I will see about dropping down to a single stick of RAM to see if that helps; I'll report back if it solves the issue.
Mismatched sticks could be the problem.
Try to update:
nForce
nvm62x64.sys Fri Oct 17 17:01:06 2008
ATI
atikmdag.sys Wed Sep 23 18:55:17 2009
CRASH DUMPS
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-28782-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c65000 PsLoadedModuleList = 0xfffff800`02ea2e50
Debug session time: Mon May 16 15:12:42.077 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:01.324
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa800098be30, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa800098be30
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WMIADAP.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002d4926e to fffff80002cd6f00
STACK_TEXT:
fffff880`04472968 fffff800`02d4926e : 00000000`0000001a 00000000`00041790 fffffa80`0098be30 00000000`0000ffff : nt!KeBugCheckEx
fffff880`04472970 fffff800`02d18c4a : 00000000`00000000 00000000`01a62fff fffffa80`00000000 fffffa80`049b3060 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`04472b30 fffff800`02cd6153 : ffffffff`ffffffff 00000000`0024ef80 00000000`0024ef48 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`04472c20 00000000`7741009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0024eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7741009a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`02d4926e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051511-92758-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e96e50
Debug session time: Sun May 15 18:04:13.900 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:05.023
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {783, fffff88002fb67c0, fffff9802e580000, fffff8a00f2a7e40}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2c2be )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000783, The subtype of the bugcheck.
Arg2: fffff88002fb67c0
Arg3: fffff9802e580000
Arg4: fffff8a00f2a7e40
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_783
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c6d4bf to fffff80002ccaf00
STACK_TEXT:
fffff880`02fb6728 fffff800`02c6d4bf : 00000000`0000001a 00000000`00000783 fffff880`02fb67c0 fffff980`2e580000 : nt!KeBugCheckEx
fffff880`02fb6730 fffff800`02fdee35 : fffff980`2e580000 fffff8a0`0f2a7e40 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c2be
fffff880`02fb6a10 fffff800`02ce3d47 : 00000000`00000000 fffffa80`03f0ebf0 00000000`00000000 00000000`00040000 : nt!CcUnmapVacb+0x5d
fffff880`02fb6a50 fffff800`02cbaad4 : 00000000`00000001 fffffa80`03f64720 fffffa80`03f63000 00000000`00000000 : nt!CcUnmapVacbArray+0x1b7
fffff880`02fb6ae0 fffff800`02cbe55c : fffffa80`03f63010 00000000`00000011 fffffa80`03f63010 fffff800`00000000 : nt!CcDeleteSharedCacheMap+0x140
fffff880`02fb6b50 fffff800`02cbed60 : fffff800`02ed0100 fffff880`02fb6c58 00000000`00000000 00000000`00000000 : nt!CcWriteBehind+0x5bc
fffff880`02fb6c00 fffff800`02cd8161 : fffffa80`039df930 fffff880`0123e270 fffff800`02ed0140 fffffa80`039e4b00 : nt!CcWorkerThread+0x1c8
fffff880`02fb6cb0 fffff800`02f6e166 : 00000000`00000000 fffffa80`039e4b60 00000000`00000080 fffffa80`0396d9e0 : nt!ExpWorkerThread+0x111
fffff880`02fb6d40 fffff800`02ca9486 : fffff880`009e7180 fffffa80`039e4b60 fffff880`009f1f40 00000000`000000e8 : nt!PspSystemThreadStartup+0x5a
fffff880`02fb6d80 00000000`00000000 : fffff880`02fb7000 fffff880`02fb1000 fffff880`02fb63b0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+2c2be
fffff800`02c6d4bf cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2c2be
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_783_nt!_??_::FNODOBFM::_string_+2c2be
BUCKET_ID: X64_0x1a_783_nt!_??_::FNODOBFM::_string_+2c2be
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-17456-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
Debug session time: Mon May 16 14:55:18.713 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:37.835
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa8803f8b1b0, 0, fffff80002caba79, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MmCopyToCachedPage+219 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8803f8b1b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002caba79, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb30e0
fffffa8803f8b1b0
FAULTING_IP:
nt!MmCopyToCachedPage+219
fffff800`02caba79 488b07 mov rax,qword ptr [rdi]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880072bd280 -- (.trap 0xfffff880072bd280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000fffffffff
rdx=fffff80002c0b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002caba79 rsp=fffff880072bd410 rbp=fffff880072bd480
r8=0000098000000000 r9=00000000018ef040 r10=0000058000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MmCopyToCachedPage+0x219:
fffff800`02caba79 488b07 mov rax,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cfab91 to fffff80002c7cf00
STACK_TEXT:
fffff880`072bd118 fffff800`02cfab91 : 00000000`00000050 fffffa88`03f8b1b0 00000000`00000000 fffff880`072bd280 : nt!KeBugCheckEx
fffff880`072bd120 fffff800`02c7afee : 00000000`00000000 00000000`00000000 00000000`00000000 00001f80`00480000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`072bd280 fffff800`02caba79 : 00000000`00000002 ffffffff`ffffffff 00000000`00000002 ffffffff`ffffffff : nt!KiPageFault+0x16e
