Windows 7 Blue Screen of Death, BRAND NEW COMPUTER. Please help!

iWal

New Member
Joined
Apr 17, 2011
I bought a HP computer with Windows 7 installed, It worked perfectly for about 25 minutes, and then blam, BSOD. After some frustration, I returned it, and got a new one. Same... exact... problem. I don't know WHY it's doing this, at first I thought it was because I tried to install a game(which I have installed on previous computers, no problem), but then I was just browsing the internet, and it came up again. In need of help ASAP! Thanks in advance!

***Stop 0x0000024 (0x00000000001904FB, 0xFFFFF880059C5338, 0xFFFFF990059C4BA0, 0xFFFFF800028AC1D6)
 

Attachments

  • 041611-27268-01.dmp
    294.5 KB · Views: 270
  • 041611-17706-01.dmp
    294.3 KB · Views: 357
Last edited:

041611-17706-01.dmp
BugCheck 24, {1904fb, fffff880059c5338, fffff880059c4ba0, fffff800028ac1d6}
Probably caused by : Ntfs.sys ( Ntfs!NtfsExtendedCompleteRequestInternal+114 )

041611-27268-01.dmp
BugCheck 1000007E, {ffffffffc0000005, fffff880015769eb, fffff88002fd1618, fffff88002fd0e80}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )


Update Atheros Wireless USB Network Adapter
athrxusb.sys Mon Jan 29 07:57:10 2007
partner.atheros.com/Drivers.aspx


If crashes persist, proceed as follows:

1. Attach screenshots of CPUZ CPU and memory tabs
2. Passmark Rammon HTML report
3. In the command prompt type chkdsk /f

4. If memory is set right and no hdd errors, uninstall Symantec and replace it with MSE:

Link Removed due to 404 Error

Link Removed due to 404 Error




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-17706-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02866000 PsLoadedModuleList = 0xfffff800`02aa3e50
Debug session time: Sun Apr 17 02:43:00.404 2011 (UTC - 4:00)
System Uptime: 0 days 1:14:06.027
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880059c5338, fffff880059c4ba0, fffff800028ac1d6}

Probably caused by : Ntfs.sys ( Ntfs!NtfsExtendedCompleteRequestInternal+114 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880059c5338
Arg3: fffff880059c4ba0
Arg4: fffff800028ac1d6

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880059c5338 -- (.exr 0xfffff880059c5338)
ExceptionAddress: fffff800028ac1d6 (nt!ExfReleasePushLock+0x00000000000004ab)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880059c4ba0 -- (.cxr 0xfffff880059c4ba0)
rax=485b5c2cb4cfb35f rbx=fffffa8003deee50 rcx=485b5c2cb4cfb350
rdx=fffffa80061f0950 rsi=fffffa80061f0950 rdi=0000000000000000
rip=fffff800028ac1d6 rsp=fffff880059c5570 rbp=fffffa8004602010
 r8=fffffa80061f09b0  r9=0000000000000000 r10=fffff80002a52c00
r11=0000000000000000 r12=fffffa8004602580 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ExfReleasePushLock+0x4ab:
fffff800`028ac1d6 488b5120        mov     rdx,qword ptr [rcx+20h] ds:002b:485b5c2c`b4cfb370=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  ccSvcHst.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0e0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsExtendedCompleteRequestInternal+114
fffff880`0145ecb4 488b5c2450      mov     rbx,qword ptr [rsp+50h]

FAULTING_IP: 
nt!ExfReleasePushLock+4ab
fffff800`028ac1d6 488b5120        mov     rdx,qword ptr [rcx+20h]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff88001158a99 to fffff800028ac1d6

