Thanks, TorrentG for the advice. I'll make those changes when I reinstall my OS. In the meantime, I'm still open to exploring other reasons for my crashes.
Why would you want to uninstall Symantec? One of your recent crashes was caused by it, right when you were playing MassEffect, take a look:
120110-39702-01.dmp MEMORY_MANAGEMENT (1a)
PROCESS_NAME: MassEffect2.exe
MODULE_NAME: SYMEVENT
FAILURE_BUCKET_ID: 0x1a_41284_SYMEVENT+14479
In a case of a BSOD, Symantec is recommended to uninstall even if it's not the direct causer of the crash. It's quite notorious.
So:
Link Removed due to 404 Error For now, replace it with MSE:
Link Removed due to 404 Error 120210-37565-01.dmp PAGE_FAULT_IN_NONPAGED_AREA (50)
By: dxgmms1.sys 0x50_dxgmms1!VIDMM_DEVICE::RemoveCommitment+21
That's a directx file, and that's why in your case you should update your Logitech Setpoint:
LMouFilt.Sys Wed Jun 17 12:49:08 2009
LUsbFilt.Sys Wed Jun 17 12:49:11 2009
Also check for updates:
sbmount.SYS Thu Sep 10 19:20:42 2009
ShadowProtect StorageCraft Technology Corporation
jraid.sys Fri Jul 17 11:31:37 2009
JMicron JMB36X RAID Driver
113010-44678-01.dmp BugCheck 124, {0, 88439024, 0, 0}
Probably caused by : hardware 0x124_GenuineIntel_PROCESSOR_BUS_PRV
As it says it's hardware. Update your drivers and if the same 0x124 pops up, then read this summary:
Stop 0x124 - what it means and what to try - Windows 7 Forums Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\113010-44678-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c17000 PsLoadedModuleList = 0x82d5f810
Debug session time: Tue Nov 30 21:17:46.470 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:09.921
Loading Kernel Symbols
......................................................
Loading User Symbols
Mini Kernel Dump does not contain unloaded driver list
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, 88439024, 0, 0}
Probably caused by : hardware
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 00000000, Machine Check Exception
Arg2: 88439024, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000, High order 32-bits of the MCi_STATUS value.
Arg4: 00000000, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
8e322cc4 82ce5fc5 88439008 82d7ec28 82d7ec20 nt!WheapCreateTriageDumpFromPreviousSession+0x32
8e322ce4 82ce6def 82d7ec20 88439008 82d7ec50 nt!WheapProcessWorkQueueItem+0x56
8e322d00 82c84f3b 82d7ec20 00000000 859d5a70 nt!WheapWorkQueueWorkerRoutine+0x1f
8e322d50 82e256d3 00000001 bfb220dc 00000000 nt!ExpWorkerThread+0x10d
8e322d90 82cd70f9 82c84e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x124_GenuineIntel_PROCESSOR_BUS_PRV
BUCKET_ID: 0x124_GenuineIntel_PROCESSOR_BUS_PRV
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120110-39702-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c1e000 PsLoadedModuleList = 0x82d66810
Debug session time: Wed Dec 1 23:39:49.802 2010 (UTC - 5:00)
System Uptime: 0 days 1:38:59.128
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
............
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041284, A PTE or the working set list is corrupt.
Arg2: 2db5b001
Arg3: 000294d9
Arg4: c0802000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MassEffect2.ex
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82c94826 to 82cfad10
STACK_TEXT:
b170daa4 82c94826 0000001a 00041284 2db5b001 nt!KeBugCheckEx+0x1e
b170dacc 82c94a78 c0cb7d6c c016dad8 84516fac nt!MiLocateWsle+0xc1
b170daec 82cd7947 2db5b000 8a95a788 000294d9 nt!MiTerminateWsle+0x1f
b170dbf0 82cd1e41 2db10000 2dbbafff 80abea33 nt!MiDeleteVirtualAddresses+0x234
b170dc88 9116e479 ffffffff 0519fdfc 0519fdf8 nt!NtFreeVirtualMemory+0x60b
WARNING: Stack unwind information not available. Following frames may be wrong.
