Blue Screen of Death with new PC

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Shing, Feb 26, 2011.

  1. Shing

    Shing New Member

    Joined:
    Feb 6, 2011
    Messages:
    8
    Likes Received:
    0
    Hi,

    I just got another bsod today. Last time when i posted on this forum, it was blamed for
    the ati video card driver. However, the problem persisted even after i updated to the latest driver available. So, i took out the video card today and started using the onboard video card that came with the motherboard, and i just got another bsod.
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Codes 1a, 4e, 3b { c0000005, ... - I would blame RAM in your case.


    Is the video card out at the moment? Out of curiosity, because I see its drivers loaded:

    Code:
    [B]fffff880`04860000 fffff880`0515c000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`04283000 fffff880`042d1000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)[/B]

    1. Uninstall 360.cn. Install MSE to replace that.
    https://www.microsoft.com/security_essentials/

    2. Update or disable in device manager IEEE-1284 parallel class driver for ECP, Byte, and Nibble modes - Device Guys or Samsung
    DgiVecp.sys Thu Oct 30 23:38:29 2008

    3. Update Realtek LAN driver to the latest.

    ----> Last but not the least, http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html

    CPU-Z MEMORY tab screenshot + RAMMON .txt report.






    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022611-13665-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
    Debug session time: Sat Feb 26 13:48:33.141 2011 (UTC - 5:00)
    System Uptime: 0 days 1:30:34.920
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff88004545954, fffff88002ad9d60, 0}
    
    Probably caused by : dxgmms1.sys ( dxgmms1!VidMmDestroyAllocation+14 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff88004545954, Address of the instruction which caused the bugcheck
    Arg3: fffff88002ad9d60, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    dxgmms1!VidMmDestroyAllocation+14
    fffff880`04545954 488b3a          mov     rdi,qword ptr [rdx]
    
    CONTEXT:  fffff88002ad9d60 -- (.cxr 0xfffff88002ad9d60)
    rax=fffff880045558d0 rbx=0000000000000000 rcx=fffff8a001cdef10
    rdx=300fa90080152408 rsi=fffff8a00866e000 rdi=0000000000000000
    rip=fffff88004545954 rsp=fffff88002ada730 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=fffff8800142b120 r12=fffff8a002a2e740 r13=fffff8a007c59960
    r14=0000000000000001 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    dxgmms1!VidMmDestroyAllocation+0x14:
    fffff880`04545954 488b3a          mov     rdi,qword ptr [rdx] ds:002b:300fa900`80152408=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  Client.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88004545954
    
    STACK_TEXT:  
    fffff880`02ada730 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VidMmDestroyAllocation+0x14
    
    
    FOLLOWUP_IP: 
    dxgmms1!VidMmDestroyAllocation+14
    fffff880`04545954 488b3a          mov     rdi,qword ptr [rdx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  dxgmms1!VidMmDestroyAllocation+14
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578
    
    STACK_COMMAND:  .cxr 0xfffff88002ad9d60 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_dxgmms1!VidMmDestroyAllocation+14
    
    BUCKET_ID:  X64_0x3B_dxgmms1!VidMmDestroyAllocation+14
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022511-15210-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
    Debug session time: Fri Feb 25 13:31:24.248 2011 (UTC - 5:00)
    System Uptime: 0 days 3:18:32.340
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 9976e, 2, 10426d}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 000000000009976e, page frame number
    Arg3: 0000000000000002, current page state
    Arg4: 000000000010426d, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002b5138c to fffff80002ac1740
    