fffff880`072bd410 fffff800`02ca8e8e : fffff980`0293f000 00000000`018ef040 fffff880`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x219
fffff880`072bd600 fffff800`02ca8bf4 : fffffa80`051beb10 00000000`018ef040 fffff880`072bd740 fffff8a0`00000000 : nt!CcMapAndCopyInToCache+0x20e
fffff880`072bd6f0 fffff880`012b6fb8 : 00000000`02180000 fffffa80`051d3a00 fffff880`072bd7e0 fffffa80`00010000 : nt!CcCopyWrite+0x194
fffff880`072bd780 fffff880`01085132 : fffffa80`051d3a20 fffff880`01088732 00000000`00010000 00000000`00010001 : Ntfs!NtfsCopyWriteA+0x208
fffff880`072bd970 fffff880`01088c2a : fffff880`072bda40 fffffa80`03b6c0d8 00000000`018e0000 00000000`00010000 : fltmgr!FltpPerformFastIoCall+0xf2
fffff880`072bd9d0 fffff880`010a67fe : 00000000`00010000 00000000`00000000 fffffa80`051d3a20 fffff880`072bdb40 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`072bda10 fffff800`02f9148e : fffffa80`051d3a94 fffffa80`00000002 fffffa80`03a1c080 fffffa80`051d3a94 : fltmgr!FltpFastIoWrite+0x1ce
fffff880`072bdab0 fffff800`02c7c153 : 00000000`00000701 00000000`000001a0 00000000`00000000 00000000`001da9d8 : nt!NtWriteFile+0x5ad
fffff880`072bdbb0 00000000`76f3ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0010bda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f3ff3a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmCopyToCachedPage+219
fffff800`02caba79 488b07 mov rax,qword ptr [rdi]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MmCopyToCachedPage+219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MmCopyToCachedPage+219
BUCKET_ID: X64_0x50_nt!MmCopyToCachedPage+219
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-27284-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e46e50
Debug session time: Mon May 16 15:26:24.139 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:18.386
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8000a05c30, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8000a05c30
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: drvinst.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ced26e to fffff80002c7af00
STACK_TEXT:
fffff880`038ff828 fffff800`02ced26e : 00000000`0000001a 00000000`00041790 fffffa80`00a05c30 00000000`0000ffff : nt!KeBugCheckEx
fffff880`038ff830 fffff800`02cae5d9 : 00000000`00000000 00000000`017bafff fffff880`00000000 fffffa80`043b1060 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`038ff9f0 fffff800`02f90e50 : fffffa80`068d1260 0007ffff`00000001 fffffa80`05cb1be0 fffffa80`066a18b0 : nt!MiRemoveMappedView+0xd9
fffff880`038ffb10 fffff800`02f9125b : 00000000`00000000 00000000`01120000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b0
fffff880`038ffbd0 fffff800`02c7a153 : 00000000`00000001 00000000`00000002 fffffa80`05029060 fffffa80`05718c60 : nt!NtUnmapViewOfSection+0x5f
fffff880`038ffc20 00000000`773e015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`004edc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773e015a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`02ced26e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-27830-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c13000 PsLoadedModuleList = 0xfffff800`02e50e50
Debug session time: Mon May 16 15:36:57.325 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:58.572
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa80009b05b0, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80009b05b0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002cf726e to fffff80002c84f00
STACK_TEXT:
fffff880`02736828 fffff800`02cf726e : 00000000`0000001a 00000000`00041790 fffffa80`009b05b0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`02736830 fffff800`02cb85d9 : 00000000`00000000 000007fe`f5d87fff fffffa80`00000000 fffffa80`059ff610 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`027369f0 fffff800`02f9ae50 : fffffa80`04b46ef0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`02736b10 fffff800`02f9b25b : 00000000`00000000 000007fe`f5cb0000 fffffa80`00000001 fffffa80`057b3010 : nt!MiUnmapViewOfSection+0x1b0
fffff880`02736bd0 fffff800`02c84153 : fffffa80`04b3f660 fffff880`02736ca0 fffffa80`04b3db30 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`02736c20 00000000`76ea015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0018ab58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ea015a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`02cf726e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
Followup: MachineOwner
---------
DRIVERS
Code:
start end module name
fffff880`04fd4000 fffff880`04fff000 000 000.fcl Fri Sep 26 09:11:22 2008 (48DCDF7A)
fffff880`01995000 fffff880`019d3000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00eb6000 fffff880`00f0d000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c08000 fffff880`02c92000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`048c7000 fffff880`048dd000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c00000 fffff880`00c0b000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`053f4000 fffff880`053ff000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00dc3000 fffff880`00dcc000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dcc000 fffff880`00df6000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03e99000 fffff880`044d4000 atikmdag atikmdag.sys Wed Sep 23 18:55:17 2009 (4ABAA755)
