BSOD after fresh format

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by ggoh80, Feb 15, 2011.

  1. ggoh80

    ggoh80 New Member

    Joined:
    Feb 7, 2011
    Messages:
    6
    Likes Received:
    0
    I formatted my computer after getting a series of intermittent BSOD. Installed all the latest drivers (or I thought). Then received two BSODs in the last day. Still not exactly sure what the problem is.

    Any help appreciated would be great. Attached are the two BSOD crashes. First one is most recent.

    Thanks!

    View attachment 021511-21606-01.zip
    View attachment 021511-21340-01.zip
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Test the hardware:

    1. Hard disk:

    PassMark DiskCheckup - SMART hard drive monitoring utility

    HDDScan

    HD Tune website


    Better if you use manufacture's diagnostic,

    HD Diagnostic




    2. Memtest86+ - Advanced Memory Diagnostic Tool
    during 10 passes




    3. Last but not the least,

    http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html







    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\021511-21340-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.x86fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0x82a4f000 PsLoadedModuleList = 0x82b97810
    Debug session time: Tue Feb 15 04:38:25.083 2011 (UTC - 5:00)
    System Uptime: 0 days 0:09:15.862
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007F, {8, 801dc000, 0, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!KeAccumulateTicks+ba )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 801dc000
    Arg3: 00000000
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  WoW-4.0.0-WOW-
    
    CURRENT_IRQL:  1c
    
    LAST_CONTROL_TRANSFER:  from 82aba462 to 82abac8b
    
    STACK_TEXT:  
    a68db020 82aba462 00002710 00000000 00008b00 nt!KeAccumulateTicks+0xba
    a68db060 82aba30f 82a95ab7 fe25008c 00000000 nt!KeUpdateRunTime+0x145
    a68db0b8 82abf67f 00000000 00000000 000000d1 nt!KeUpdateSystemTime+0x613
    a68db0b8 82a95ab7 00000000 00000000 000000d1 nt!KeUpdateSystemTimeAssist+0x13
    a68db140 82a9431c badb0d00 86542d48 fdb79d42 nt!KiTrap10+0x93
    a68db1b4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db228 82a9431c badb0d00 86542d48 fd0b3439 nt!KiTrap07+0xb4
    a68db29c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db310 82a9431c badb0d00 86542d48 fc95feeb nt!KiTrap07+0xb4
    a68db384 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db3f8 82a9431c badb0d00 86542d48 fbc5512b nt!KiTrap07+0xb4
    a68db46c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db4e0 82a9431c badb0d00 86542d48 fb2c0f02 nt!KiTrap07+0xb4
    a68db554 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db5c8 82a9431c badb0d00 86542d48 fb07f1dc nt!KiTrap07+0xb4
    a68db63c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db6b0 82a9431c badb0d00 86542d48 fac82ed4 nt!KiTrap07+0xb4
    a68db724 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db798 82a9431c badb0d00 86542d48 fa84b687 nt!KiTrap07+0xb4
    a68db80c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db880 82a9431c badb0d00 86542d48 f9eb2e37 nt!KiTrap07+0xb4
    a68db8f4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68db968 82a9431c badb0d00 86542d48 f9c7fa5c nt!KiTrap07+0xb4
    a68db9dc 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dba50 82a9431c badb0d00 86542d48 f9641753 nt!KiTrap07+0xb4
    a68dbac4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dbb38 82a9431c badb0d00 86542d48 f8f88bfd nt!KiTrap07+0xb4
    a68dbbac 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dbc20 82a9431c badb0d00 86542d48 f8af1bc2 nt!KiTrap07+0xb4
    a68dbc94 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dbd08 82a9431c badb0d00 86542d48 f85eb4c6 nt!KiTrap07+0xb4
    a68dbd7c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dbdf0 82a9431c badb0d00 86542d48 f81fa059 nt!KiTrap07+0xb4
    a68dbe64 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dbed8 82a9431c badb0d00 86542d48 f7d7e890 nt!KiTrap07+0xb4
    a68dbf4c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
    a68dbfc0 00000000 badb0d00 86542d48 f7241c10 nt!KiTrap07+0xb4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeAccumulateTicks+ba
    82abac8b 6a00            push    0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KeAccumulateTicks+ba
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc78ed4
    
    FAILURE_BUCKET_ID:  0x7f_8_nt!KeAccumulateTicks+ba
    
    BUCKET_ID:  0x7f_8_nt!KeAccumulateTicks+ba
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\021511-21606-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16695.x86fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0x82c18000 PsLoadedModuleList = 0x82d60810
    Debug session time: Tue Feb 15 17:33:30.862 2011 (UTC - 5:00)
    System Uptime: 0 days 12:43:12.750
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 82ca9eae, 8ad3fb48, 8ad3f720}
    
    Probably caused by : ntkrpamp.exe ( nt!IoGetAttachedDevice+c )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82ca9eae, The address that the exception occurred at
    Arg3: 8ad3fb48, Exception Record Address
    Arg4: 8ad3f720, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IoGetAttachedDevice+c
    82ca9eae 8b4810          mov     ecx,dword ptr [eax+10h]
    