b170dd1c 82c6144a ffffffff 0519fdfc 0519fdf8 SYMEVENT+0x14479
b170dd1c 0000003b ffffffff 0519fdfc 0519fdf8 nt!KiFastCallEntry+0x12a
b170dd8c 00000000 0519fd30 00000000 774864f4 0x3b
STACK_COMMAND: kb
FOLLOWUP_IP:
SYMEVENT+14479
9116e479 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: SYMEVENT+14479
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SYMEVENT
IMAGE_NAME: SYMEVENT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a428942
FAILURE_BUCKET_ID: 0x1a_41284_SYMEVENT+14479
BUCKET_ID: 0x1a_41284_SYMEVENT+14479
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120210-37565-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c11000 PsLoadedModuleList = 0x82d59810
Debug session time: Thu Dec 2 00:28:48.043 2010 (UTC - 5:00)
System Uptime: 0 days 0:47:14.495
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
......
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: b2966044, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9917eeb7, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\drivers\dxgkrnl.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 82d79718
Unable to read MiSystemVaType memory at 82d59160
b2966044
FAULTING_IP:
dxgmms1!VIDMM_DEVICE::RemoveCommitment+21
9917eeb7 037314 add esi,dword ptr [ebx+14h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: 8ffe408c -- (.trap 0xffffffff8ffe408c)
ErrCode = 00000000
eax=88ee6068 ebx=b2966030 ecx=890ebf30 edx=00000003 esi=00000000 edi=ac3fd898
eip=9917eeb7 esp=8ffe4100 ebp=8ffe4110 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
dxgmms1!VIDMM_DEVICE::RemoveCommitment+0x21:
9917eeb7 037314 add esi,dword ptr [ebx+14h] ds:0023:b2966044=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82c57638 to 82c96903
STACK_TEXT:
8ffe4074 82c57638 00000000 b2966044 00000000 nt!MmAccessFault+0x106
8ffe4074 9917eeb7 00000000 b2966044 00000000 nt!KiTrap0E+0xdc
8ffe4110 9917361e 88ee6068 becf93a0 890ebf30 dxgmms1!VIDMM_DEVICE::RemoveCommitment+0x21
8ffe4128 99185465 88ee6068 00000000 00000000 dxgmms1!VIDMM_GLOBAL::NotifyAllocationEviction+0x1e
8ffe4174 99186d8e 0000000c 00000000 a7057730 dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x201
8ffe418c 9917885c 00000005 00000000 8a8512d8 dxgmms1!VIDMM_SEGMENT::MarkCandidateForEviction+0x66
8ffe41b4 9917a200 a7057730 890a9420 8ffe4310 dxgmms1!VIDMM_GLOBAL::AllocateResourceForPinnedAllocation+0x44
8ffe421c 9917aeaa 8ffe435c 8ffe42ec 8ffe4318 dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x142
8ffe4234 9919036f 8ffe4310 890a9420 890a9420 dxgmms1!VidMmiProcessSystemCommand+0x20
8ffe4250 99191249 8909bbb0 8909b008 8ffe4290 dxgmms1!VidSchiSubmitSystemCommand+0x33
8ffe4260 9916c6dc 890a9420 890a9420 8909b978 dxgmms1!VidSchiSubmitQueueCommand+0x7b
8ffe4290 9919141c 890b0000 8ffe42b4 8909b978 dxgmms1!VidSchiSubmitQueueCommandDirect+0x1ae
8ffe42b8 9918c775 010a9420 890e6000 ac384918 dxgmms1!VidSchiSubmitCommandPacketToQueue+0x180
8ffe42d0 9917af11 8909b008 9917ae8a 8ffe4310 dxgmms1!VidSchSubmitSystemCommand+0xab
8ffe42fc 9917af86 8ffe4310 a7057730 8a8512d8 dxgmms1!VIDMM_GLOBAL::QueueSystemCommandAndWait+0x41
8ffe4334 9917c22e 8ffe435c a8841460 a8841448 dxgmms1!VIDMM_GLOBAL::QueueDeferredCommandAndWait+0x3c
8ffe4384 9917ce99 8dee5968 00057730 ac384918 dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0x240
8ffe43b0 991602db 8dee5968 00000000 00000000 dxgmms1!VIDMM_GLOBAL::OpenAllocation+0x9f
8ffe43d0 990aaf80 890e6000 8dee5968 b1848108 dxgmms1!VidMmOpenAllocation+0x1f
WARNING: Stack unwind information not available. Following frames may be wrong.
