Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072410-22666-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a59000 PsLoadedModuleList = 0xfffff800`02c96e50
Debug session time: Sat Jul 24 11:56:30.461 2010 (GMT-4)
System Uptime: 0 days 0:04:48.802
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa8000c11550, 0, 0}
Probably caused by : Pool_Corruption ( nt!ExFreePool+536 )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8000c11550, the pool entry being checked.
Arg3: 0000000000000000, the read back flink freelist value (should be the same as 2).
Arg4: 0000000000000000, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002bfcd6f to fffff80002ac9600
STACK_TEXT:
fffff880`06806758 fffff800`02bfcd6f : 00000000`00000019 00000000`00000003 fffffa80`00c11550 00000000`00000000 : nt!KeBugCheckEx
fffff880`06806760 fffff800`02aef63a : fffffa80`00000003 00010000`00010d0d fffffa80`01792010 fffffa80`00000000 : nt!ExFreePool+0x536
fffff880`06806850 fffff880`013057c9 : 00010000`00010d0d fffffa80`01792010 fffffa80`017807a0 fffff8a0`02cf7010 : nt!RtlInsertElementGenericTableFullAvl+0x4a
fffff880`06806890 fffff880`012d1cf6 : fffffa80`017807a0 fffffa80`01b07180 fffffa80`017807a0 00010000`00010d0d : Ntfs!NtfsCreateFcb+0x211
fffff880`06806970 fffff880`012f5b04 : fffff880`06161490 fffffa80`01792010 fffffa80`017807a0 00000000`00000000 : Ntfs!NtfsOpenFile+0x1ca
fffff880`06806b50 fffff880`0125ec0d : fffffa80`017807a0 fffffa80`01792010 fffff880`06161490 fffffa80`00dfcb00 : Ntfs!NtfsCommonCreate+0xc54
fffff880`06806d30 fffff800`02ac1487 : fffff880`06161400 00000000`00000000 00000000`7ee75000 00000000`034aff88 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`06806d60 fffff800`02ac1441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`061612d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExFreePool+536
fffff800`02bfcd6f cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExFreePool+536
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExFreePool+536
BUCKET_ID: X64_0x19_3_nt!ExFreePool+536
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072410-23665-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
Debug session time: Fri Jul 23 19:17:50.193 2010 (GMT-4)
System Uptime: 0 days 0:07:12.128
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa80126d3010, 2, 1, fffff800029459f7}
Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa80126d3010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800029459f7, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abf0e0
fffffa80126d3010
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`029459f7 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: regsvr32.exe
TRAP_FRAME: fffff88006c607c0 -- (.trap 0xfffff88006c607c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80026d3010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800029459f7 rsp=fffff88006c60950 rbp=0000000080000000
r8=fffff88006c60980 r9=fffffa80016c3ec8 r10=0000000fffffffff
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x87:
fffff800`029459f7 480fb328 btr qword ptr [rax],rbp ds:3000:fffffa80`026d3010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002886b69 to fffff80002887600
STACK_TEXT:
fffff880`06c60678 fffff800`02886b69 : 00000000`0000000a fffffa80`126d3010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`06c60680 fffff800`028857e0 : 00000000`7746a000 fffffa80`0198fb60 00000000`778d9000 00000000`73f9a000 : nt!KiBugCheckDispatch+0x69
fffff880`06c607c0 fffff800`029459f7 : 00000000`778b3000 fffffa80`0198fb60 fffffa80`01edf010 00000000`75fc5000 : nt!KiPageFault+0x260
fffff880`06c60950 fffff800`02837ad6 : 80000000`00000000 00000000`00000015 80000000`00000000 00000000`00000002 : nt!MiReleaseConfirmedPageFileSpace+0x87
fffff880`06c609d0 fffff800`0285b324 : fffffa80`016c3ec8 00000000`00000001 00000000`00000000 fffffa80`0000001c : nt! ?? ::FNODOBFM::`string'+0x20a72
fffff880`06c60a50 fffff800`0285a5ae : 00000000`00000001 fffffa80`016c3b30 fffffa80`016c3b30 00000000`00000001 : nt!MiDeleteAllHashMappings+0xe4
fffff880`06c60a90 fffff800`02b6dc4f : fffff8a0`02a101b0 00000000`00000001 00000000`00000000 fffffa80`0198fb60 : nt!MmCleanProcessAddressSpace+0xa2
fffff880`06c60ae0 fffff800`02b456eb : 00000000`00000003 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`06c60ba0 fffff800`02886853 : fffffa80`016c3b30 fffff880`00000003 00000000`7efdb000 fffffa80`0198fb60 : nt!NtTerminateProcess+0x25b
fffff880`06c60c20 00000000`7771001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0014dc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7771001a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`029459f7 480fb328 btr qword ptr [rax],rbp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072410-24024-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c93e50
Debug session time: Sat Jul 24 17:10:00.726 2010 (GMT-4)
System Uptime: 0 days 0:07:18.067
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5001, fffff70001080000, 0, fffff6fb7dbed009}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29961 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005001, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000000000
Arg4: fffff6fb7dbed009
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5001
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: GoogleUpdate.e
CURRENT_IRQL: 0
TRAP_FRAME: fffff880064b7a50 -- (.trap 0xfffff880064b7a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007ffffff0000 rbx=0000000000000000 rcx=0000000000413ce8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d87377 rsp=fffff880064b7be0 rbp=fffff880064b8ca0
r8=0000000000013ce8 r9=000000000000000a r10=0000000000400000
r11=0000000000413ce8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiInitializeWowPeb+0x8f:
fffff800`02d87377 418a03 mov al,byte ptr [r11] ds:d790:00000000`00413ce8=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b357b2 to fffff80002ac6600
STACK_TEXT:
fffff880`064b7788 fffff800`02b357b2 : 00000000`0000001a 00000000`00005001 fffff700`01080000 00000000`00000000 : nt!KeBugCheckEx
fffff880`064b7790 fffff800`02ab84a9 : fffffa80`0343f6e0 00000000`00000000 fffffa80`016adb28 00000000`00413ce8 : nt! ?? ::FNODOBFM::`string'+0x29961
fffff880`064b7820 fffff800`02ae179b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffffa80`00000000 : nt!MiIssueHardFault+0x309
fffff880`064b78f0 fffff800`02ac46ee : 00000000`00000000 00000000`7efdf000 fffffa80`00e48200 fffff800`00000004 : nt!MmAccessFault+0x14bb
fffff880`064b7a50 fffff800`02d87377 : 00000000`7efdf000 fffff880`064b8ca0 00000000`004000e8 fffffa80`00e48230 : nt!KiPageFault+0x16e
fffff880`064b7be0 fffff800`02d77780 : 00000000`7efdf000 fffffa80`016ad790 fffff880`00000001 00000000`004000e8 : nt!MiInitializeWowPeb+0x8f
fffff880`064b7c80 fffff800`02d755e9 : fffffa80`00000000 fffffa80`016c1060 fffffa80`016adac8 00000000`00000020 : nt!MmCreatePeb+0x447
fffff880`064b7db0 fffff800`02d72e48 : 00000000`00000000 00000000`0042f890 fffff880`064b86f0 fffffa80`0176891a : nt!PspAllocateProcess+0x79d
fffff880`064b8080 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateUserProcess+0x4a3
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+29961
fffff800`02b357b2 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29961
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1a_5001_nt!_??_::FNODOBFM::_string_+29961
BUCKET_ID: X64_0x1a_5001_nt!_??_::FNODOBFM::_string_+29961
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidumps.zip\072510-30919-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a4d000 PsLoadedModuleList = 0xfffff800`02c8ae50
Debug session time: Sun Jul 25 08:28:10.898 2010 (GMT-4)
System Uptime: 0 days 0:01:20.958
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1097, 0, fffff8a000a08010}
GetPointerFromAddress: unable to read from fffff80002cf50e0
GetUlongFromAddress: unable to read from fffff80002c631b0
GetUlongFromAddress: unable to read from fffff80002c631b0
Probably caused by : fltmgr.sys ( fltmgr!FltpPerformPreCallbacks+8f0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: fffff8a000a08010, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff80002c631b0
GetUlongFromAddress: unable to read from fffff80002c631b0
POOL_ADDRESS: fffff8a000a08010
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002bf060e to fffff80002abd600
STACK_TEXT:
fffff880`02fff838 fffff800`02bf060e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fff840 fffff880`01180620 : fffffa80`0220e050 fffffa80`0220e050 fffffa80`02363684 00000000`00000000 : nt!ExFreePool+0xccb
fffff880`02fff8f0 fffff880`01180be9 : fffff880`02ff8000 fffff800`00000002 fffff800`02c41000 fffff800`02ac0c00 : fltmgr!FltpPerformPreCallbacks+0x8f0
fffff880`02fff9f0 fffff880`0117f6c7 : fffffa80`03842380 fffffa80`01b7f8e0 fffffa80`016b2400 00000000`00000000 : fltmgr!FltpPassThrough+0x2d9
fffff880`02fffa70 fffff800`02dd472e : fffffa80`0220e050 fffffa80`01b79190 fffff8a0`00a082c0 fffffa80`01b7f8e0 : fltmgr!FltpDispatch+0xb7
fffff880`02fffad0 fffff800`02ac27b4 : 00000000`00000000 00000000`00000000 fffffa80`00ca0080 00000000`00000000 : nt!IopDeleteFile+0x11e
fffff880`02fffb60 fffff800`02daf229 : 00000000`00000000 00000000`00080081 fffffa80`0220e9f0 fffffa80`00080081 : nt!ObfDereferenceObject+0xd4
fffff880`02fffbc0 fffff800`02be4fcb : fffffa80`0220e9f8 00000000`00000001 00000000`00000000 00000000`00000631 : nt!MiSegmentDelete+0xa1
fffff880`02fffc00 fffff800`02be563d : 00000000`00000000 00000000`00000080 fffffa80`00c82040 00000000`00000012 : nt!MiProcessDereferenceList+0x23b
fffff880`02fffcc0 fffff800`02d62a86 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDereferenceSegmentThread+0x10d
fffff880`02fffd40 fffff800`02a9bb06 : fffff800`02c37e80 fffffa80`00ca1510 fffff800`02c45c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fffd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
fltmgr!FltpPerformPreCallbacks+8f0
fffff880`01180620 4885db test rbx,rbx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: fltmgr!FltpPerformPreCallbacks+8f0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11f
FAILURE_BUCKET_ID: X64_0xc2_7_fltmgr!FltpPerformPreCallbacks+8f0
BUCKET_ID: X64_0xc2_7_fltmgr!FltpPerformPreCallbacks+8f0
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
fffff880`00f04000 fffff880`00f5b000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0413d000 fffff880`041c7000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05187000 fffff880`0519d000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01173000 fffff880`0117e000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`01135000 fffff880`0113e000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0113e000 fffff880`01168000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`050fb000 fffff880`05116000 b44amd64 b44amd64.sys Tue Nov 21 07:23:06 2006 (4562EFAA)
fffff880`00fcc000 fffff880`00fd8000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`04e46000 fffff880`050ee000 bcmwl664 bcmwl664.sys Tue Jul 07 20:45:04 2009 (4A53EC10)
fffff880`02ca1000 fffff880`02cb2000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02944000 fffff880`02962000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00770000 fffff960`00797000 cdd cdd.dll unavailable (00000000)