    EXCEPTION_RECORD:  8ad3fb48 -- (.exr 0xffffffff8ad3fb48)
    ExceptionAddress: 82ca9eae (nt!IoGetAttachedDevice+0x0000000c)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 0000002c
    Attempt to read from address 0000002c
    
    CONTEXT:  8ad3f720 -- (.cxr 0xffffffff8ad3f720)
    eax=0000001c ebx=85904c18 ecx=0000001c edx=746c6644 esi=00000800 edi=85d3c9e0
    eip=82ca9eae esp=8ad3fc10 ebp=8ad3fc10 iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    nt!IoGetAttachedDevice+0xc:
    82ca9eae 8b4810          mov     ecx,dword ptr [eax+10h] ds:0023:0000002c=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  0000002c
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82d80718
    Unable to read MiSystemVaType memory at 82d60160
     0000002c 
    
    FOLLOWUP_IP: 
    nt!IoGetAttachedDevice+c
    82ca9eae 8b4810          mov     ecx,dword ptr [eax+10h]
    
    BUGCHECK_STR:  0x7E
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from 82ccb1ca to 82ca9eae
    
    STACK_TEXT:  
    8ad3fc10 82ccb1ca 85d3c9e0 00000000 00000800 nt!IoGetAttachedDevice+0xc
    8ad3fc24 82e5a1bd 85904c18 84cbbc58 85904c00 nt!IoGetRelatedDeviceObject+0x70
    8ad3fc6c 82e39a98 85904c18 85904c18 85904c00 nt!IopDeleteFile+0x32
    8ad3fc84 82c81080 00000000 000c0000 00000000 nt!ObpRemoveObjectRoutine+0x59
    8ad3fc98 82c80ff0 85904c18 82e49ec5 ad521f00 nt!ObfDereferenceObjectWithTag+0x88
    8ad3fca0 82e49ec5 ad521f00 ad521f28 82d82680 nt!ObfDereferenceObject+0xd
    8ad3fccc 82c43f29 ad521f00 00000000 00000000 nt!MiSegmentDelete+0x191
    8ad3fd28 82c43e41 84cc3c80 00000000 82e3bb02 nt!MiProcessDereferenceList+0xdb
    8ad3fd50 82e269df 00000000 a955a6d3 00000000 nt!MiDereferenceSegmentThread+0xc5
    8ad3fd90 82cd81d9 82c43d7a 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!IoGetAttachedDevice+c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc78ed4
    
    STACK_COMMAND:  .cxr 0xffffffff8ad3f720 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_nt!IoGetAttachedDevice+c
    