fffff880`018e9000 fffff880`018f0000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ba0000 fffff880`03bb1000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03925000 fffff880`03943000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007d0000 fffff960`007f7000 cdd cdd.dll unavailable (00000000)
fffff880`0188a000 fffff880`018b4000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ce9000 fffff880`00da9000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01824000 fffff880`01854000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c8b000 fffff880`00ce9000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01135000 fffff880`011a8000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`048b7000 fffff880`048c7000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04dc4000 fffff880`04dd2000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03aff000 fffff880`03b82000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03b82000 fffff880`03ba0000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dc9000 fffff880`02dd8000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01235000 fffff880`0124b000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d17000 fffff880`04d39000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04dde000 fffff880`04de7000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04dd2000 fffff880`04dde000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04de7000 fffff880`04dfa000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04c00000 fffff880`04c0c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044d4000 fffff880`045c8000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03e00000 fffff880`03e46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03bed000 fffff880`03bfa000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`010c3000 fffff880`010d7000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`04812000 fffff880`0481d000 flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`01077000 fffff880`010c3000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0103a000 fffff880`01074000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`031f0000 fffff800`03239000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03ac8000 fffff880`03aec000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04c7e000 fffff880`04cda000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04d87000 fffff880`04da0000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04da0000 fffff880`04da8080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04d79000 fffff880`04d87000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0385d000 fffff880`03925000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03a29000 fffff880`03a47000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03bd7000 fffff880`03bed000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0499d000 fffff880`049ac000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04da9000 fffff880`04db7000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb1000 fffff800`00bbb000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`049ae000 fffff880`049f1000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`04d39000 fffff880`04d3e200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0482b000 fffff880`04840000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e46000 fffff880`03e69000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c33000 fffff880`00c77000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0481d000 fffff880`0482b000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03a47000 fffff880`03a56000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04db7000 fffff880`04dc4000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00da9000 fffff880`00dc3000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`018b4000 fffff880`018e0000 MpFilter MpFilter.sys Wed Jun 10 22:33:21 2009 (4A306CF1)
fffff880`05373000 fffff880`05383000 MpNWMon MpNWMon.sys Wed Jun 10 22:33:23 2009 (4A306CF3)
fffff880`03943000 fffff880`0395b000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0395b000 fffff880`03987000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`03987000 fffff880`039d4000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`039d4000 fffff880`039f7000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`0194e000 fffff880`01959000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f16000 fffff880`00f20000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010d7000 fffff880`01135000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dbe000 fffff880`02dc9000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e3000 fffff880`015f5000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01491000 fffff880`01583000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04901000 fffff880`0490d000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0490d000 fffff880`0493c000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04c69000 fffff880`04c7e000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d06000 fffff880`02d15000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c92000 fffff880`02cd7000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01583000 fffff880`015e3000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01959000 fffff880`0196a000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02db2000 fffff880`02dbe000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c13000 fffff800`031f0000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01250000 fffff880`013f3000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018e0000 fffff880`018e9000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04d3f000 fffff880`04d57000 nvhda64v nvhda64v.sys Fri Aug 21 16:23:50 2009 (4A8F0256)