STACK_TEXT:  
fffff880`059c5570 fffff880`01158a99 : ffffffff`ffffffff fffffa80`062ea830 00000000`00000000 00000000`00000000 : nt!ExfReleasePushLock+0x4ab
fffff880`059c55f0 fffff880`011622af : fffffa80`03deee50 fffffa80`061f0950 00000000`00000000 00000000`00000000 : fltmgr! ?? ::NNGAKEGL::`string'+0x9c3
fffff880`059c5630 fffff880`01159a30 : fffffa80`081a9890 fffffa80`04602010 00000000`00000000 fffffa80`07dc1f68 : fltmgr!FltpPurgeVolumeNameCache+0x7f
fffff880`059c5670 fffff880`01152d4b : fffffa80`04602010 00000000`00000000 fffffa80`0830b8e0 00000000`00000000 : fltmgr! ?? ::NNGAKEGL::`string'+0x1a04
fffff880`059c56b0 fffff880`0113506a : fffffa80`081e4620 fffffa80`045fbae0 fffff8a0`0828a670 fffff800`02a0b2dd : fltmgr!FltpReinstateNameCachingAllFrames+0x4b
fffff880`059c56e0 fffff800`028d8d26 : 00000000`00000000 fffff880`011340a2 fffffa80`081e46d0 00000000`00000000 : fltmgr!FltpPassThroughCompletion+0x8a
fffff880`059c5720 fffff880`0145ecb4 : fffffa80`07081ca0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`059c5800 fffff880`014e5eda : fffff8a0`0745bbc0 fffffa80`04603180 00000000`00000000 00000000`00000701 : Ntfs!NtfsExtendedCompleteRequestInternal+0x114
fffff880`059c5840 fffff880`01457ba0 : fffffa80`07081ca0 fffffa80`07dc1c10 fffff880`059c5901 fffff880`059c5900 : Ntfs!NtfsCommonSetInformation+0xef1
fffff880`059c5920 fffff880`0113223f : fffffa80`07dc1fb0 fffffa80`07dc1c10 fffffa80`07081ca0 fffff880`059c5948 : Ntfs!NtfsFsdSetInformation+0x11c
fffff880`059c59a0 fffff880`011306df : fffffa80`045fbae0 fffffa80`07dc1c10 fffffa80`045fba00 fffffa80`07dc1c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`059c5a30 fffff800`02bb962d : 00000000`000000f2 fffff880`059c5ca0 00000000`00000000 fffffa80`06f3c210 : fltmgr!FltpDispatch+0xcf
fffff880`059c5a90 fffff800`028d5993 : 00000000`00002484 fffffa80`07367860 00000000`028be6b8 fffff800`000000f2 : nt!NtSetInformationFile+0x909
fffff880`059c5bb0 00000000`7711ffca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028be698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7711ffca


SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  Ntfs!NtfsExtendedCompleteRequestInternal+114

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4bea1fc7

STACK_COMMAND:  .cxr 0xfffff880059c4ba0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsExtendedCompleteRequestInternal+114

BUCKET_ID:  X64_0x24_Ntfs!NtfsExtendedCompleteRequestInternal+114

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-27268-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aa5e50
Debug session time: Sun Apr 17 01:24:18.776 2011 (UTC - 4:00)
System Uptime: 0 days 0:28:17.493
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff880015769eb, fffff88002fd1618, fffff88002fd0e80}

Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880015769eb, The address that the exception occurred at
Arg3: fffff88002fd1618, Exception Record Address
Arg4: fffff88002fd0e80, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
NETIO!KfdClassify+76e
fffff880`015769eb 458b422c        mov     r8d,dword ptr [r10+2Ch]

EXCEPTION_RECORD:  fffff88002fd1618 -- (.exr 0xfffff88002fd1618)
ExceptionAddress: fffff880015769eb (NETIO!KfdClassify+0x000000000000076e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88002fd0e80 -- (.cxr 0xfffff88002fd0e80)
rax=fffff88002fd1970 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800608e030 rsi=fffff88002fd1c20 rdi=0000000000000000
rip=fffff880015769eb rsp=fffff88002fd1850 rbp=fffffa800450abf0
 r8=0000000000000000  r9=0000000000000000 r10=0f7b9424981a9cec
r11=fffffa800608e010 r12=fffffa800366e780 r13=0000000000000010
r14=ffffffffffffffff r15=fffff88002fd1c10
iopl=0         nv up ei pl nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010217
NETIO!KfdClassify+0x76e:
fffff880`015769eb 458b422c        mov     r8d,dword ptr [r10+2Ch] ds:002b:0f7b9424`981a9d18=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b100e0
 ffffffffffffffff 

FOLLOWUP_IP: 
NETIO!KfdClassify+76e
fffff880`015769eb 458b422c        mov     r8d,dword ptr [r10+2Ch]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff88001622cc3 to fffff880015769eb

