BCCode 1000007e (DMP Included)

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by silentn92, Jan 17, 2011.

  1. silentn92

    silentn92 New Member

    Joined:
    Jan 17, 2011
    Messages:
    4
    Likes Received:
    0
    Keeps crashing every 30 mins, and it's annoying the crap out of me because I can't get any work done. It's been happening for over a week now... and I'm not sure if it's a memory issue because we had an outage a week ago, and that's when it started.

    Could you guys help me debug this?

    DMP has been attached.

    Thanks
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    One of your blue screens was caused by Atheros Wireless USB:


    BugCheck 1000007E, {ffffffffc0000005, fffff880026f204b, fffff88004c6e918, fffff88004c6e180}
    Probably caused by : athrxusb.sys ( athrxusb+6804b )



    You have too many outdated drivers, update as many as you can. Otherwise bsods will persist.

    1. Update Driver for Atheros Wireless USB Network Adapter:

    athrxusb.sys Mon Jan 29 07:57:10 2007


    2. Update ATI:

    atikmdag.sys Sun Jun 14 22:41:39 2009


    3. Update Intel Matrix Storage:

    iaStor.sys Thu Jun 04 21:53:40 2009



    4. Update JMicron RAID driver:

    jraid.sys Wed May 27 01:39:35 2009


    5. Update Logitech QuickCam:

    LVUSBS64.sys Fri May 11 20:01:20 2007


    6. Update RIM Modem:

    RimSerial_AMD64.sys Mon Nov 24 12:01:01 2008


    7. Update Realtek Audio:

    RTKVHD64.sys Fri May 22 14:04:20 2009


    8. Update Realtek USB Mass Storage:

    RtsUStor.sys Thu Jun 04 04:46:49 2009


    9. Update OpenVPN:

    tap0901.sys Wed Nov 19 13:22:35 2008


    10. Update Acronis:

    tdrpm258.sys Tue Oct 20 03:39:53 2009

    11. Daemon Tools

    12. If crashes persist, uninstall Daemon Tools, uninstall AVG and replace it with MSE:

    AVG - Download tools

    www.microsoft.com/security_essentials/





    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\011711-28641-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03001000 PsLoadedModuleList = 0xfffff800`0323ee50
    Debug session time: Mon Jan 17 15:27:45.663 2011 (UTC - 5:00)
    System Uptime: 0 days 0:09:30.599
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 18, {0, fffffa8005564a00, 2, a27d3a03114df019}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46411 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    REFERENCE_BY_POINTER (18)
    Arguments:
    Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
    Arg2: fffffa8005564a00, Object whose reference count is being lowered
    Arg3: 0000000000000002, Reserved
    Arg4: a27d3a03114df019, Reserved
    	The reference count of an object is illegal for the current state of the object.
    	Each time a driver uses a pointer to an object the driver calls a kernel routine
    	to increment the reference count of the object. When the driver is done with the
    	pointer the driver calls another kernel routine to decrement the reference count.
    	Drivers must match calls to the increment and decrement routines. This bugcheck
    	can occur because an object's reference count goes to zero while there are still
    	open handles to the object, in which case the fourth parameter indicates the number
    	of opened handles. It may also occur when the object’s reference count drops below zero
    	whether or not there are open handles to the object, and in that case the fourth parameter
    	contains the actual value of the pointer references count.
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x18
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80003008fdc to fffff80003071740
    
    STACK_TEXT:  
    fffff880`03718c48 fffff800`03008fdc : 00000000`00000018 00000000`00000000 fffffa80`05564a00 00000000`00000002 : nt!KeBugCheckEx
    fffff880`03718c50 fffff800`0307e961 : fffff800`032165a0 fffff800`0336dc20 fffffa80`0251cb60 fffffa80`00000003 : nt! ?? ::FNODOBFM::`string'+0x46411
    fffff880`03718cb0 fffff800`03315c06 : 5ec05ec0`71427142 fffffa80`0251cb60 00000000`00000080 fffffa80`024be040 : nt!ExpWorkerThread+0x111
    fffff880`03718d40 fffff800`0304fc26 : fffff880`03583180 fffffa80`0251cb60 fffff880`0358e0c0 d847d847`59175917 : nt!PspSystemThreadStartup+0x5a
    fffff880`03718d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+46411
    fffff800`03008fdc cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+46411
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+46411
    