fffff880`0484a000 fffff880`048add80 nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
fffff880`02ce0000 fffff880`02d06000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03a0c000 fffff880`03a29000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f60000 fffff880`00f75000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f20000 fffff880`00f53000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fe6000 fffff880`00fed000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fed000 fffff880`00ffd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04ee4000 fffff880`04f8a000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04cda000 fffff880`04d17000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c77000 fffff880`00c8b000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`048dd000 fffff880`04901000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0493c000 fffff880`04957000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04957000 fffff880`04978000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04978000 fffff880`04992000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d61000 fffff880`02db2000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04992000 fffff880`0499d000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01933000 fffff880`0193c000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`052f3000 fffff880`05321000 rdpdr rdpdr.sys Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`0193c000 fffff880`01945000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01945000 fffff880`0194e000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0533b000 fffff880`05373000 RDPWD RDPWD.SYS Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`045c8000 fffff880`045e0000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04f8a000 fffff880`04f95000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03a00000 fffff880`03a0c000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d15000 fffff880`02d32000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01485000 fffff880`0148d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05383000 fffff880`053f4000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0525b000 fffff880`052f3000 srv srv.sys Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`04e00000 fffff880`04e69000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`04f95000 fffff880`04fc2000 srvnet srvnet.sys Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`049ac000 fffff880`049ad480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`04fc2000 fffff880`04fd4000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01988000 fffff880`01995000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`05321000 fffff880`0532c000 tdtcp tdtcp.sys Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`0196a000 fffff880`01988000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d4d000 fffff880`02d61000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00550000 fffff960`0055a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0532c000 fffff880`0533b000 tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`03bb1000 fffff880`03bd7000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04800000 fffff880`04812000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04d57000 fffff880`04d74000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04d74000 fffff880`04d75f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03ab7000 fffff880`03ac8000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04d76000 fffff880`04d79000 UsbFltr UsbFltr.sys Mon Apr 09 06:09:44 2007 (461A10E8)
fffff880`04c0f000 fffff880`04c69000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03a56000 fffff880`03a61000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03a61000 fffff880`03ab7000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f53000 fffff880`00f60000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018f0000 fffff880`018fe000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`018fe000 fffff880`01923000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f75000 fffff880`00f8a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f8a000 fffff880`00fe6000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011a8000 fffff880`011f4000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d32000 fffff880`02d4d000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01923000 fffff880`01933000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e03000 fffff880`00ea7000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea7000 fffff880`00eb6000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cd7000 fffff880`02ce0000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000f0000 fffff960`003ff000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`048ae000 fffff880`048b7000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f0d000 fffff880`00f16000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03e69000 fffff880`03e8a000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`01854000 fffff880`01862000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01862000 fffff880`0186e000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0186e000 fffff880`01877000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01877000 fffff880`0188a000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000