    STACK_TEXT:  
    fffff880`03a86f98 fffff800`02b5138c : 00000000`0000004e 00000000`00000099 00000000`0009976e 00000000`00000002 : nt!KeBugCheckEx
    fffff880`03a86fa0 fffff800`02b339e5 : 00000000`00000000 fffff680`00029718 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
    fffff880`03a86fe0 fffff800`02a95c23 : fffffa80`04ce18d0 fffff700`00003c4d 0000007f`fffffff8 fffff8a0`0996b210 : nt! ?? ::FNODOBFM::`string'+0x3222c
    fffff880`03a87070 fffff800`02a9468a : fffffa80`04ce18d0 fffffa80`00000000 fffff880`00002d28 fffff800`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
    fffff880`03a87920 fffff800`02da6dcf : fffff8a0`091f0060 fffff880`03a87c20 00000000`00000000 fffffa80`04365680 : nt!MmCleanProcessAddressSpace+0x96
    fffff880`03a87970 fffff800`02d7f635 : 00000000`00000000 00000000`00000001 00000000`7ef9d000 fffffa80`047bfb60 : nt!PspExitThread+0x92f
    fffff880`03a87a30 fffff800`02a9e1db : 00000000`00000000 fffffa80`049bf580 00000000`01abe620 00000000`00000000 : nt!PsExitSpecialApc+0x1d
    fffff880`03a87a60 fffff800`02a9e620 : 00000000`021ff7c8 fffff880`03a87ae0 fffff800`02d7f74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`03a87ae0 fffff800`02ac0a37 : fffffa80`04365680 00000000`7ef9d000 00000000`000000c0 00000000`73d2a2bc : nt!KiInitiateUserApc+0x70
    fffff880`03a87c20 00000000`773c17ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`01abe5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773c17ba
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`02b5138c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022611-15085-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a5f000 PsLoadedModuleList = 0xfffff800`02c9ce50
    Debug session time: Sat Feb 26 12:08:18.141 2011 (UTC - 5:00)
    System Uptime: 0 days 0:10:08.232
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {41201, fffff6800012b990, f1500000ba519847, fffffa8003f21c40}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+13bb2 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000041201, The subtype of the bugcheck.
    Arg2: fffff6800012b990
    Arg3: f1500000ba519847
    Arg4: fffffa8003f21c40
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41201
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  Client.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002b2db3e to fffff80002acf740
    
    STACK_TEXT:  
    fffff880`085e49b8 fffff800`02b2db3e : 00000000`0000001a 00000000`00041201 fffff680`0012b990 f1500000`ba519847 : nt!KeBugCheckEx
    fffff880`085e49c0 fffff800`02a9db6e : 00000000`00000000 00000000`00000000 00000000`00000000 f1500000`ba519847 : nt! ?? ::FNODOBFM::`string'+0x13bb2
    fffff880`085e4a00 fffff800`02a9d80a : fffffa80`03f21c40 fffffa80`03ed8b30 fffffa80`03ed8b30 00000000`25732000 : nt!MiQueryAddressState+0x2ae
    fffff880`085e4a50 fffff800`02db6c38 : fffff880`00000004 00000000`25733000 fffffa80`03f21c40 fffff880`085e4bc0 : nt!MiQueryAddressSpan+0xaa
    fffff880`085e4ac0 fffff800`02ace993 : ffffffff`ffffffff fffffa80`03de5b60 00000000`0000008a 00000000`0d3ae798 : nt!NtQueryVirtualMemory+0x386
    fffff880`085e4bb0 00000000`775c00ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0d3ae778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775c00ea
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+13bb2
    fffff800`02b2db3e cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+13bb2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
    