    BUCKET_ID:  X64_0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+46411
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\10675d1295296479-bccode-1000007e-dmp-included-011711-28236-01-dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03246e50
    Debug session time: Mon Jan 17 00:19:06.625 2011 (UTC - 5:00)
    System Uptime: 0 days 6:44:19.577
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    .............
    Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for athrxusb.sys
    *** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff880026f204b, fffff88004c6e918, fffff88004c6e180}
    
    Probably caused by : athrxusb.sys ( athrxusb+6804b )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff880026f204b, The address that the exception occurred at
    Arg3: fffff88004c6e918, Exception Record Address
    Arg4: fffff88004c6e180, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    athrxusb+6804b
    fffff880`026f204b 0fb7896e360000  movzx   ecx,word ptr [rcx+366Eh]
    
    EXCEPTION_RECORD:  fffff88004c6e918 -- (.exr 0xfffff88004c6e918)
    ExceptionAddress: fffff880026f204b (athrxusb+0x000000000006804b)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88004c6e180 -- (.cxr 0xfffff88004c6e180)
    rax=000000000000000b rbx=fffffa8005120b60 rcx=ffff000000000063
    rdx=fffffa8000000063 rsi=fffffa80024af040 rdi=0000000000000001
    rip=fffff880026f204b rsp=fffff88004c6eb50 rbp=0000000000000080
     r8=0000000000000028  r9=fffff88003163180 r10=fffffa80024ed810
    r11=fffffa800354b520 r12=fffffa800532e0a0 r13=fffff880026e0ea0
    r14=0000000000000000 r15=fffff88003168040
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    athrxusb+0x6804b:
    fffff880`026f204b 0fb7896e360000  movzx   ecx,word ptr [rcx+366Eh] ds:002b:ffff0000`000036d1=????
    Resetting default scope
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b10e0
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    athrxusb+6804b
    fffff880`026f204b 0fb7896e360000  movzx   ecx,word ptr [rcx+366Eh]
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from fffffa8005323030 to fffff880026f204b
    
    STACK_TEXT:  
    fffff880`04c6eb50 fffffa80`05323030 : fffff880`04c6eb78 fffffa80`00000022 fffff880`026de710 ffff000b`00000022 : athrxusb+0x6804b
    fffff880`04c6eb58 fffff880`04c6eb78 : fffffa80`00000022 fffff880`026de710 ffff000b`00000022 907c0000`907e0021 : 0xfffffa80`05323030
    fffff880`04c6eb60 fffffa80`00000022 : fffff880`026de710 ffff000b`00000022 907c0000`907e0021 91040000`91060062 : 0xfffff880`04c6eb78
    fffff880`04c6eb68 fffff880`026de710 : ffff000b`00000022 907c0000`907e0021 91040000`91060062 91080000`910a0044 : 0xfffffa80`00000022
    fffff880`04c6eb70 ffff000b`00000022 : 907c0000`907e0021 91040000`91060062 91080000`910a0044 910c0000`910e004d : athrxusb+0x54710
    fffff880`04c6eb78 907c0000`907e0021 : 91040000`91060062 91080000`910a0044 910c0000`910e004d 91100000`91120056 : 0xffff000b`00000022
    fffff880`04c6eb80 91040000`91060062 : 91080000`910a0044 910c0000`910e004d 91100000`91120056 ffff0000`00000063 : 0x907c0000`907e0021
    fffff880`04c6eb88 91080000`910a0044 : 910c0000`910e004d 91100000`91120056 ffff0000`00000063 fffff880`026e0ea0 : 0x91040000`91060062
    fffff880`04c6eb90 910c0000`910e004d : 91100000`91120056 ffff0000`00000063 fffff880`026e0ea0 00000000`0000000a : 0x91080000`910a0044
    fffff880`04c6eb98 91100000`91120056 : ffff0000`00000063 fffff880`026e0ea0 00000000`0000000a fffff880`026f211a : 0x910c0000`910e004d
    fffff880`04c6eba0 ffff0000`00000063 : fffff880`026e0ea0 00000000`0000000a fffff880`026f211a fffffa80`0535e030 : 0x91100000`91120056
    fffff880`04c6eba8 fffff880`026e0ea0 : 00000000`0000000a fffff880`026f211a fffffa80`0535e030 00000000`00000000 : 0xffff0000`00000063
    fffff880`04c6ebb0 00000000`0000000a : fffff880`026f211a fffffa80`0535e030 00000000`00000000 0000000c`00000006 : athrxusb+0x56ea0
    fffff880`04c6ebb8 fffff880`026f211a : fffffa80`0535e030 00000000`00000000 0000000c`00000006 00000002`03082cff : 0xa
    fffff880`04c6ebc0 fffffa80`0535e030 : 00000000`00000000 0000000c`00000006 00000002`03082cff fffffa80`0535e030 : athrxusb+0x6811a
    fffff880`04c6ebc8 00000000`00000000 : 0000000c`00000006 00000002`03082cff fffffa80`0535e030 ffff0000`06b6ec3f : 0xfffffa80`0535e030
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  athrxusb+6804b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: athrxusb
    
