You are getting the same stop codes again. Follow my 1st post.
1. Uninstall Turbo Boost.
2. Go to your PC support to update drivers, including Asus Data Security Manager.
AsDsm.sys Fri Feb 13 01:14:26 2009
~~~~~~~~~
CRASH DUMPS
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0381b000 PsLoadedModuleList = 0xfffff800`03a58e50
Debug session time: Mon May 16 02:24:03.485 2011 (UTC - 4:00)
System Uptime: 0 days 1:13:23.625
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800039bf000, fffff8800b537030, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+174 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800039bf000, Address of the instruction which caused the bugcheck
Arg3: fffff8800b537030, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+174
fffff800`039bf000 4c395008 cmp qword ptr [rax+8],r10
CONTEXT: fffff8800b537030 -- (.cxr 0xfffff8800b537030)
rax=0065006400690076 rbx=0000000000000001 rcx=fffffa8003adc680
rdx=fffff8a00031cbc0 rsi=0000000000000000 rdi=fffff8a0011bf1c0
rip=fffff800039bf000 rsp=fffff8800b537a00 rbp=0000000000000000
r8=fffff8a00cee75a0 r9=fffff8a00031c990 r10=fffff8a00031c9a0
r11=0000000000000001 r12=fffffa8003adc140 r13=0000000000000000
r14=0000000000000006 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ExDeferredFreePool+0x174:
fffff800`039bf000 4c395008 cmp qword ptr [rax+8],r10 ds:002b:00650064`0069007e=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800039c04c1 to fffff800039bf000
STACK_TEXT:
fffff880`0b537a00 fffff800`039c04c1 : fffff8a0`0c93fa40 fffff8a0`0c93fa40 fffffa80`0bcfeb30 00000000`00000000 : nt!ExDeferredFreePool+0x174
fffff880`0b537a90 fffff800`03b342bc : 00000000`00000400 fffff8a0`0c93fa50 fffff880`50777445 00000000`00000000 : nt!ExFreePoolWithTag+0x411
fffff880`0b537b40 fffff800`0388a953 : fffffa80`0c732b60 00000000`0250fdc8 00000000`00000000 0000007f`ffffffff : nt!NtTraceControl+0x208
fffff880`0b537bb0 00000000`76ff0efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0250fda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ff0efa
FOLLOWUP_IP:
nt!ExDeferredFreePool+174
fffff800`039bf000 4c395008 cmp qword ptr [rax+8],r10
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+174
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff8800b537030 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+174
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+174
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-18548-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`03813000 PsLoadedModuleList = 0xfffff800`03a50e50
Debug session time: Mon May 16 20:08:59.800 2011 (UTC - 4:00)
System Uptime: 0 days 4:23:19.314
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff8a000abe870, fffff8a000abec80, 5410109}
Unable to load image \SystemRoot\System32\Drivers\AsDsm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AsDsm.sys
*** ERROR: Module load completed but symbols could not be loaded for AsDsm.sys
Probably caused by : AsDsm.sys ( AsDsm+7f8a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a000abe870, The pool entry we were looking for within the page.
Arg3: fffff8a000abec80, The next pool entry.