STACK_TEXT:  
fffff880`02fd1850 fffff880`01622cc3 : fffffa80`0821f7c0 fffff880`02fd1c10 00000000`00000001 fffffa80`08381d30 : NETIO!KfdClassify+0x76e
fffff880`02fd1bc0 fffff880`016373f5 : fffffa80`0821f7c0 00000000`00000006 00000000`00000006 00000000`00000001 : tcpip!ProcessOutboundTransportLayerClassify+0x223
fffff880`02fd1d70 fffff880`01665ef6 : 00000000`00000000 fffff880`00000000 00000000`00006cec fffffa80`082152c4 : tcpip!WfpProcessOutTransportStackIndication+0x705
fffff880`02fd1f40 fffff880`0166b1ee : fffffa80`04551490 fffff880`01571807 fffff880`0176d9a0 fffffa80`0821f7c0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`02fd2210 fffff880`0165de2a : fffffa80`084dacf0 00000000`00000000 00000000`00000002 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`02fd2250 fffff880`01670059 : 00000000`000008fe 00000000`00000000 fffffa80`04525f02 00000000`00000000 : tcpip!TcpTcbHeaderSend+0x5ea
fffff880`02fd2400 fffff880`0167011c : fffffa80`0821f7c0 fffffa80`084dacf0 00000000`00000014 fffffa80`040c8500 : tcpip!TcpAcceptFin+0x89
fffff880`02fd2470 fffff880`01733081 : fffffa80`084dacf0 00000001`20000001 ffff0000`038b5522 fffff880`01678474 : tcpip!TcpAllowFin+0x5c
fffff880`02fd24a0 fffff880`016bcf8a : 00000000`f3401dd2 fffff880`02fd2760 00000000`f3401dd2 fffff880`01582eb9 : tcpip!TcpInspectFin+0x31
fffff880`02fd24d0 fffff880`01679334 : 00000000`00000006 fffffa80`08040002 fffffa80`082d6cec 00000000`000052c4 : tcpip! ?? ::FNODOBFM::`string'+0x3e345
fffff880`02fd2680 fffff880`0167d86a : fffffa80`04551490 00000000`00000007 fffffa80`04510158 fffffa80`0835d580 : tcpip!TcpTcbReceive+0x694
fffff880`02fd2830 fffff880`0167d4df : fffffa80`081f1fd0 fffffa80`082d3d00 fffffa80`0835d580 fffff880`01660700 : tcpip!TcpMatchReceive+0x1fa
fffff880`02fd2980 fffff880`0165f6c7 : fffffa80`082d51c4 fffffa80`04536cec fffffa80`045551c4 00000000`0000000e : tcpip!TcpPreValidatedReceive+0x29f
fffff880`02fd2a30 fffff880`0165f799 : fffff880`02fd2bb0 fffff880`0176d9a0 fffff880`02fd2bc0 fffffa80`036cc000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`02fd2af0 fffff880`0165fc90 : 00000000`00000000 fffffa80`08660080 00000000`00000000 fffff880`02fd2bb0 : tcpip!IppProcessDeliverList+0x59
fffff880`02fd2b60 fffff880`016367c2 : fffffa80`036db680 fffff880`03a1501e 00000000`00000000 fffff880`01771f90 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`02fd2c40 fffff800`02bd4c43 : fffffa80`044fec30 fffff800`02a7d5f8 fffffa80`036db680 fffffa80`0452bb80 : tcpip!IppLoopbackTransmit+0x72
fffff880`02fd2c80 fffff800`028e5961 : fffff800`02a7d500 fffff800`02bd4c20 fffffa80`036db680 fffff800`02a7d5f8 : nt!IopProcessWorkItem+0x23
fffff880`02fd2cb0 fffff800`02b7cc06 : 82220100`00053484 fffffa80`036db680 00000000`00000080 fffffa80`036c65f0 : nt!ExpWorkerThread+0x111
fffff880`02fd2d40 fffff800`028b6c26 : fffff880`009e9180 fffffa80`036db680 fffff880`009f3f40 18008005`018c4189 : nt!PspSystemThreadStartup+0x5a
fffff880`02fd2d80 00000000`00000000 : fffff880`02fd3000 fffff880`02fcd000 fffff880`02fd29f0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  NETIO!KfdClassify+76e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a

STACK_COMMAND:  .cxr 0xfffff88002fd0e80 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_NETIO!KfdClassify+76e

