)
    Total Available Physical Memory: 1110 MB
    Memory Load: 45%

    Item | Slot #1 | Slot #2 | Slot #3 | Slot #4 |
    -------------------------------------------------------------------------------|------------------------|------------------------|-----------------|-----------------|-
    Ram Type | DDR | DDR | Not Populated | Not Populated |
    Standard Name | DDR-400 | DDR-400 | | |
    Module Name | PC-3200 | PC-3200 | | |
    Memory Capacity (MB) | 1024 | 1024 | | |
    Bus Clockspeed (Mhz) | 200.00 | 200.00 | | |
    Jedec Manufacture Name | Samsung | Samsung | | |
    Search Amazon.com | Search! | Search! | | |
    SPD Revision | 0.0 | 0.0 | | |
    Registered | No | No | | |
    ECC | No | No | | |
    DIMM Slot # | 1 | 2 | | |
    Manufactured | Week 15 of Year 2006 | Week 15 of Year 2006 | | |
    Module Part # | M3 68L2923CUN-CCC | M3 68L2923CUN-CCC | | |
    Module Revision | 0x4E43 | 0x4E43 | | |
    Module Serial # | 0xF6171AF2 | 0x2D181AF2 | | |
    Module Manufacturing Location | 2 | 2 | | |
    # of Row Addressing Bits | 13 | 13 | | |
    # of Column Addressing Bits | 11 | 11 | | |
    # of Banks | 4 | 4 | | |
    # of Ranks | 2 | 2 | | |
    Device Width in Bits | 8 | 8 | | |
    Bus Width in Bits | 64 | 64 | | |
    Module Voltage | SSTL 2.5V | SSTL 2.5V | | |
    CAS Latencies Supported | 2.5 3.0 | 2.5 3.0 | | |
    Timings @ Max Frequency | 3-3-3-8 | 3-3-3-8 | | |
    Minimum Clock Cycle Time, tCK (ns) | 5.000 | 5.000 | | |
    Minimum CAS Latency Time, tAA (ns) | 15.000 | 15.000 | | |
    Minimum RAS to CAS Delay, tRCD (ns) | 15.000 | 15.000 | | |
    Minimum Row Precharge Time, tRP (ns) | 15.000 | 15.000 | | |
    Minimum Active to Precharge Time, tRAS (ns) | 40.000 | 40.000 | | |
    Minimum Row Active to Row Active Delay, tRRD (ns) | 10.000 | 10.000 | | |
    Minimum Auto-Refresh to Active/Auto-Refresh Time, tRC (ns) | 55.000 | 55.000 | | |
    Minimum Auto-Refresh to Active/Auto-Refresh Command Period, tRFC (ns) | 70.000 | 70.000 | | |
    | | | | |
    DDR1 Specific SPD Attributes | | | | |
    Data Access Time from Clock, tAC (ns) | 0.650 | 0.650 | | |
    Clock Cycle Time at Medium CAS Latency (ns) | 6.000 | 6.000 | | |
    Data Access Time at Medium CAS Latency (ns) | 0.700 | 0.700 | | |
    Clock Cycle Time at Short CAS Latency (ns) | 0.000 | 0.000 | | |
    Data Access Time at Short CAS Latency (ns) | 0.000 | 0.000 | | |
    Maximum Clock Cycle Time (ns) | 10.000 | 10.000 | | |
    Address/Command Setup Time Before Clock, tIS (ns) | 0.600 | 0.600 | | |
    Address/Command Hold Time After Clock, tIH (ns) | 0.600 | 0.600 | | |
    Data Input Setup Time Before Strobe, tDS (ns) | 0.400 | 0.400 | | |
    Data Input Hold Time After Strobe, tDH (ns) | 0.400 | 0.400 | | |
    Maximum Skew Between DQS and DQ Signals (ns) | 0.400 | 0.400 | | |
    Maximum Read Data hold Skew Factor (ns) | 0.500 | 0.500 | | |
    CS Latencies Supported | 0 | 0 | | |
    WE Latencies Supported | 1 | 1 | | |
    Burst Lengths Supported | 2 4 8 | 2 4 8 | | |
    Refresh Rate | Reduced (7.8us) | Reduced (7.8us) | | |
    Buffered Address/Control Inputs | No | No | | |
    On-card PLL | No | No | | |
    FET Switch On-card Enable | No | No | | |
    FET Switch External Enable | No | No | | |
    Differential Clock Input | Yes | Yes | | |
    Weak Driver Included | No | No | | |
    Concurrent Auto Precharge Supported | Yes | Yes | | |
    Fast AP Supported | Yes | Yes | | |
    Module Bank Density | 512 MB | 512 MB | | |
    Module Height (mm) | Unavailable | Unavailable | | |
      My Computer