    BUCKET_ID:  0x7E_nt!IoGetAttachedDevice+c
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start    end        module name
    8e7cd000 8e7f9000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
    88a22000 88a6a000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    8d137000 8d191000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    90577000 90589000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8dce2000 8dcf4000   amdk8    amdk8.sys    Mon Jul 13 19:11:03 2009 (4A5BBF07)
    88bdf000 88be8000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    88b47000 88b50000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    88b50000 88b73000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    82540000 8258d000   ATMFD    ATMFD.DLL    unavailable (00000000)
    8d084000 8d08b000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8dcb3000 8dcc1000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    8325a000 83262000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    8c763000 8c77c000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    82520000 8253e000   cdd      cdd.dll      unavailable (00000000)
    8d05e000 8d07d000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    832a4000 8334f000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    88dc4000 88de9000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    83262000 832a4000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    88e39000 88e96000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    9056a000 90577000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    930eb000 930f8000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    93154000 93156680   danew    danew.sys    Sun Feb 07 22:54:37 2010 (4B6F8AFD)
    8dc9b000 8dcb3000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    8dc8f000 8dc9b000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    89000000 89011000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8e7b4000 8e7cd000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    930f8000 93102000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:24:27 2010 (4C3BDC6B)
    93139000 9314a000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    93102000 93139000   dump_nvstor32 dump_nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
    9314a000 93154000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    9045b000 90512000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 22:37:53 2010 (4CCF7981)
    90512000 9054b000   dxgmms1  dxgmms1.sys  Wed Feb 02 22:34:49 2011 (4D4A2259)
    8c615000 8c6bb000   eamonm   eamonm.sys   Thu Dec 09 00:29:13 2010 (4D006929)
    8d08b000 8d0aa000   ehdrv    ehdrv.sys    Thu Dec 09 00:29:52 2010 (4D006950)
    931db000 931f4000   epfwwfpr epfwwfpr.sys Thu Dec 09 00:25:16 2010 (4D00683C)
    8dc00000 8dc2a000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
    8dcfe000 8dd09000   fdc      fdc.sys      unavailable (00000000)
    88c46000 88c57000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8e61e000 8e628000   flpydisk flpydisk.sys unavailable (00000000)
    88c12000 88c46000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    88ea4000 88ead000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    88e00000 88e32000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    89165000 89196000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    83028000 8305f000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    9054b000 9056a000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    90400000 90413000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    8e617000 8e61d480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    93157000 93162000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    8c6de000 8c763000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    891ed000 891f5000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    8dd21000 8dd2e000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9307e000 9308a000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
    80b9a000 80ba2000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8dd9f000 8ddd3000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
    88db1000 88dc4000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    88fa2000 88fc7000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    8c6bb000 8c6cb000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    9318d000 931a8000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    8323e000 83249000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
    93182000 9318d000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8dd2e000 8dd3b000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    93073000 9307e000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    88b31000 88b47000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    8c77c000 8c78e000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    8c78e000 8c7b1000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    8c7b1000 8c7ec000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    931a8000 931c3000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    8d0fc000 8d107000   Msfs     Msfs.SYS     unavailable (00000000)
    88a73000 88a7b000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    88d86000 88db1000   msrpc    msrpc.sys    unavailable (00000000)
    8dc85000 8dc8f000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    891dd000 891ed000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    88ead000 88f64000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    905a1000 905ac000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    905ac000 905ce000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    93062000 93073000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    8d1e9000 8d1f7000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    8d191000 8d1c3000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    88f64000 88fa2000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    8d107000 8d115000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    8dc7b000 8dc85000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    82c18000 83028000   nt       ntkrpamp.exe Tue Oct 26 22:30:44 2010 (4CC78ED4)
    88c57000 88d86000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    9317b000 93182000   NuidFltr NuidFltr.sys Fri May 08 04:35:42 2009 (4A03EEDE)
    8d07d000 8d084000   Null     Null.SYS     unavailable (00000000)
    94dfa000 94dfb040   nvBridge nvBridge.kmd Fri Jan 07 20:57:19 2011 (4D27C47F)
    9308a000 930ab000   nvhda32v nvhda32v.sys Thu Nov 11 18:10:19 2010 (4CDC77DB)
    94400000 94df9ee0   nvlddmkm nvlddmkm.sys Fri Jan 07 21:03:58 2011 (4D27C60E)
    90414000 9045a700   nvmf6232 nvmf6232.sys Wed Nov 11 18:16:22 2009 (4AFB45C6)
    88b73000 88b98000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
    83200000 83237000   nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
    8e628000 8e785000   P17      P17.sys      Thu Oct 15 22:11:53 2009 (4AD7D669)
    8d1ca000 8d1e9000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    88ab0000 88ac1000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    88a7b000 88aa5000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    88b1c000 88b23000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
    88b23000 88b31000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    88e96000 88ea4000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    97c09000 97ca0000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    8e785000 8e7b4000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    83249000 8325a000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    90589000 905a1000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    905ce000 905e6000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    905e6000 905fd000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8e600000 8e617000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8dc3a000 8dc7b000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    8d0e4000 8d0ec000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    8d0ec000 8d0f4000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    8d0f4000 8d0fc000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    88fc7000 88ff4000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    8c6cb000 8c6de000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    97ca0000 97caa000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    8dcf4000 8dcfe000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    88a00000 88a1a000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    891d5000 891dd000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    97d78000 97de2000   spsys    spsys.sys    Mon May 11 12:37:10 2009 (4A085436)
    97d27000 97d78000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
    97cd8000 97d27000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
    97caa000 97ccb000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
    88b98000 88bdf000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
    94dfe000 94dff380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8901c000 89165000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
    97ccb000 97cd8000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8d12c000 8d137000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    8d115000 8d12c000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    88c00000 88c10000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    824f0000 824f9000   TSDDD    TSDDD.dll    unavailable (00000000)
    8dcc1000 8dce2000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    930ab000 930eb000   udfs     udfs.sys     Mon Jul 13 19:14:09 2009 (4A5BBFC1)
    8ddd3000 8dde1000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    93164000 9317b000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    93162000 93163700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8dd90000 8dd9f000   usbehci  usbehci.sys  Fri Oct 23 23:58:55 2009 (4AE27B7F)
    9301e000 93062000   usbhub   usbhub.sys   Sat Oct 24 00:00:05 2009 (4AE27BC5)
    8dd3b000 8dd45000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8dd45000 8dd90000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    88aa5000 88ab0000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    8d0aa000 8d0b6000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    94dfc000 94dfd680   vHidDev  vHidDev.sys  Mon Dec 21 08:50:15 2009 (4B2F7D17)
    8d0b6000 8d0d7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    88ac1000 88ad1000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    88ad1000 88b1c000   volmgrx  volmgrx.sys  unavailable (00000000)
    89196000 891d5000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    8d000000 8d013000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    8d0d7000 8d0e4000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8334f000 833c0000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    833c0000 833ce000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8d1c3000 8d1ca000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    82290000 824db000   win32k   win32k.sys   unavailable (00000000)
    88a6a000 88a73000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    93000000 9301a000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    97df9000 97dfb000   MSTEE.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00002000
    97dfb000 97dfe000   MSKSSRV.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00003000
    8d013000 8d034000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00021000
    97de2000 97df9000   USBSTOR.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00017000
    931c3000 931db000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    88de9000 88df6000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    89011000 8901b000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    8d016000 8d04d000   dump_nvstor3
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00037000
    8d04d000 8d05e000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
    8dd09000 8dd21000   i8042prt.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    
    
     

Share This Page

Loading...