8ffe43f4 990cf66a 8844c418 890e6000 8dee5968 dxgkrnl+0x2f80
8ffe4440 990ce52a 8ffe4848 8ffe45f0 8ffe4470 dxgkrnl+0x2766a
8ffe47dc 990d2377 8ffe4848 00000000 00000000 dxgkrnl+0x2652a
8ffe489c 9910bd37 00000000 00000000 ffb88010 dxgkrnl+0x2a377
8ffe4a78 9d762611 40000000 00000001 8ffe4d28 dxgkrnl+0x63d37
8ffe4ac0 9d765151 ffb88010 8ffe4cd0 8ffe4d28 cdd!CreateAndEnableDevice+0x171
8ffe4d50 82e1f6d3 ffb88010 be3b0d2b 00000000 cdd!PresentWorkerThread+0x81d
8ffe4d90 82cd10f9 9d764934 ffb88010 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_DEVICE::RemoveCommitment+21
9917eeb7 037314 add esi,dword ptr [ebx+14h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgmms1!VIDMM_DEVICE::RemoveCommitment+21
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc265
FAILURE_BUCKET_ID: 0x50_dxgmms1!VIDMM_DEVICE::RemoveCommitment+21
BUCKET_ID: 0x50_dxgmms1!VIDMM_DEVICE::RemoveCommlmtn
start end module name
991d1000 991fd000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8bc87000 8bccf000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
9bd07000 9bd69000 ADIHdAud ADIHdAud.sys Thu May 21 04:22:07 2009 (4A150F2F)
9842d000 98487000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
97a00000 97a12000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8c16f000 8c178000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
991fd000 991fe6c0 ASACPI ASACPI.sys Wed Jul 15 23:28:28 2009 (4A5E9E5C)
97b2b000 97b2bfa0 AsIO AsIO.sys Mon Aug 03 03:02:32 2009 (4A768B88)
a7bf4000 a7bfd000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
8c103000 8c10c000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8c10c000 8c12f000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
9bca2000 9bcbf000 AtihdW73 AtihdW73.sys Mon Aug 16 06:40:10 2010 (4C69158A)
98a2d000 990a8000 atikmdag atikmdag.sys Tue Sep 28 21:37:54 2010 (4CA29872)
97b5f000 97b9c000 atikmpag atikmpag.sys Tue Sep 28 21:14:29 2010 (4CA292F5)
9d7a0000 9d7ed000 ATMFD ATMFD.DLL Wed May 26 23:49:36 2010 (4BFDEBD0)
9bd82000 9bd85000 BdaSup BdaSup.SYS Mon Jul 13 19:51:23 2009 (4A5BC87B)
91fd0000 91fd7000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
97b1d000 97b2b000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
832b7000 832bf000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9c813000 9c82c000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
9d760000 9d77e000 cdd cdd.dll Mon Jul 13 21:04:18 2009 (4A5BD992)
911d2000 911f1000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
83301000 833ac000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8c56d000 8c592000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
832bf000 83301000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8c3a3000 8c400000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
97bec000 97bf9000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
9c9a0000 9c9ad000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
97aa1000 97b05000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
97b05000 97b1d000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
97a95000 97aa1000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8c55c000 8c56d000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
9bcee000 9bd07000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
9cbe1000 9cbf2000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
9ca2c000 9cbe1000 dump_iaStor dump_iaStor.sys Wed Mar 03 21:30:51 2010 (4B8F1B5B)
9cbf2000 9cbfc000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
990a8000 9915f000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
9915f000 99198000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
97a1a000 97a78000 eeCtrl eeCtrl.sys Fri May 21 17:44:53 2010 (4BF6FED5)
97a78000 97a95000 EraserUtilRebootDrv EraserUtilRebootDrv.sys Fri May 21 17:44:53 2010 (4BF6FED5)
8c1ac000 8c1bd000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8c178000 8c1ac000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8c20e000 8c217000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8c52a000 8c55c000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8c788000 8c7b9000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
83021000 83058000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
a76a1000 a76ab000 hcmon hcmon.sys Tue Sep 21 03:55:58 2010 (4C98650E)
9bd85000 9bd8c100 hcw72ADFilter hcw72ADFilter.sys Fri Apr 23 11:47:38 2010 (4BD1C11A)
9100b000 91134580 hcw72ATV hcw72ATV.sys Fri Apr 23 11:48:40 2010 (4BD1C158)
9c830000 9c959e80 hcw72DTV hcw72DTV.sys Fri Apr 23 11:52:35 2010 (4BD1C243)
99198000 991b7000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
9c96b000 9c97e000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
9c97e000 9c984480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
9c960000 9c96b000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