  7. Posts : 670
    Windows 7 x64
       #7

    Your memory is set right.

    Attach the latest crash dump.
    Run www.memtest.org 10 passes.
      My Computer


  8. Posts : 5
    Windows 7 ultimate x64
    Thread Starter
       #8

    Here is the latest dump (made with Windows_NT6_BSOD_v3.03_jcgriff2_ under safemode).
      My Computer


  9. Posts : 670
    Windows 7 x64
       #9


    BugCheck A, {dc, 2, 1, fffff80002ab2055}
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )

    -----------

    BugCheck 1E, {ffffffffc0000005, fffff80002dd072a, 1, 18}
    Probably caused by : ntkrnlmp.exe ( nt!ObpCreateHandle+29a )

    -----------

    BugCheck A, {600dd, 2, 1, fffff80002a5f055}
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )

    -----------

    BugCheck A, {dc, 2, 1, fffff80002aa0055}
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )

    -----------

    BugCheck 1E, {ffffffffc0000005, fffff80002ab05a1, 0, ffffffffffffffff}
    Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )

    -----------

    BugCheck D1, {fffff880035b06f0, 2, 0, fffff88000c5dc50}
    Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )

    -----------

    BugCheck A, {1000dc, 2, 1, fffff80002ab1055}
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )

    -----------






    1. Run 10 passes of memtest, as well outlined in this thread:

    RAM - Test with Memtest86+




    2. It is always a good idea to have drivers up to date,

    Creative Audio
    Code:
    ctac32k.sys  Wed Jul 02 04:38:22 2008
    CT20XUT.SYS  Wed Jun 03 14:01:05 2009
    ctaud2k.sys  Wed Jun 03 13:59:45 2009
    ctaud2k.sys  Wed Jun 03 13:59:45 2009
    CTEXFIFX.SYS Wed Jun 03 14:01:00 2009
    CTHWIUT.SYS  Wed Jun 03 14:01:09 2009
    ctoss2k.sys  Wed Jun 03 13:57:43 2009
    ctsfm2k.sys  Wed Jun 03 13:57:30 2009
    ctprxy2k.sys Wed Jun 03 13:59:48 2009
    emupia2k.sys Wed Jun 03 13:57:22 2009
    ha20x2k.sys  Wed Jun 03 13:59:09 2009
    Creative Worldwide Support > Sound Blaster


    nVidia
    Code:
    nvlddmkm.sys Sun Sep 27 20:12:06 2009
    nvBridge.kmd Sun Sep 27 19:46:14 2009
    Drivers - Download NVIDIA Drivers


    Philips Semiconductors Inbox
    Ph3xIB64.sys Fri May 08 17:11:49 2009
    Philips - Software & Drivers


    Realtek 10/100 NIC
    Rtnic64.sys Thu Jul 23 10:03:10 2009
    Realtek







    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-32734-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
    Debug session time: Tue Mar  8 10:05:31.077 2011 (UTC - 5:00)
    System Uptime: 0 days 0:00:57.983
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {dc, 2, 1, fffff80002ab2055}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000000dc, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ab2055, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0e0e0
     00000000000000dc 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02ab2055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002dc08b0 -- (.trap 0xfffff88002dc08b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=fffffa80018fe0a0
    rdx=fffff88002dc0b98 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ab2055 rsp=fffff88002dc0a40 rbp=fffff88002dc0b98
     r8=fffffa80018fe090  r9=0000000000000130 r10=fffff80002a66000
    r11=fffffa80018fe040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeStackAttachProcess+0x115:
    fffff800`02ab2055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:6dd0:00000000`000000dc=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ad5ca9 to fffff80002ad6740
    