Arg4: 0000000005410109, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80003abb0e0
fffff8a000abe870
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800039b66d3 to fffff80003883700
STACK_TEXT:
fffff880`08395978 fffff800`039b66d3 : 00000000`00000019 00000000`00000020 fffff8a0`00abe870 fffff8a0`00abec80 : nt!KeBugCheckEx
fffff880`08395980 fffff880`01508f8a : fffff8a0`00abe880 00000000`00000000 fffffa80`6e705341 fffffa80`046c79e0 : nt!ExDeferredFreePool+0x12c4
fffff880`08395a30 fffff8a0`00abe880 : 00000000`00000000 fffffa80`6e705341 fffffa80`046c79e0 fffff880`08395ad8 : AsDsm+0x7f8a
fffff880`08395a38 00000000`00000000 : fffffa80`6e705341 fffffa80`046c79e0 fffff880`08395ad8 00000000`00000000 : 0xfffff8a0`00abe880
STACK_COMMAND: kb
FOLLOWUP_IP:
AsDsm+7f8a
fffff880`01508f8a ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: AsDsm+7f8a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: AsDsm
IMAGE_NAME: AsDsm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49950fc2
FAILURE_BUCKET_ID: X64_0x19_20_AsDsm+7f8a
BUCKET_ID: X64_0x19_20_AsDsm+7f8a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-20514-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0380a000 PsLoadedModuleList = 0xfffff800`03a47e50
Debug session time: Mon May 16 01:10:10.486 2011 (UTC - 4:00)
System Uptime: 0 days 3:53:55.000
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1, {770cf72a, 0, ffff, fffff88008189ca0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them. A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 00000000770cf72a, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000ffff, Thread->KernelApcDisable
Arg4: fffff88008189ca0, Previous KernelApcDisable
Debugging Details:
------------------
FAULTING_IP:
+3030353763613965
00000000`770cf72a ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003879c69 to fffff8000387a700
STACK_TEXT:
fffff880`08189a68 fffff800`03879c69 : 00000000`00000001 00000000`770cf72a 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff880`08189a70 fffff800`03879ba0 : 00000000`00000001 00000000`000f2c8e 00000000`0358ace0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`08189bb0 00000000`770cf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`02efaf38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770cf72a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+245
fffff800`03879ba0 4883ec50 sub rsp,50h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceExit+245
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
FAILURE_BUCKET_ID: X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
BUCKET_ID: X64_0x1_SysCallNum_4_nt!KiSystemServiceExit+245
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-24960-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0385a000 PsLoadedModuleList = 0xfffff800`03a97e50
Debug session time: Mon May 16 15:45:12.562 2011 (UTC - 4:00)
System Uptime: 0 days 1:59:49.076
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88004e6a718, fffff88004e69f80, fffff880016ded07}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88004e6a718
Arg3: fffff88004e69f80
Arg4: fffff880016ded07
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88004e6a718 -- (.exr 0xfffff88004e6a718)
ExceptionAddress: fffff880016ded07 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88004e69f80 -- (.cxr 0xfffff88004e69f80)
rax=fffff8a00d624000 rbx=0037003800310033 rcx=000000000000007a
rdx=0000000000000002 rsi=fffff8a00037a4f0 rdi=fffffa8004e24358
rip=fffff880016ded07 rsp=fffff88004e6a950 rbp=00000000000062c0
r8=00000000094f9c3d r9=0000000000000000 r10=0000000000000007
r11=fffff88004e6a998 r12=fffff88004e6ac60 r13=fffff8800b5e8a60
r14=000000000000003d r15=0000000000001c3d
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
Ntfs!NtfsFindPrefixHashEntry+0x1fe:
fffff880`016ded07 44394310 cmp dword ptr [rbx+10h],r8d ds:002b:00370038`00310043=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003b020e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`016ded07 44394310 cmp dword ptr [rbx+10h],r8d
FAULTING_IP:
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`016ded07 44394310 cmp dword ptr [rbx+10h],r8d
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880016dfdc2 to fffff880016ded07
STACK_TEXT:
fffff880`04e6a950 fffff880`016dfdc2 : fffffa80`047ef2f0 fffffa80`04e24358 fffff8a0`0037a4f0 00000000`00000701 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
fffff880`04e6aa80 fffff880`016da36d : fffffa80`047ef2f0 fffffa80`04ebb010 fffff880`04e6ac60 fffff880`04e6aca8 : Ntfs!NtfsFindStartingNode+0x452
fffff880`04e6ab50 fffff880`0164698d : fffffa80`047ef2f0 fffffa80`04ebb010 fffff880`0b5e8a60 fffffa80`04404b00 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`04e6ad30 fffff800`038c2587 : fffff880`0b5e89d0 00000000`00454030 00000000`76f95270 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`04e6ad60 fffff800`038c2541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`0b5e88a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFindPrefixHashEntry+1fe
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d79996d
STACK_COMMAND: .cxr 0xfffff88004e69f80 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
BUCKET_ID: X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
Followup: MachineOwner
---------
DRIVERS
Code:
start end module name
fffff880`0102f000 fffff880`01086000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`01c6a000 fffff880`01cf4000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03000000 fffff880`03016000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0146a000 fffff880`01475000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`014d5000 fffff880`014e2000 AsDsm AsDsm.sys Fri Feb 13 01:14:26 2009 (49950FC2)
fffff880`089eb000 fffff880`089f3000 ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
fffff880`0142c000 fffff880`01435000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01435000 fffff880`0145f000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`07054000 fffff880`071dd000 athrx athrx.sys Tue Mar 02 19:45:21 2010 (4B8DB121)
fffff880`031dc000 fffff880`031e4000 ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
fffff960`00990000 fffff960`009f1000 ATMFD ATMFD.DLL Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`030d3000 fffff880`0311a000 avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
fffff880`04499000 fffff880`044a0080 avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
fffff880`01c4f000 fffff880`01c5b0c0 avgrkx64 avgrkx64.sys Wed Feb 10 22:52:44 2010 (4B737F0C)