91135000 911ba000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
8c7f7000 8c7ff000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
98a00000 98a18000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8be29000 8bfde000 iaStor iaStor.sys Wed Mar 03 21:30:51 2010 (4B8F1B5B)
8c028000 8c103000 iaStorV iaStorV.sys Wed Apr 08 12:54:58 2009 (49DCD6E2)
97b4d000 97b5f000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8c12f000 8c149000 jraid jraid.sys Fri Jul 17 11:31:37 2009 (4A609959)
98a1c000 98a29000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80b9c000 80ba4000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
9bc05000 9bc39000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0)
8c390000 8c3a3000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8c4f5000 8c51a000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
98a18000 98a1b500 L8042Kbd L8042Kbd.sys Wed Jun 17 12:50:16 2009 (4A391EC8)
9c985000 9c98c080 LHidFilt LHidFilt.Sys Wed Jun 17 12:49:04 2009 (4A391E80)
9c9d5000 9c9e5000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
9c998000 9c99f800 LMouFilt LMouFilt.Sys Wed Jun 17 12:49:08 2009 (4A391E84)
9ca0b000 9ca26000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
9c95a000 9c95f580 LUsbFilt LUsbFilt.Sys Wed Jun 17 12:49:11 2009 (4A391E87)
8322e000 832a6000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
9ca00000 9ca0b000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8c1f1000 8c1fe000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
9c98d000 9c998000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8bd96000 8bdac000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
83200000 83223000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
a7633000 a766e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
a766e000 a7689000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
91ff3000 91ffe000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8bcd8000 8bce0000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
a7b83000 a7b84580 MSPQM MSPQM.sys Mon Jul 13 19:45:07 2009 (4A5BC703)
8c365000 8c390000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
98400000 9840a000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8c51a000 8c52a000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
97bf9000 97c00000 mv2 mv2.sys Wed Feb 06 16:02:34 2008 (47AA206A)
91fab000 91fbe600 NAVENG NAVENG.SYS Wed Sep 15 06:21:19 2010 (4C909E1F)
91e38000 91f85200 NAVEX15 NAVEX15.SYS Wed Sep 15 06:29:29 2010 (4C90A009)
8c400000 8c4b7000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
98422000 9842d000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
9c9e5000 9c9f5000 ndisuio ndisuio.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
8c000000 8c022000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
9bc91000 9bca2000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
984e8000 984f6000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
98487000 984b9000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
8c4b7000 8c4f5000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
911f1000 911ff000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
985f6000 98600000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82c11000 83021000 nt ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
8c236000 8c365000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
91fc9000 91fd0000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
9bda1000 9bde7000 nwifi nwifi.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
984c9000 984e8000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
8bd15000 8bd26000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8bce0000 8bd0a000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8bd81000 8bd88000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8bd88000 8bd96000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8c200000 8c20e000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
a7a0b000 a7aa2000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
9bcbf000 9bcee000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
832a6000 832b7000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8c1bd000 8c1c60c0 PxHelp20 PxHelp20.sys Mon Dec 10 18:48:39 2007 (475DD057)
9840a000 98422000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
984f6000 9850e000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8bfde000 8bff5000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8be00000 8be17000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
985b5000 985f6000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8c225000 8c22f000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
91e2e000 91e36000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
91fe3000 91feb000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