    STACK_TEXT:  
    fffff880`02dc0768 fffff800`02ad5ca9 : 00000000`0000000a 00000000`000000dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02dc0770 fffff800`02ad4920 : 00000000`00000225 fffffa80`018fe040 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`02dc08b0 fffff800`02ab2055 : 00000000`00000000 fffffa80`018fe040 fffffa80`018fe040 fffff800`02dab223 : nt!KiPageFault+0x260
    fffff880`02dc0a40 fffffa80`027d4a90 : fffff880`02dc0bc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x115
    fffff880`02dc0ac0 fffff880`02dc0bc0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`027d4a90
    fffff880`02dc0ac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`02dc0bc0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02ab2055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeStackAttachProcess+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-17375-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a68000 PsLoadedModuleList = 0xfffff800`02ca5e50
    Debug session time: Tue Mar  8 10:56:07.420 2011 (UTC - 5:00)
    System Uptime: 0 days 0:06:05.327
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002dd072a, 1, 18}
    
    Probably caused by : ntkrnlmp.exe ( nt!ObpCreateHandle+29a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002dd072a, The address that the exception occurred at
    Arg3: 0000000000000001, Parameter 0 of the exception
    Arg4: 0000000000000018, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ObpCreateHandle+29a
    fffff800`02dd072a f0480fba6f1800  lock bts qword ptr [rdi+18h],0
    
    EXCEPTION_PARAMETER1:  0000000000000001
    
    EXCEPTION_PARAMETER2:  0000000000000018
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d100e0
     0000000000000018 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  msseces.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88002fc72a8 -- (.exr 0xfffff88002fc72a8)
    ExceptionAddress: fffff80002dd072a (nt!ObpCreateHandle+0x000000000000029a)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000001
       Parameter[1]: 0000000000000018
    Attempt to write to address 0000000000000018
    
    TRAP_FRAME:  fffff88002fc7350 -- (.trap 0xfffff88002fc7350)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8001901b60
    rdx=00000000000f001f rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002dd072a rsp=fffff88002fc74e0 rbp=0000000000000000
     r8=fffff8a003a22bb0  r9=00000000000000e8 r10=0000000000000000
    r11=fffff8a003a22b60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po nc
    nt!ObpCreateHandle+0x29a:
    fffff800`02dd072a f0480fba6f1800  lock bts qword ptr [rdi+18h],0 ds:00000000`00000018=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b12a39 to fffff80002ad8740
    
    STACK_TEXT:  
    fffff880`02fc6ad8 fffff800`02b12a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02dd072a 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02fc6ae0 fffff800`02ad7d82 : fffff880`02fc72a8 00000000`00000000 fffff880`02fc7350 fffffa80`01901b60 : nt!KiDispatchException+0x1b9
    fffff880`02fc7170 fffff800`02ad68fa : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`02fc7350 fffff800`02dd072a : 00000000`00000000 fffff880`02fc7530 fffffa80`01bfd060 fffff8a0`03a22bb0 : nt!KiPageFault+0x23a
    fffff880`02fc74e0 fffff800`02dc922c : 00000000`00000000 fffff8a0`03a22bb0 00000000`000f001f fffff8a0`03ce0500 : nt!ObpCreateHandle+0x29a
    fffff880`02fc75f0 fffff800`02dc90a0 : fffffa80`01c24310 fffff880`02fc79a0 fffffa80`01c7c780 00000000`08000000 : nt!ObInsertObjectEx+0xec
    fffff880`02fc7830 fffff800`02ad7993 : fffffa80`01901b60 fffff880`02fc7ad8 fffff880`02fc78c8 fffffa80`01b946f0 : nt!NtCreateSection+0x1ef
    fffff880`02fc78b0 fffff800`02ad3f30 : fffffa80`027f2b66 fffff880`02fc7bc0 00000000`00000000 fffffa80`027f7260 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`02fc7ab8 fffffa80`027f2b66 : fffff880`02fc7bc0 00000000`00000000 fffffa80`027f7260 fffffa80`027fb5b0 : nt!KiServiceLinkage
    fffff880`02fc7ac0 fffff880`02fc7bc0 : 00000000`00000000 fffffa80`027f7260 fffffa80`027fb5b0 fffffa80`00000002 : 0xfffffa80`027f2b66
    fffff880`02fc7ac8 00000000`00000000 : fffffa80`027f7260 fffffa80`027fb5b0 fffffa80`00000002 00000000`08000000 : 0xfffff880`02fc7bc0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ObpCreateHandle+29a
    fffff800`02dd072a f0480fba6f1800  lock bts qword ptr [rdi+18h],0
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!ObpCreateHandle+29a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!ObpCreateHandle+29a
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!ObpCreateHandle+29a
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-18906-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c50e50
    Debug session time: Tue Mar  8 10:58:21.941 2011 (UTC - 5:00)
    System Uptime: 0 days 0:00:50.847
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {600dd, 2, 1, fffff80002a5f055}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000600dd, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002a5f055, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbb0e0
     00000000000600dd 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02a5f055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002fb98b0 -- (.trap 0xfffff88002fb98b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=fffffa80019026e0
    rdx=fffff88002fb9b98 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a5f055 rsp=fffff88002fb9a40 rbp=fffff88002fb9b98
     r8=fffffa80019026d0  r9=0000000000000130 r10=fffff80002a13000
    r11=fffffa8001902680 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeStackAttachProcess+0x115:
    fffff800`02a5f055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:74e0:00000000`000000dc=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a82ca9 to fffff80002a83740
    