    IMAGE_NAME:  athrxusb.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  45bdef26
    
    STACK_COMMAND:  .cxr 0xfffff88004c6e180 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x7E_athrxusb+6804b
    
    BUCKET_ID:  X64_0x7E_athrxusb+6804b
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\011711-31247-01-dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03016000 PsLoadedModuleList = 0xfffff800`03253e50
    Debug session time: Mon Jan 17 15:17:18.616 2011 (UTC - 5:00)
    System Uptime: 0 days 0:13:12.458
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff8000306f2c9, 0, ffffffffffffffff}
    
    Probably caused by : memory_corruption ( nt!MiDereferenceControlAreaPfn+5d )
    
    Followup: MachineOwner
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8000306f2c9, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!MiDereferenceControlAreaPfn+5d
    fffff800`0306f2c9 f00fba69481f    lock bts dword ptr [rcx+48h],1Fh
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032be0e0
     ffffffffffffffff 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff880087e8738 -- (.exr 0xfffff880087e8738)
    ExceptionAddress: fffff8000306f2c9 (nt!MiDereferenceControlAreaPfn+0x000000000000005d)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff880087e87e0 -- (.trap 0xfffff880087e87e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=db7edf86bbec27b7
    rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000306f2c9 rsp=fffff880087e8970 rbp=0000000000000000
     r8=0000000000000001  r9=0000000000000101 r10=0000000000000002
    r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    nt!MiDereferenceControlAreaPfn+0x5d:
    fffff800`0306f2c9 f00fba69481f    lock bts dword ptr [rcx+48h],1Fh ds:db7edf86`bbec27ff=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030c0a39 to fffff80003086740
    
    STACK_TEXT:  
    fffff880`087e7f68 fffff800`030c0a39 : 00000000`0000001e ffffffff`c0000005 fffff800`0306f2c9 00000000`00000000 : nt!KeBugCheckEx
    fffff880`087e7f70 fffff800`03085d82 : fffff880`087e8738 db7edf86`bbec27b7 fffff880`087e87e0 00000000`00000001 : nt!KiDispatchException+0x1b9
    fffff880`087e8600 fffff800`0308468a : 00000000`00000002 00000000`00000001 fffffa80`00e508c0 00000000`00000080 : nt!KiExceptionDispatch+0xc2
    fffff880`087e87e0 fffff800`0306f2c9 : 00000000`0000004c 00000000`0000007f fffffa80`00e4bb20 00000000`0004c3e6 : nt!KiGeneralProtectionFault+0x10a
    fffff880`087e8970 fffff800`03049cd8 : 00000000`00000002 00000000`00000000 fffffa80`00e52780 00000000`00000080 : nt!MiDereferenceControlAreaPfn+0x5d
    fffff880`087e89e0 fffff800`0314729d : fffffa80`00e52780 fffff880`087e8b40 00000000`00000080 00000000`00059759 : nt!MiRestoreTransitionPte+0xcc
    fffff880`087e8a40 fffff800`030333a4 : fffff680`000260d0 fffff880`087e8b40 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
    fffff880`087e8ac0 fffff800`0308482e : 00000000`00000001 00000000`00000032 00000000`00000001 00000000`04709a2c : nt! ?? ::FNODOBFM::`string'+0x43485
    fffff880`087e8c20 00000000`6cc73a75 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`001cea80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6cc73a75
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiDereferenceControlAreaPfn+5d
    fffff800`0306f2c9 f00fba69481f    lock bts dword ptr [rcx+48h],1Fh
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!MiDereferenceControlAreaPfn+5d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!MiDereferenceControlAreaPfn+5d
    