91feb000 91ff3000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8c7ca000 8c7f7000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
9c800000 9c813000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
9859d000 985b4180 sbmount sbmount.SYS Thu Sep 10 19:20:42 2009 (4AA989CA)
8c149000 8c16f000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
a7aa2000 a7aac000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
98533000 9859d000 SPBBCDrv SPBBCDrv.sys Sat Aug 08 21:37:14 2009 (4A7E284A)
8c7c2000 8c7ca000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
8c59f000 8c5e9000 SRTSP SRTSP.SYS Mon Aug 10 23:20:28 2009 (4A80E37C)
91fbf000 91fc8080 SRTSPX SRTSPX.SYS Mon Aug 10 23:20:44 2009 (4A80E38C)
a7b32000 a7b83000 srv srv.sys Mon Jun 21 22:47:32 2010 (4C202444)
a7ae3000 a7b32000 srv2 srv2.sys Mon Jun 21 22:47:19 2010 (4C202437)
a7aac000 a7acd000 srvnet srvnet.sys Mon Jun 21 22:47:09 2010 (4C20242D)
8c1c7000 8c1f0480 stcvsm stcvsm.sys Thu Sep 10 19:19:35 2009 (4AA98987)
98a29000 98a2a380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
91f86000 91fab000 SYMEVENT SYMEVENT.SYS Wed Jun 24 16:14:58 2009 (4A428942)
a7b85000 a7b89d00 SYMREDRV SYMREDRV.SYS Wed Jun 17 17:11:33 2009 (4A395C05)
8bdac000 8bdd8480 SYMTDI SYMTDI.SYS Wed Jun 17 17:11:02 2009 (4A395BE6)
8c63f000 8c788000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
a7acd000 a7ada000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
91000000 9100b000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8c5e9000 8c600000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8bdd9000 8bdf7000 teefer2 teefer2.sys Wed May 13 15:25:46 2009 (4A0B1EBA)
98523000 98533000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
9d730000 9d739000 TSDDD TSDDD.dll unavailable (00000000)
97b2c000 97b4d000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
9bc39000 9bc47000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
9bd8d000 9bda0b00 usbaudio usbaudio.sys Mon Jul 13 19:51:23 2009 (4A5BC87B)
9bd69000 9bd80000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
9bd80000 9bd81700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
991c2000 991d1000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
9bc4d000 9bc91000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
97b9c000 97be7000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
991b7000 991c2000 usbuhci usbuhci.sys Mon Jul 13 19:51:10 2009 (4A5BC86E)
8bd0a000 8bd15000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
91fd7000 91fe3000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
91e00000 91e21000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
a76ab000 a76baa00 vmci vmci.sys Tue Sep 21 03:23:00 2010 (4C985D54)
97be7000 97beb600 VMkbd VMkbd.sys Tue Sep 21 04:46:16 2010 (4C9870D8)
9bc4a000 9bc4cf00 VMNET VMNET.SYS Mon Aug 10 08:03:57 2009 (4A800CAD)
9bc47000 9bc49680 vmnetadapter vmnetadapter.sys Mon Aug 10 08:04:00 2009 (4A800CB0)
9c9c7000 9c9d5000 vmnetbridge vmnetbridge.sys Mon Aug 10 08:05:29 2009 (4A800D09)
a7ada000 a7adec80 vmnetuserif vmnetuserif.sys Tue Sep 21 04:09:44 2010 (4C986848)
8c7b9000 8c7c1380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
a76bb000 a7789e00 vmx86 vmx86.sys Tue Sep 21 05:33:16 2010 (4C987BDC)
8bd26000 8bd36000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8bd36000 8bd81000 volmgrx volmgrx.sys unavailable (00000000)
8c600000 8c63f000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
a7adf000 a7ae2d80 vstor2_ws60 vstor2-ws60.sys Thu Aug 19 16:28:38 2010 (4C6D93F6)
98510000 98523000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
91e21000 91e2e000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8bc08000 8bc79000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8bc79000 8bc87000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
984c2000 984c9000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
9d4d0000 9d71b000 win32k win32k.sys Tue Aug 31 22:34:29 2010 (4C7DBBB5)
8bccf000 8bcd8000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8c217000 8c225000 wpsdrvnt wpsdrvnt.sys Thu Sep 17 20:35:48 2009 (4AB2D5E4)
a778a000 a77b1a80 WpsHelper WpsHelper.sys Thu Sep 02 21:14:42 2010 (4C804C02)
984b9000 984c2000 ws2ifsl ws2ifsl.sys Mon Jul 13 19:55:01 2009 (4A5BC955)
9c9ad000 9c9c7000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
833ac000 833fb000 yk62x86 yk62x86.sys Wed Sep 15 10:07:11 2010 (4C90D30F)
Unloaded modules:
a7b8a000 a7bf4000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0006A000
a7689000 a76a1000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
8c592000 8c59f000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
9100c000 911c1000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 001B5000
911c1000 911d2000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
984f6000 98510000 serial.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001A000