    STACK_TEXT:  
    fffff880`02fb9768 fffff800`02a82ca9 : 00000000`0000000a 00000000`000600dd 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02fb9770 fffff800`02a81920 : 00000000`00000225 fffffa80`01902680 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`02fb98b0 fffff800`02a5f055 : 00000000`00000000 fffffa80`01902680 fffffa80`01902680 fffff800`02d58223 : nt!KiPageFault+0x260
    fffff880`02fb9a40 fffffa80`027d7a90 : fffff880`02fb9bc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x115
    fffff880`02fb9ac0 fffff880`02fb9bc0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`027d7a90
    fffff880`02fb9ac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`02fb9bc0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02a5f055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeStackAttachProcess+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-16984-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a54000 PsLoadedModuleList = 0xfffff800`02c91e50
    Debug session time: Tue Mar  8 09:52:37.227 2011 (UTC - 5:00)
    System Uptime: 0 days 0:18:59.118
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {dc, 2, 1, fffff80002aa0055}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000000dc, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002aa0055, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfc0e0
     00000000000000dc 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02aa0055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002fdc8b0 -- (.trap 0xfffff88002fdc8b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=fffffa80018ffbc0
    rdx=fffff88002fdcb98 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aa0055 rsp=fffff88002fdca40 rbp=fffff88002fdcb98
     r8=fffffa80018ffbb0  r9=0000000000000130 r10=fffff80002a54000
    r11=fffffa80018ffb60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeStackAttachProcess+0x115:
    fffff800`02aa0055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:3010:00000000`000000dc=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac3ca9 to fffff80002ac4740
    
    STACK_TEXT:  
    fffff880`02fdc768 fffff800`02ac3ca9 : 00000000`0000000a 00000000`000000dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02fdc770 fffff800`02ac2920 : 00000000`00000225 fffffa80`018ffb60 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`02fdc8b0 fffff800`02aa0055 : 00000000`00000000 fffffa80`018ffb60 fffffa80`018ffb60 fffff800`02d99223 : nt!KiPageFault+0x260
    fffff880`02fdca40 fffffa80`027d3a90 : fffff880`02fdcbc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x115
    fffff880`02fdcac0 fffff880`02fdcbc0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`027d3a90
    fffff880`02fdcac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`02fdcbc0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02aa0055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeStackAttachProcess+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-20578-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a63000 PsLoadedModuleList = 0xfffff800`02ca0e50
    Debug session time: Tue Mar  8 09:03:38.121 2011 (UTC - 5:00)
    System Uptime: 0 days 12:32:06.027
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff80002ab05a1, 0, ffffffffffffffff}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80002ab05a1, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!KiApcInterrupt+1f1
    fffff800`02ab05a1 48cf            iretq
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0b0e0
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  wermgr.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88001f254b8 -- (.exr 0xfffff88001f254b8)
    ExceptionAddress: fffff80002ab05a1 (nt!KiApcInterrupt+0x00000000000001f1)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000008
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88001f25560 -- (.trap 0xfffff88001f25560)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=00000000000000eb
    rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ab05a1 rsp=fffff88001f256f8 rbp=fffffa80027f86eb
     r8=fffff88001f25798  r9=0000000000000004 r10=0000000000000000
    r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di ng nz na pe nc
    nt!KiApcInterrupt+0x1f1:
    fffff800`02ab05a1 48cf            iretq
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b0da39 to fffff80002ad3740
    