BUCKET_ID:  X64_0x7E_NETIO!KfdClassify+76e

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f2b000 fffff880`00f82000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a13000 fffff880`03a9d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`041c3000 fffff880`041d9000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`013df000 fffff880`013f4000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01071000 fffff880`0107c000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`072b3000 fffff880`07345000   athrxusb athrxusb.sys Mon Jan 29 07:57:10 2007 (45BDEF26)
fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Thu May 27 00:11:31 2010 (4BFDF0F3)
fffff880`0191e000 fffff880`01925000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`05ae4000 fffff880`05bcf000   BHDrvx64 BHDrvx64.sys Sat Aug 07 22:20:38 2010 (4C5E1476)
fffff880`03be4000 fffff880`03bf5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03587000 fffff880`035a5000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`05aba000 fffff880`05ad7000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`018eb000 fffff880`01915000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ca0000 fffff880`00d60000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01851000 fffff880`01881000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c42000 fffff880`00ca0000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0113a000 fffff880`011ad000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`041b3000 fffff880`041c3000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04b05000 fffff880`04b13000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03bc6000 fffff880`03be4000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03bb7000 fffff880`03bc6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183b000 fffff880`01851000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04add000 fffff880`04aff000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04b5c000 fffff880`04b6f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04b1d000 fffff880`04b5c000   dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`04b13000 fffff880`04b1d000   dump_storport dump_storport.sys Mon Jul 13 20:01:00 2009 (4A5BCABC)
fffff880`04b6f000 fffff880`04b7b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04079000 fffff880`0416d000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0416d000 fffff880`041b3000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`06400000 fffff880`06420000   ENG64    ENG64.SYS    Fri Mar 04 17:02:16 2011 (4D716168)
fffff880`06435000 fffff880`065f8000   EX64     EX64.SYS     Fri Mar 04 17:10:51 2011 (4D71636B)
fffff880`010c8000 fffff880`010dc000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0107c000 fffff880`010c8000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d5000 fffff880`013df000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01801000 fffff880`0183b000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0281f000 fffff800`02868000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03f57000 fffff880`03f7b000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04b97000 fffff880`04bb0000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04bb0000 fffff880`04bb8080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04b89000 fffff880`04b97000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`034bf000 fffff880`03587000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01464000 fffff880`0146d000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`05900000 fffff880`05976000   IDSVia64 IDSVia64.sys Thu May 27 04:07:18 2010 (4BFE2836)
fffff880`059c2000 fffff880`059ee000   Ironx64  Ironx64.SYS  Wed Jun 23 20:28:49 2010 (4C22A6C1)
fffff880`10bce000 fffff880`10bdd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0480d000 fffff880`0481b000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00baf000 fffff800`00bb9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0fe00000 fffff880`0fe43000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013aa000 fffff880`013c4000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015cf000 fffff880`015fa000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04aff000 fffff880`04b04200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04bbb000 fffff880`04bd0000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03ecb000 fffff880`03eee000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c21000 fffff880`00c2e000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04828000 fffff880`04836000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`10bdd000 fffff880`10bec000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0481b000 fffff880`04828000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e5c000 fffff880`00e76000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`035a5000 fffff880`035bd000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`035bd000 fffff880`035ea000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03400000 fffff880`0344e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0344e000 fffff880`03471000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01983000 fffff880`0198e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f8b000 fffff880`00f95000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010dc000 fffff880`0113a000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03bac000 fffff880`03bb7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01452000 fffff880`01464000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0147d000 fffff880`0156f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04000000 fffff880`0400c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`07398000 fffff880`073ab000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0400c000 fffff880`0403b000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe55000 fffff880`0fe6a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03b11000 fffff880`03b20000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03a9d000 fffff880`03ae2000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0156f000 fffff880`015cf000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0198e000 fffff880`0199f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03ba0000 fffff880`03bac000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02868000 fffff800`02e44000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01208000 fffff880`013aa000   Ntfs     Ntfs.sys     Tue May 11 23:25:59 2010 (4BEA1FC7)
fffff880`01915000 fffff880`0191e000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10bb2000 fffff880`10bb3180   nvBridge nvBridge.kmd Thu Apr 01 04:26:11 2010 (4BB458A3)