    BUCKET_ID:  X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
    
    Followup: MachineOwner
    ---------
    
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00f0c000 fffff880`00f63000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03eea000 fffff880`03f74000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04810000 fffff880`04826000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`04188000 fffff880`0419d000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`010b7000 fffff880`010c2000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e23000 fffff880`00e4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`0539c000 fffff880`053bc000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`04860000 fffff880`0515c000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
    fffff880`04283000 fffff880`042d1000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
    fffff880`04133000 fffff880`04162000   BAPIDRV64 BAPIDRV64.SYS Wed Sep 01 21:29:57 2010 (4C7EFE15)
    fffff880`01974000 fffff880`0197b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`04122000 fffff880`04133000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`02600000 fffff880`0261e000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`007b0000 fffff960`007d7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`01941000 fffff880`0196b000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cdc000 fffff880`00d9c000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`018bb000 fffff880`018eb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c7e000 fffff880`00cdc000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01180000 fffff880`011f3000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`04800000 fffff880`04810000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0472e000 fffff880`04737000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`01904000 fffff880`01912000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04081000 fffff880`04104000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`04104000 fffff880`04122000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`04737000 fffff880`04747000   DgiVecp  DgiVecp.sys  Thu Oct 30 23:38:29 2008 (490A7DB5)
    fffff880`015e5000 fffff880`015f4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018a5000 fffff880`018bb000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`05374000 fffff880`05396000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`043f4000 fffff880`043fe000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`013e7000 fffff880`013fa000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`01912000 fffff880`0193d000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
    fffff880`04074000 fffff880`04080000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`042d1000 fffff880`043c5000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`0515c000 fffff880`051a2000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0110e000 fffff880`01122000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`010c2000 fffff880`0110e000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013dd000 fffff880`013e7000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`0186b000 fffff880`018a5000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`04067000 fffff880`04074000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02a16000 fffff800`02a5f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`041d1000 fffff880`041f5000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`052db000 fffff880`05337000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`018eb000 fffff880`01904000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`053e9000 fffff880`053f1080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`053db000 fffff880`053e9000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02734000 fffff880`027fc000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`01862000 fffff880`0186b000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04261000 fffff880`04270000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05200000 fffff880`0520e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00ba0000 fffff800`00baa000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`05217000 fffff880`0525a000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013b2000 fffff880`013cc000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`05396000 fffff880`0539b200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`026a1000 fffff880`026b6000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0265d000 fffff880`02680000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c5d000 fffff880`00c6a000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`01200000 fffff880`0120e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04270000 fffff880`0427f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`053f2000 fffff880`053ff000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`0261e000 fffff880`02636000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`04690000 fffff880`046bd000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`046bd000 fffff880`0470b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0470b000 fffff880`0472e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`019d9000 fffff880`019e4000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f6c000 fffff880`00f76000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01122000 fffff880`01180000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03ed2000 fffff880`03edd000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01850000 fffff880`01862000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014db000 fffff880`015cd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0484a000 fffff880`04856000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02709000 fffff880`0271c000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`043c5000 fffff880`043f4000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`052c6000 fffff880`052db000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03e00000 fffff880`03e0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03f74000 fffff880`03fb9000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`019e4000 fffff880`019f5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03ec6000 fffff880`03ed2000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a5f000 fffff800`0303b000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0120f000 fffff880`013b2000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0196b000 fffff880`01974000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`00c00000 fffff880`00c2b000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
    fffff880`026b6000 fffff880`02709000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`03fc2000 fffff880`03fe8000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`041a9000 fffff880`041c6000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00fb6000 fffff880`00fcb000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f76000 fffff880`00fa9000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fe0000 fffff880`00fe7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fe7000 fffff880`00ff7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013cc000 fffff880`013dd000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`04747000 fffff880`047ed000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05337000 fffff880`05374000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c6a000 fffff880`00c7e000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03eac000 fffff880`03ec6000   qutmdrv  qutmdrv.sys  Thu Apr 15 03:18:03 2010 (4BC6BDAB)
    fffff880`04826000 fffff880`0484a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04200000 fffff880`0421b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0421b000 fffff880`0423c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0423c000 fffff880`04256000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`03e5b000 fffff880`03eac000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`04256000 fffff880`04261000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019be000 fffff880`019c7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019c7000 fffff880`019d0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`019d0000 fffff880`019d9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01816000 fffff880`01850000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`0271c000 fffff880`02734000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`051a2000 fffff880`051f8000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`047ed000 fffff880`047f8000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0419d000 fffff880`041a9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`03e0f000 fffff880`03e2c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`015dd000 fffff880`015e5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`072fa000 fffff880`07390000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`07293000 fffff880`072fa000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`04600000 fffff880`0462d000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`0462d000 fffff880`04635000   SSPORT   SSPORT.sys   Thu Aug 11 19:07:32 2005 (42FBDA34)
    fffff880`01055000 fffff880`010b7000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`04856000 fffff880`04857480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`04635000 fffff880`04647000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01800000 fffff880`0180d000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`00c2b000 fffff880`00c49000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03e47000 fffff880`03e5b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004a0000 fffff960`004aa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04162000 fffff880`04188000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`0525a000 fffff880`0526c000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`053bc000 fffff880`053d9000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`053d9000 fffff880`053daf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`04056000 fffff880`04067000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`0526c000 fffff880`052c6000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`041c6000 fffff880`041d1000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04000000 fffff880`04056000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00fa9000 fffff880`00fb6000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0197b000 fffff880`01989000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01989000 fffff880`019ae000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015cd000 fffff880`015dd000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fcb000 fffff880`00fe0000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d9c000 fffff880`00df8000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03fe8000 fffff880`03ffe000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03e2c000 fffff880`03e47000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019ae000 fffff880`019be000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e59000 fffff880`00efd000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00efd000 fffff880`00f0c000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03fb9000 fffff880`03fc2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000d0000 fffff960`003e0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`00f63000 fffff880`00f6c000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02680000 fffff880`026a1000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`07200000 fffff880`07271000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`018eb000 fffff880`018f9000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`018f9000 fffff880`01903000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`01903000 fffff880`0192e000   dump_nvstor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002B000
    fffff880`0192e000 fffff880`01941000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     

Share This Page

Loading...