    STACK_TEXT:  
    fffff880`01f24ce8 fffff800`02b0da39 : 00000000`0000001e ffffffff`c0000005 fffff800`02ab05a1 00000000`00000000 : nt!KeBugCheckEx
    fffff880`01f24cf0 fffff800`02ad2d82 : fffff880`01f254b8 00000000`00000057 fffff880`01f25560 00000000`00000000 : nt!KiDispatchException+0x1b9
    fffff880`01f25380 fffff800`02ad168a : 00000000`00000001 fffffa80`027f8650 fffffa80`027f991a 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`01f25560 fffff800`02ab05a1 : fffffa80`027f1140 00000000`00000000 00000000`00000200 00000001`01f25720 : nt!KiGeneralProtectionFault+0x10a
    fffff880`01f256f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x1f1
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiApcInterrupt+1f1
    fffff800`02ab05a1 48cf            iretq
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!KiApcInterrupt+1f1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-20953-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
    Debug session time: Tue Mar  8 10:48:32.871 2011 (UTC - 5:00)
    System Uptime: 0 days 0:22:57.777
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff880035b06f0, 2, 0, fffff88000c5dc50}
    
    Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff880035b06f0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88000c5dc50, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
     fffff880035b06f0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ataport!IdeLogCrbActive+bc
    fffff880`00c5dc50 f30f6f4148      movdqu  xmm0,xmmword ptr [rcx+48h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff88002f227c0 -- (.trap 0xfffff88002f227c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa800525e2c0 rbx=0000000000000000 rcx=fffff880035b06a0
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88000c5dc50 rsp=fffff88002f22950 rbp=0000000000000001
     r8=0000000000000000  r9=0000000000000000 r10=fffffa80055430b0
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    ataport!IdeLogCrbActive+0xbc:
    fffff880`00c5dc50 f30f6f4148      movdqu  xmm0,xmmword ptr [rcx+48h] ds:2430:fffff880`035b06e8=????????????????????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a78ca9 to fffff80002a79740
    