fffff880`0fe79000 fffff880`10bb1500   nvlddmkm nvlddmkm.sys Thu Apr 01 04:36:51 2010 (4BB45B23)
fffff880`03f7b000 fffff880`03fcea80   nvmf6264 nvmf6264.sys Thu Mar 04 20:04:39 2010 (4B9058A7)
fffff880`00d60000 fffff880`00d9f000   nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`07345000 fffff880`07398000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03aeb000 fffff880`03b11000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fd5000 fffff880`00fea000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f95000 fffff880`00fc8000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`013c4000 fffff880`013d5000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04e4d000 fffff880`04ef3000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04aa0000 fffff880`04add000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c2e000 fffff880`00c42000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`041d9000 fffff880`041fd000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0403b000 fffff880`04056000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04056000 fffff880`04077000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`10bb4000 fffff880`10bce000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03b4f000 fffff880`03ba0000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01968000 fffff880`01971000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01971000 fffff880`0197a000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0197a000 fffff880`01983000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`00d9f000 fffff880`00dd9000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01881000 fffff880`01899000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04843000 fffff880`04a9fd00   RTKVHD64 RTKVHD64.sys Tue Sep 07 07:17:23 2010 (4C861F43)
fffff880`04ef3000 fffff880`04efe000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0144a000 fffff880`01452000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05a00000 fffff880`05aba000   SRTSP64  SRTSP64.SYS  Tue Jul 27 18:18:25 2010 (4C4F5B31)
fffff880`059ac000 fffff880`059c2000   SRTSPX64 SRTSPX64.SYS Tue Jul 27 18:18:31 2010 (4C4F5B37)
fffff880`05236000 fffff880`052cc000   srv      srv.sys      Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`04f3d000 fffff880`04fa5000   srv2     srv2.sys     Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`04efe000 fffff880`04f2b000   srvnet   srvnet.sys   Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`0100f000 fffff880`01071000   storport storport.sys Wed May 12 00:14:15 2010 (4BEA2B17)
fffff880`04077000 fffff880`04078480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`052fd000 fffff880`0536e000   SYMDS64  SYMDS64.SYS  Mon May 17 21:12:48 2010 (4BF1E990)
fffff880`05832000 fffff880`05900000   SYMEFA64 SYMEFA64.SYS Thu Jul 22 22:19:55 2010 (4C48FC4B)
fffff880`05976000 fffff880`059ac000   SYMEVENT64x86 SYMEVENT64x86.SYS Fri Jul 30 19:05:59 2010 (4C535AD7)
fffff880`0536e000 fffff880`053d4000   SYMNETS  SYMNETS.SYS  Tue Jul 06 23:22:28 2010 (4C33F2F4)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`04f2b000 fffff880`04f3d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019bd000 fffff880`019ca000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0199f000 fffff880`019bd000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03b3b000 fffff880`03b4f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019ca000 fffff880`019f0000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0fe43000 fffff880`0fe55000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04bb9000 fffff880`04bbaf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03f46000 fffff880`03f57000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`03e00000 fffff880`03e5a000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03bf5000 fffff880`03c00000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03ef0000 fffff880`03f46000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04bd6000 fffff880`04bf1000   USBSTOR  USBSTOR.SYS  Wed May 12 00:21:12 2010 (4BEA2CB8)
fffff880`00fc8000 fffff880`00fd5000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01925000 fffff880`01933000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01933000 fffff880`01958000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fea000 fffff880`00fff000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011ad000 fffff880`011f9000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b20000 fffff880`03b3b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01958000 fffff880`01968000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e78000 fffff880`00f1c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f1c000 fffff880`00f2b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03ae2000 fffff880`03aeb000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`0032f000   win32k   win32k.sys   Sat Jun 19 00:31:59 2010 (4C1C483F)
fffff880`00f82000 fffff880`00f8b000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03fcf000 fffff880`03ff0000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`052cc000 fffff880`052fd000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`06400000 fffff880`06420000   ENG64.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00020000
fffff880`06427000 fffff880`065e5000   EX64.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  001BE000
fffff880`07200000 fffff880`07271000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`03e5a000 fffff880`03ecb000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`065d6000 fffff880`065f6000   ENG64.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00020000
fffff880`06418000 fffff880`065d6000   EX64.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  001BE000
fffff880`04b7b000 fffff880`04b89000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`04800000 fffff880`0480d000   mouhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`04bf1000 fffff880`04bff000   kbdhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`04bbb000 fffff880`04bc8000   mouhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
fffff880`04bc8000 fffff880`04bd6000   kbdhid.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01881000 fffff880`0188f000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0188f000 fffff880`01899000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`01899000 fffff880`018d8000   dump_nvstor6
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003F000
fffff880`018d8000 fffff880`018eb000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Back
Top Bottom