    BUCKET_ID:  X64_0x1E_c0000005_nt!MiDereferenceControlAreaPfn+5d
    
    Followup: MachineOwner
    ---------
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`042e8000 fffff880`04326000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`070c6000 fffff880`07106000   afcdp    afcdp.sys    Wed Oct 28 10:04:53 2009 (4AE84F85)
    fffff880`01600000 fffff880`0168a000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04392000 fffff880`043a8000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01352000 fffff880`0135d000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`028f9000 fffff880`0298b000   athrxusb athrxusb.sys Mon Jan 29 07:57:10 2007 (45BDEF26)
    fffff880`04ed7000 fffff880`054ed000   atikmdag atikmdag.sys Sun Jun 14 22:41:39 2009 (4A35B4E3)
    fffff960`00970000 fffff960`009d1000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
    fffff880`04265000 fffff880`042ac000   avgldx64 avgldx64.sys Thu Jun 03 17:06:48 2010 (4C081968)
    fffff880`017f5000 fffff880`017fc080   avgmfx64 avgmfx64.sys Sun Apr 25 17:06:15 2010 (4BD4AEC7)
    fffff880`0171e000 fffff880`0176f000   avgtdia  avgtdia.sys  Thu Jun 03 17:09:57 2010 (4C081A25)
    fffff880`04326000 fffff880`0436b000   avs76634 avs76634.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
    fffff880`04033000 fffff880`0403a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`015eb000 fffff880`015fc000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`06d72000 fffff880`06d90000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`04000000 fffff880`0402a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00e7f000 fffff880`00f3f000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`05742000 fffff880`05754000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`01a50000 fffff880`01a80000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cf4000 fffff880`00d52000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01690000 fffff880`01703000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`0436b000 fffff880`0437b000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`031d8000 fffff880`031e6000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01429000 fffff880`01447000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0141a000 fffff880`01429000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01a3a000 fffff880`01a50000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05699000 fffff880`056bb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`031e6000 fffff880`031f9000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`040a3000 fffff880`041bf000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:53:40 2009 (4A287AA4)
    fffff880`031cc000 fffff880`031d8000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`054ed000 fffff880`055e1000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04e00000 fffff880`04e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`02844000 fffff880`0287a000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`013a9000 fffff880`013bd000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0135d000 fffff880`013a9000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01714000 fffff880`0171e000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01a00000 fffff880`01a3a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`019b2000 fffff880`019fc000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`055f2000 fffff880`055ff000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`035f2000 fffff800`0363b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`013c9000 fffff880`013d4000   hamachi  hamachi.sys  Thu Feb 19 05:36:41 2009 (499D3639)
    fffff880`04e46000 fffff880`04e6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05600000 fffff880`0565c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`056dc000 fffff880`056f5000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`029dd000 fffff880`029ee000   hidir    hidir.sys    Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`056f5000 fffff880`056fd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`056ce000 fffff880`056dc000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`06caa000 fffff880`06d72000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01c7a000 fffff880`01c83000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`01219000 fffff880`01335000   iaStor   iaStor.sys   Thu Jun 04 21:53:40 2009 (4A287AA4)
    fffff880`042d2000 fffff880`042e8000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`01335000 fffff880`01352000   jraid    jraid.sys    Wed May 27 01:39:35 2009 (4A1CD217)
    fffff880`01200000 fffff880`0120f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`057d5000 fffff880`057e3000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bc3000 fffff800`00bcd000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`056ff000 fffff880`05742000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01400000 fffff880`0141a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01860000 fffff880`0188b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`056bb000 fffff880`056c0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0287a000 fffff880`0288f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`02800000 fffff880`02823000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`029aa000 fffff880`029b4900   LVUSBS64 LVUSBS64.sys Fri May 11 20:01:20 2007 (464503D0)
    fffff880`00c9c000 fffff880`00ce0000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`04383000 fffff880`04392000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
    fffff880`057e3000 fffff880`057f1000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`00e4d000 fffff880`00e5c000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`029d0000 fffff880`029dd000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e33000 fffff880`00e4d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`06d90000 fffff880`06da8000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`06da8000 fffff880`06dd5000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`06c00000 fffff880`06c4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`06c4e000 fffff880`06c71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`04098000 fffff880`040a3000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`00c00000 fffff880`00c5e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`01a8e000 fffff880`01a99000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01bd1000 fffff880`01be3000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`018c0000 fffff880`019b2000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`043cc000 fffff880`043d8000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`028e2000 fffff880`028f5000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`04200000 fffff880`0422f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`057c0000 fffff880`057d5000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`01be3000 fffff880`01bf2000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`0176f000 fffff880`017b4000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01800000 fffff880`01860000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`041d7000 fffff880`041e8000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01bf2000 fffff880`01bfe000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03016000 fffff800`035f2000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01448000 fffff880`015eb000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0402a000 fffff880`04033000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0288f000 fffff880`028e2000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`017b4000 fffff880`017da000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`0109d000 fffff880`010b2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01703000 fffff880`01714000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`07106000 fffff880`071ac000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0565c000 fffff880`05699000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00ce0000 fffff880`00cf4000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`013bd000 fffff880`013c8e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