    STACK_TEXT:  
    fffff880`02f22678 fffff800`02a78ca9 : 00000000`0000000a fffff880`035b06f0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02f22680 fffff800`02a77920 : 00000000`00000000 fffffa80`022a5860 00000000`00000000 ffffeddf`93255140 : nt!KiBugCheckDispatch+0x69
    fffff880`02f227c0 fffff880`00c5dc50 : fffffa80`037af1b0 00000000`00000000 fffffa80`022a27d0 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`02f22950 fffff880`00c67c71 : 00000000`00000000 fffffa80`018231a0 fffffa80`05543010 00000000`00000000 : ataport!IdeLogCrbActive+0xbc
    fffff880`02f22980 fffff800`02fe962f : 00000000`00000000 fffffa80`055430b0 fffffa80`01825ea0 fffff880`04a32cfe : ataport!IdeStartIoCallBack+0xc9
    fffff880`02f22af0 fffff880`00fba0d3 : fffffa80`05543010 fffff880`00fba12c 00000000`00000000 fffff880`049fc8b0 : hal!HalBuildScatterGatherList+0x203
    fffff880`02f22b60 fffff880`00c67b3b : fffffa80`05543010 fffffa80`022a27d0 fffffa80`018231a0 fffffa80`05543010 : PCIIDEX!BmSetup+0x6b
    fffff880`02f22bc0 fffff880`00c667eb : fffffa80`01824500 fffffa80`022a27d0 fffffa80`01824500 fffffa80`018231a0 : ataport!IdeDispatchChannelRequest+0xef
    fffff880`02f22bf0 fffff880`00c6631e : 00000000`00000001 fffffa80`05543010 00000000`00000001 fffffa80`05543010 : ataport!IdeStartChannelRequest+0x113
    fffff880`02f22c70 fffff880`00c68582 : fffffa80`018a3480 00000000`00000000 fffffa80`022a27d0 fffffa80`0269f010 : ataport!IdeStartNextDeviceRequest+0x18e
    fffff880`02f22d10 fffff880`00c680ec : fffffa80`018231a0 00000000`00000000 fffffa80`018231a0 fffffa80`0269f010 : ataport!IdeProcessCompletedRequests+0x26a
    fffff880`02f22e40 fffff800`02a84bfc : fffff880`009e7180 fffffa80`00015871 fffffa80`01823050 fffffa80`01823118 : ataport!IdePortCompletionDpc+0x1a8
    fffff880`02f22f00 fffff800`02a7f865 : 00000000`00000000 fffffa80`0323d790 00000000`00000000 fffff880`00c67f44 : nt!KiRetireDpcList+0x1bc
    fffff880`02f22fb0 fffff800`02a7f67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
    fffff880`063bc420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeLogCrbActive+bc
    fffff880`00c5dc50 f30f6f4148      movdqu  xmm0,xmmword ptr [rcx+48h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  ataport!IdeLogCrbActive+bc
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118
    
    FAILURE_BUCKET_ID:  X64_0xD1_ataport!IdeLogCrbActive+bc
    
    BUCKET_ID:  X64_0xD1_ataport!IdeLogCrbActive+bc
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030811-35390-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
    Debug session time: Tue Mar  8 10:24:39.410 2011 (UTC - 5:00)
    System Uptime: 0 days 0:01:02.316
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {1000dc, 2, 1, fffff80002ab1055}
    
    Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000001000dc, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ab1055, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
     00000000001000dc 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02ab1055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88002fb98b0 -- (.trap 0xfffff88002fb98b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=fffffa80019026e0
    rdx=fffff88002fb9b98 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ab1055 rsp=fffff88002fb9a40 rbp=fffff88002fb9b98
     r8=fffffa80019026d0  r9=0000000000000130 r10=fffff80002a65000
    r11=fffffa8001902680 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeStackAttachProcess+0x115:
    fffff800`02ab1055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:1dd0:00000000`000000dc=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ad4ca9 to fffff80002ad5740
    
    STACK_TEXT:  
    fffff880`02fb9768 fffff800`02ad4ca9 : 00000000`0000000a 00000000`001000dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02fb9770 fffff800`02ad3920 : 00000000`00000225 fffffa80`01902680 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`02fb98b0 fffff800`02ab1055 : 00000000`00000000 fffffa80`01902680 fffffa80`01902680 fffff800`02daa223 : nt!KiPageFault+0x260
    fffff880`02fb9a40 fffffa80`027f2a90 : fffff880`02fb9bc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x115
    fffff880`02fb9ac0 fffff880`02fb9bc0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`027f2a90
    fffff880`02fb9ac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`02fb9bc0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeStackAttachProcess+115
    fffff800`02ab1055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeStackAttachProcess+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    BUCKET_ID:  X64_0xA_nt!KeStackAttachProcess+115
    
    Followup: MachineOwner
    ---------



    Drivers:

    Code:
    start             end                 module name
    fffff880`04212000 fffff880`04250000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00ed0000 fffff880`00f27000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03ab7000 fffff880`03b41000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03fcb000 fffff880`03fe1000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03d95000 fffff880`03da9000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
    fffff880`03cb9000 fffff880`03cd0000   amdk8    amdk8.sys    Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00ff3000 fffff880`00ffe000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00fea000 fffff880`00ff3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00db0000 fffff880`00dda000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`03e0a000 fffff880`03f91000   athrx    athrx.sys    Wed Jan 27 20:25:39 2010 (4B60E793)
    fffff880`00f98000 fffff880`00fa4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`043fc000 fffff880`043ffe80   BdaSup   BdaSup.SYS   Mon Jul 13 20:06:40 2009 (4A5BCC10)
    fffff880`019b8000 fffff880`019bf000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03ca8000 fffff880`03cb9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`025bc000 fffff880`025da000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00680000 fffff960`006a7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`01954000 fffff880`0197e000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cf0000 fffff880`00db0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018ee000 fffff880`0191e000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c92000 fffff880`00cf0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01134000 fffff880`011a7000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00f8f000 fffff880`00f98000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`03fbb000 fffff880`03fcb000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05df0000 fffff880`05dfe000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03c07000 fffff880`03c8a000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`0576f000 fffff880`057a4000   CT20XUT  CT20XUT.SYS  Wed Jun 03 14:01:05 2009 (4A26BA61)
    fffff880`056c1000 fffff880`0576f000   ctac32k  ctac32k.sys  Wed Jul 02 04:38:22 2008 (486B3E7E)
    fffff880`0407a000 fffff880`0411f700   ctaud2k  ctaud2k.sys  Wed Jun 03 13:59:45 2009 (4A26BA11)
    fffff880`05c72000 fffff880`05dcf000   CTEXFIFX CTEXFIFX.SYS Wed Jun 03 14:01:00 2009 (4A26BA5C)
    fffff880`04400000 fffff880`0441b000   CTHWIUT  CTHWIUT.SYS  Wed Jun 03 14:01:09 2009 (4A26BA65)
    fffff880`041c2000 fffff880`041f3000   ctoss2k  ctoss2k.sys  Wed Jun 03 13:57:43 2009 (4A26B997)
    fffff880`041f3000 fffff880`041fb000   ctprxy2k ctprxy2k.sys Wed Jun 03 13:59:48 2009 (4A26BA14)
    fffff880`05689000 fffff880`056c1000   ctsfm2k  ctsfm2k.sys  Wed Jun 03 13:57:30 2009 (4A26B98A)
    fffff880`03c8a000 fffff880`03ca8000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`01872000 fffff880`01881000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018d8000 fffff880`018ee000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0415d000 fffff880`0417f000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05c0c000 fffff880`05c15000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05c00000 fffff880`05c0c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05c15000 fffff880`05c28000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05de4000 fffff880`05df0000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`052d7000 fffff880`053cb000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03cd0000 fffff880`03d16000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`045a8000 fffff880`045f2000   emupia2k emupia2k.sys Wed Jun 03 13:57:22 2009 (4A26B982)
    fffff880`03dbb000 fffff880`03df1000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`010c2000 fffff880`010d6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01076000 fffff880`010c2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013f2000 fffff880`013fc000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0189e000 fffff880`018d8000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`011a7000 fffff880`011f1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`053e7000 fffff880`053f4000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff880`04427000 fffff880`045a8000   ha20x2k  ha20x2k.sys  Wed Jun 03 13:59:09 2009 (4A26B9ED)
    fffff800`02a1c000 fffff800`02a65000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`05c36000 fffff880`05c4f000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05c4f000 fffff880`05c57080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05c28000 fffff880`05c36000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`015ea000 fffff880`015f6000   hotcore3 hotcore3.sys Thu Jan 14 17:35:31 2010 (4B4F9C33)
    fffff880`024f4000 fffff880`025bc000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015e1000 fffff880`015ea000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04800000 fffff880`0480f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05c5a000 fffff880`05c68000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00ba9000 fffff800`00bac000   kdcom    kdcom.dll    Thu Feb 17 06:33:32 2011 (4D5D078C)
    fffff880`0417f000 fffff880`041c2000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013c7000 fffff880`013e1000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`0158c000 fffff880`015b7000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`04000000 fffff880`04005200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`01881000 fffff880`01896000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`057cd000 fffff880`057f0000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c71000 fffff880`00c7e000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`057bf000 fffff880`057cd000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03d86000 fffff880`03d95000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`045f2000 fffff880`045ff000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fd0000 fffff880`00fea000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0197e000 fffff880`019af000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`025da000 fffff880`025f2000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`02400000 fffff880`0242d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0286b000 fffff880`028b9000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`028b9000 fffff880`028dc000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`0182b000 fffff880`01836000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f30000 fffff880`00f3a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010d6000 