fffff880`0479f000 fffff880`047f0000 avgtdia avgtdia.sys Wed Apr 27 03:34:54 2011 (4DB7C71E)
fffff880`00fb2000 fffff880`00fbe000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`046f3000 fffff880`046fa000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`01def000 fffff880`01e00000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04163000 fffff880`04181000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`006a0000 fffff960`006c7000 cdd cdd.dll Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`046c0000 fffff880`046ea000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`07318000 fffff880`073c9000 CHDRT64 CHDRT64.sys Fri Oct 30 13:50:02 2009 (4AEB274A)
fffff880`00e0c000 fffff880`00ecc000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01c1f000 fffff880`01c4f000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d06000 fffff880`00d64000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0704e000 fffff880`07052500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01549000 fffff880`015bc000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`011f2000 fffff880`011fb000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`031e4000 fffff880`031f4000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0887b000 fffff880`08889000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02400000 fffff880`02412000 dc3d dc3d.sys Thu Jul 01 06:07:45 2010 (4C2C68F1)
fffff880`01dd1000 fffff880`01def000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`01dc2000 fffff880`01dd1000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0161b000 fffff880`01631000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`073c9000 fffff880`073eb000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`08889000 fffff880`0889c000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`044a1000 fffff880`046ab000 dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`0886f000 fffff880`0887b000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0807b000 fffff880`0816f000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0816f000 fffff880`081b5000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0315e000 fffff880`03183000 ETD ETD.sys Mon Jan 18 07:37:56 2010 (4B545624)
fffff880`08f57000 fffff880`08f8d000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`014c1000 fffff880`014d5000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01475000 fffff880`014c1000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01611000 fffff880`0161b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00c4c000 fffff880`00c86000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0188b000 fffff880`018d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03192000 fffff880`0319f000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03811000 fffff800`0385a000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`081d7000 fffff880`081fb000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`081b5000 fffff880`081c6000 HECIx64 HECIx64.sys Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`088c9000 fffff880`088e2000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`02412000 fffff880`0241a080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0241b000 fffff880`02429000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0409b000 fffff880`04163000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`019e8000 fffff880`019f1000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03140000 fffff880`0315e000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01222000 fffff880`0142c000 iaStor iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
fffff880`0765c000 fffff880`0807ab60 igdkmd64 igdkmd64.sys Wed Aug 25 15:35:58 2010 (4C75709E)
fffff880`0319f000 fffff880`031c5d00 Impcd Impcd.sys Fri Feb 26 18:32:11 2010 (4B8859FB)
fffff880`08828000 fffff880`0886f000 IntcDAud IntcDAud.sys Wed Feb 03 08:38:31 2010 (4B697C57)
fffff880`031c6000 fffff880`031dc000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`07000000 fffff880`07027000 jmcr jmcr.sys Tue Aug 18 04:23:06 2009 (4A8A64EA)
fffff880`07027000 fffff880`07046000 JME JME.sys Wed Feb 24 22:26:53 2010 (4B85EDFD)
fffff880`03183000 fffff880`03192000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`088e2000 fffff880`088f0000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`07046000 fffff880`0704e000 kbfiltr kbfiltr.sys Mon Jul 20 05:21:42 2009 (4A643726)
fffff800`00bc9000 fffff800`00bd3000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`07254000 fffff880`07297000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`017d7000 fffff880`017f1000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01860000 fffff880`0188b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`073eb000 fffff880`073f0200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`08951000 fffff880`08966000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0890d000 fffff880`08930000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`014e2000 fffff880`014eb000 lullaby lullaby.sys Wed Jun 17 22:45:32 2009 (4A39AA4C)
fffff880`00cae000 fffff880`00cf2000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0889c000 fffff880`088aa000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`071ea000 fffff880`071f9000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`088f0000 fffff880`088fd000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dc0000 fffff880`00dda000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04181000 fffff880`04199000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`04199000 fffff880`041c6000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`04000000 fffff880`0404e000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`0404e000 fffff880`04071000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0145f000 fffff880`0146a000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04758000 fffff880`04763000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01086000 fffff880`01090000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014eb000 fffff880`01549000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`01db7000 fffff880`01dc2000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`018dd000 fffff880`018ef000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`018f6000 fffff880`019e8000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0303a000 fffff880`03046000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`089b9000 fffff880`089cc000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03046000 fffff880`03075000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07303000 fffff880`07318000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`0448a000 fffff880`04499000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04400000 fffff880`04445000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01800000 fffff880`01860000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`04763000 fffff880`04774000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`047f0000 fffff880`047fc000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0385a000 fffff800`03e36000 nt ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