    fffff880`043a8000 fffff880`043cc000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0422f000 fffff880`0424a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`043d8000 fffff880`043f9000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0424a000 fffff880`04264000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`00dae000 fffff880`00dff000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0407d000 fffff880`04086000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04086000 fffff880`0408f000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0408f000 fffff880`04098000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01c40000 fffff880`01c7a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`013ee000 fffff880`013f5c00   RimSerial_AMD64 RimSerial_AMD64.sys Mon Nov 24 12:01:01 2008 (492ADDCD)
    fffff880`0437b000 fffff880`04383000   RootMdm  RootMdm.sys  Mon Jul 13 20:10:47 2009 (4A5BCD07)
    fffff880`041bf000 fffff880`041d7000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0301f000 fffff880`031cb900   RTKVHD64 RTKVHD64.sys Fri May 22 14:04:20 2009 (4A16E924)
    fffff880`00c5e000 fffff880`00c98000   RtsUStor RtsUStor.sys Thu Jun 04 04:46:49 2009 (4A2789F9)
    fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`071ac000 fffff880`071b7000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`01c00000 fffff880`01c40000   snapman  snapman.sys  Mon Oct 19 06:29:56 2009 (4ADC3FA4)
    fffff880`01df4000 fffff880`01dfc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`010b3000 fffff880`011d9000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
    fffff880`08e6c000 fffff880`08f02000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`07000000 fffff880`07067000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`071b7000 fffff880`071e4000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`043f9000 fffff880`043fa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`013e1000 fffff880`013ee000   tap0901  tap0901.sys  Wed Nov 19 13:22:35 2008 (4924596B)
    fffff880`013d4000 fffff880`013e1000   tapoas   tapoas.sys   Wed Jun 09 23:18:19 2010 (4C10597B)
    fffff880`04801000 fffff880`049fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`071e4000 fffff880`071f6000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`041e8000 fffff880`041f5000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`01c88000 fffff880`01df4000   tdrpm258 tdrpm258.sys Tue Oct 20 03:39:53 2009 (4ADD6949)
    fffff880`0188b000 fffff880`018a9000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`018a9000 fffff880`018bd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`01a9c000 fffff880`01b85000   timntr   timntr.sys   Tue Sep 29 09:36:57 2009 (4AC20D79)
    fffff960`00440000 fffff960`0044a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`042ac000 fffff880`042d2000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`05754000 fffff880`05766000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`029b5000 fffff880`029cfc00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`03000000 fffff880`0301d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0298b000 fffff880`029aa000   usbcir   usbcir.sys   Mon Jul 13 20:06:36 2009 (4A5BCC0C)
    fffff880`0301d000 fffff880`0301ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`055e1000 fffff880`055f2000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`05766000 fffff880`057c0000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`04e77000 fffff880`04ecd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`04e6a000 fffff880`04e77000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0403a000 fffff880`04048000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`04048000 fffff880`0406d000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`011e2000 fffff880`011f7000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d52000 fffff880`00dae000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01b85000 fffff880`01bd1000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`017da000 fffff880`017f5000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`0406d000 fffff880`0407d000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00f3f000 fffff880`00fe3000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00fe3000 fffff880`00ff2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`041f5000 fffff880`041fe000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000f0000 fffff960`00400000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`04ecd000 fffff880`04ed6000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`011d9000 fffff880`011e2000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02823000 fffff880`02844000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`08f02000 fffff880`08f33000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`08f33000 fffff880`08fa4000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`01a80000 fffff880`01a8e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`040a8000 fffff880`041c4000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0011C000
    fffff880`041c4000 fffff880`041d7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`056cc000 fffff880`056ce000   USBD.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00002000
    fffff880`056c1000 fffff880`056cc000   LVUSBS64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    fffff880`057e0000 fffff880`057e2000   USBD.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00002000
    fffff880`057d5000 fffff880`057e0000   LVUSBS64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    
    
     
  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Uninstall AVG and Daemon Tools to reduce the frequency of blue screens right away. : )
     
  4. silentn92

    silentn92 New Member

    Joined:
    Jan 17, 2011
    Messages:
    4
    Likes Received:
    0
    So apparently it was the wireless adapter, and it hasn't crashed in over 4 hours. Thank you! =)
     
  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Yes it was. However, take the time and effort to update all other obsolete drivers that are not quite compatible with Windows 7. If you don't do so, sooner or later it'll blue screen again. : )
     

Share This Page

Loading...