fffff880`01134000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03bf5000 fffff880`03c00000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015cf000 fffff880`015e1000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`0143a000 fffff880`0152c000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03fe1000 fffff880`03fed000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`024bf000 fffff880`024d2000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`0402a000 fffff880`04059000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05dcf000 fffff880`05de4000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03bcb000 fffff880`03bda000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03b41000 fffff880`03b86000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0152c000 fffff880`0158c000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`01836000 fffff880`01847000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03aa6000 fffff880`03ab2000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a65000 fffff800`03041000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01224000 fffff880`013c7000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019af000 fffff880`019b8000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`052d5000 fffff880`052d6180   nvBridge nvBridge.kmd Sun Sep 27 19:46:14 2009 (4ABFF946)
    fffff880`04811000 fffff880`052d4a80   nvlddmkm nvlddmkm.sys Sun Sep 27 20:12:06 2009 (4ABFFF56)
    fffff880`0246c000 fffff880`024bf000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`03b8f000 fffff880`03bb5000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`03f9e000 fffff880`03fbb000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00f7a000 fffff880`00f8f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f47000 fffff880`00f7a000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fb9000 fffff880`00fc0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fc0000 fffff880`00fd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013e1000 fffff880`013f2000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`028dc000 fffff880`02982000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0426e000 fffff880`043fb580   Ph3xIB64 Ph3xIB64.sys Fri May 08 17:11:49 2009 (4A04A015)
    fffff880`04120000 fffff880`0415d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c7e000 fffff880`00c92000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04006000 fffff880`0402a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04250000 fffff880`0426b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04059000 fffff880`0407a000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03d6c000 fffff880`03d86000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03a55000 fffff880`03aa6000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03fed000 fffff880`03ff8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01810000 fffff880`01819000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01819000 fffff880`01822000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01822000 fffff880`0182b000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`024d2000 fffff880`024ea000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04200000 fffff880`04212000   Rtnic64  Rtnic64.sys  Thu Jul 23 10:03:10 2009 (4A686D9E)
    fffff880`02982000 fffff880`0298d000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`015c7000 fffff880`015cf000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`03466000 fffff880`034d7000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`03550000 fffff880`035e6000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`034e9000 fffff880`03550000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`0298d000 fffff880`029ba000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`03ff8000 fffff880`03ff9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`034d7000 fffff880`034e9000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01865000 fffff880`01872000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01847000 fffff880`01865000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03a41000 fffff880`03a55000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03a00000 fffff880`03a2a000   Uim_IMx64 Uim_IMx64.sys Thu Jan 14 17:39:33 2010 (4B4F9D25)
    fffff880`03a2a000 fffff880`03a33000   UimFIO   UimFIO.SYS   Thu Jan 14 17:39:25 2010 (4B4F9D1D)
    fffff880`03a33000 fffff880`03a41000   uimx64   uimx64.sys   Thu Jan 14 17:39:21 2010 (4B4F9D19)
    fffff880`03da9000 fffff880`03dbb000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05c58000 fffff880`05c59f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`053d6000 fffff880`053e7000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`0562f000 fffff880`05689000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`053cb000 fffff880`053d6000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03d16000 fffff880`03d6c000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`057a4000 fffff880`057bf000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00f3a000 fffff880`00f47000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019bf000 fffff880`019cd000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`019cd000 fffff880`019f2000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015b7000 fffff880`015c7000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fa4000 fffff880`00fb9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03f91000 fffff880`03f9e000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`03bb5000 fffff880`03bcb000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`024ea000 fffff880`024f4000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
    fffff880`03bda000 fffff880`03bf5000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01800000 fffff880`01810000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e1d000 fffff880`00ec1000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ec1000 fffff880`00ed0000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03b86000 fffff880`03b8f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`00400000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00f27000 fffff880`00f30000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`05600000 fffff880`05621000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`03400000 fffff880`03431000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`0191e000 fffff880`0192c000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0192c000 fffff880`01938000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01938000 fffff880`01941000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01941000 fffff880`01954000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:01.
Find Us