fffff880`01635000 fffff880`017d7000 Ntfs Ntfs.sys Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`046ea000 fffff880`046f3000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`08966000 fffff880`089b9000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`0444e000 fffff880`04474000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`0109d000 fffff880`010b2000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f7f000 fffff880`00fb2000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fd3000 fffff880`00fda000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fda000 fffff880`00fea000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01600000 fffff880`01611000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08c83000 fffff880`08d29000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`088fd000 fffff880`0890d000 point64 point64.sys Tue Jun 29 04:54:31 2010 (4C29B4C7)
fffff880`07200000 fffff880`0723d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf2000 fffff880`00d06000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03016000 fffff880`0303a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03075000 fffff880`03090000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03090000 fffff880`030b1000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`030b1000 fffff880`030cb000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`01d66000 fffff880`01db7000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0473d000 fffff880`04746000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`04746000 fffff880`0474f000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0474f000 fffff880`04758000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015bc000 fffff880`015f6000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`089cc000 fffff880`089e4000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01000000 fffff880`0102f000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08d29000 fffff880`08d34000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`025f7000 fffff880`025ffa80 sncduvc sncduvc.SYS Mon Dec 29 04:14:26 2008 (495894F2)
fffff880`0242e000 fffff880`025e5600 snp2uvc snp2uvc.sys Wed May 20 04:11:05 2009 (4A13BB19)
fffff880`018d5000 fffff880`018dd000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`010b5000 fffff880`011e9000 sptd sptd.sys Sun Mar 22 08:35:35 2009 (49C63097)
fffff880`08ec2000 fffff880`08f57000 srv srv.sys Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`08d73000 fffff880`08dda000 srv2 srv2.sys Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`08d34000 fffff880`08d61000 srvnet srvnet.sys Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`025e6000 fffff880`025f6d00 STREAM STREAM.SYS Mon Jul 13 20:06:18 2009 (4A5BCBFA)
fffff880`071f9000 fffff880`071fa480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01a00000 fffff880`01bfd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08d61000 fffff880`08d73000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`04792000 fffff880`0479f000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`04774000 fffff880`04792000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`01d52000 fffff880`01d66000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00410000 fffff960`0041a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`0311a000 fffff880`03140000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`089e4000 fffff880`089eb000 TurboB TurboB.sys Thu Aug 06 17:17:31 2009 (4A7B486B)
fffff880`07297000 fffff880`072a9000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`088aa000 fffff880`088c7000 usbccgp usbccgp.sys Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`088c7000 fffff880`088c8f00 USBD USBD.SYS Thu Mar 24 23:22:51 2011 (4D8C0A8B)
fffff880`081c6000 fffff880`081d7000 usbehci usbehci.sys Thu Mar 24 23:22:57 2011 (4D8C0A91)
fffff880`072a9000 fffff880`07303000 usbhub usbhub.sys Thu Mar 24 23:23:22 2011 (4D8C0AAA)
fffff880`07600000 fffff880`07656000 USBPORT USBPORT.SYS Thu Mar 24 23:23:03 2011 (4D8C0A97)
fffff880`01090000 fffff880`0109d000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`046fa000 fffff880`04708000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04708000 fffff880`0472d000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fbe000 fffff880`00fd3000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d64000 fffff880`00dc0000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`00c00000 fffff880`00c4c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`071dd000 fffff880`071ea000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`04474000 fffff880`0448a000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`01d37000 fffff880`01d52000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0472d000 fffff880`0473d000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ecc000 fffff880`00f70000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f70000 fffff880`00f7f000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04445000 fffff880`0444e000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d2000 win32k win32k.sys Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`011e9000 fffff880`011f2000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`08930000 fffff880`08951000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`08e08000 fffff880`08e10000 lvupdtio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
fffff880`08e00000 fffff880`08e08000 lvupdtio.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
fffff880`08f8d000 fffff880`08ffe000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01cf4000 fffff880`01d37000 dtsoftbus01.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00043000
fffff880`01c5c000 fffff880`01c6a000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`044a3000 fffff880`046ad000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0020A000
fffff880`046ad000 fffff880`046c0000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000