fffff880`0191c000 fffff880`01946000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf2000 fffff880`00db2000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018b4000 fffff880`018e4000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c94000 fffff880`00cf2000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05169000 fffff880`0516d500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01405000 fffff880`01478000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fc3000 fffff880`00fcc000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`05177000 fffff880`05187000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05951000 fffff880`0595f000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c00000 fffff880`02c83000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`02c83000 fffff880`02ca1000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02d91000 fffff880`02da0000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0189e000 fffff880`018b4000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0523d000 fffff880`0525f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0595f000 fffff880`0596b000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05976000 fffff880`05989000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0596b000 fffff880`05976000 dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`05996000 fffff880`059a2000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ae5000 fffff880`03bd9000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03a00000 fffff880`03a46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`011ca000 fffff880`011de000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0117e000 fffff880`011ca000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01489000 fffff880`01493000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00c00000 fffff880`00c3a000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`00e00000 fffff880`00e4a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`0515c000 fffff880`05169000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02a04000 fffff800`02a4d000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03aba000 fffff880`03ade000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`053a2000 fffff880`053fe000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`0592d000 fffff880`05946000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05946000 fffff880`0594e080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0591f000 fffff880`0592d000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0287c000 fffff880`02944000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0122b000 fffff880`01234000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`05116000 fffff880`05134000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0480e000 fffff880`04df2fe0 igdkmd64 igdkmd64.sys Wed Sep 23 15:22:57 2009 (4ABA7591)
fffff880`01103000 fffff880`0110b000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dc6000 fffff880`02ddc000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0514d000 fffff880`0515c000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bd2000 fffff800`00bdc000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03c14000 fffff880`0413d000 kl1 kl1.sys Mon Jun 15 06:00:30 2009 (4A361BBE)
fffff880`011de000 fffff880`011ea000 klbg klbg.sys Mon Dec 15 11:41:13 2008 (494688A9)
fffff880`01946000 fffff880`0199c000 klif klif.sys Fri Jul 03 05:07:48 2009 (4A4DCA64)
fffff880`02ce1000 fffff880`02ceb000 klim6 klim6.sys Fri May 15 10:50:08 2009 (4A0D8120)
fffff880`05134000 fffff880`0513e000 klmouflt klmouflt.sys Sat May 16 12:58:34 2009 (4A0EF0BA)
fffff880`052de000 fffff880`05321000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013d7000 fffff880`013f1000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01200000 fffff880`0122b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0525f000 fffff880`05264200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05800000 fffff880`05815000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`059b0000 fffff880`059d3000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c3c000 fffff880`00c80000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`05910000 fffff880`0591f000 modem modem.sys Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`059a2000 fffff880`059b0000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0513e000 fffff880`0514d000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05989000 fffff880`05996000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`0111b000 fffff880`01135000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02962000 fffff880`0297a000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0297a000 fffff880`029a7000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`029a7000 fffff880`029f5000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`02800000 fffff880`02823000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01168000 fffff880`01173000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01809000 fffff880`01814000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f64000 fffff880`00f6e000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02d86000 fffff880`02d91000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`011ea000 fffff880`011fc000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01493000 fffff880`01585000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`051c1000 fffff880`051cd000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05815000 fffff880`05828000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`051cd000 fffff880`051fc000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0538d000 fffff880`053a2000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02ceb000 fffff880`02cfa000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`01850000 fffff880`01895000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01585000 fffff880`015e5000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01814000 fffff880`01825000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02d7a000 fffff880`02d86000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a4d000 fffff800`03029000 nt ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
fffff880`01234000 fffff880`013d7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0199c000 fffff880`019a5000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05600000 fffff880`05653000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`041d0000 fffff880`041f6000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fae000 fffff880`00fc3000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f6e000 fffff880`00fa1000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0110b000 fffff880`0111b000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01478000 fffff880`01489000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03875000 fffff880`0391b000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05200000 fffff880`0523d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c80000 fffff880`00c94000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0519d000 fffff880`051c1000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04e00000 fffff880`04e1b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04e1b000 fffff880`04e3c000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03bd9000 fffff880`03bf3000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d29000 fffff880`02d7a000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03bf3000 fffff880`03bfe000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019e8000 fffff880`019f1000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019f1000 fffff880`019fa000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01800000 fffff880`01809000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0105e000 fffff880`01098000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05828000 fffff880`05840000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0399d000 fffff880`039a8000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`015f5000 fffff880`015fd000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05ede000 fffff880`05f76000 srv srv.sys Tue Dec 08 03:32:55 2009 (4B1E0F37)
fffff880`03800000 fffff880`03869000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`039a8000 fffff880`039d5000 srvnet srvnet.sys Tue Dec 08 03:32:26 2009 (4B1E0F1A)
fffff880`04e3c000 fffff880`04e3d480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`039d5000 fffff880`039e7000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01843000 fffff880`01850000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01825000 fffff880`01843000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d15000 fffff880`02d29000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004d0000 fffff960`004da000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`02da0000 fffff880`02dc6000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`05321000 fffff880`05333000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0594f000 fffff880`05950f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03aa9000 fffff880`03aba000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05333000 fffff880`0538d000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03a53000 fffff880`03aa9000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03a46000 fffff880`03a53000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fa1000 fffff880`00fae000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019a5000 fffff880`019b3000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019b3000 fffff880`019d8000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015e5000 fffff880`015f5000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fd8000 fffff880`00fed000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010a7000 fffff880`01103000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`00db2000 fffff880`00dfe000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`05265000 fffff880`052b7000 VSTAZL6 VSTAZL6.SYS Wed Oct 15 20:53:42 2008 (48F69096)
fffff880`05845000 fffff880`05910000 VSTCNXT6 VSTCNXT6.SYS Wed Oct 15 20:52:22 2008 (48F69046)
fffff880`05675000 fffff880`057e9000 VSTDPV6 VSTDPV6.SYS Wed Oct 15 20:57:45 2008 (48F69189)
fffff880`050ee000 fffff880`050fb000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02ccb000 fffff880`02ce1000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02cfa000 fffff880`02d15000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019d8000 fffff880`019e8000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e51000 fffff880`00ef5000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ef5000 fffff880`00f04000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`041c7000 fffff880`041d0000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`0036f000 win32k win32k.sys unavailable (00000000)
fffff880`0516e000 fffff880`05177000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f5b000 fffff880`00f64000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`059d3000 fffff880`059f4000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`03946000 fffff880`0399d000 rixdpx64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0392f000 fffff880`03946000 rimspx64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0391b000 fffff880`0392f000 rimmpx64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018e4000 fffff880`018f2000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018f2000 fffff880`018fe000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018fe000 fffff880`01909000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01909000 fffff880`0191c000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Since drivers are mentioned as a possible cause, I will start with them. You have some very old drivers on your system and Win 7 does not like obsolete drivers. They can and will cause BSOD's.