Bsod again plese help

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by keddepryhsel, May 16, 2011.

  1. keddepryhsel

    keddepryhsel New Member

    Joined:
    Apr 3, 2011
    Messages:
    26
    Likes Received:
    0
    Hello again
    again today I got 3 bsod has been run memtest 20 pass and 0 errors there was no error .. my ram, motherboard and CPU have been tested where I bought it they could not troubleshoot. what could be wrong have tried other ram but it did not help either. there may be the motherboard or maybe the CPU

    https://rapidshare.com/files/2423847060/bsofd.rar
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Summary of your crash dumps:


    Update Alpha-Network
    anodlwfx.sys Fri Mar 06 05:10:08 2009
    Alpha Networks Inc. - News - News Release

    Update NEC USB 3.0 Controller to the latest
    nusb3xhc.sys Thu Feb 10 00:52:33 2011
    Downloads: Support & Downloads | NEC



    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-23571-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`02a1c000 PsLoadedModuleList = 0xfffff800`02c59e50
    Debug session time: Mon May 16 07:51:31.432 2011 (UTC - 4:00)
    System Uptime: 0 days 0:01:22.508
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {5010, fffff780c0000000, 1c94, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2c00f )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000005010, The subtype of the bugcheck.
    Arg2: fffff780c0000000
    Arg3: 0000000000001c94
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_5010
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  uTorrent.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002a30316 to fffff80002a8c700
    
    STACK_TEXT:  
    fffff880`0a5792a8 fffff800`02a30316 : 00000000`0000001a 00000000`00005010 fffff780`c0000000 00000000`00001c94 : nt!KeBugCheckEx
    fffff880`0a5792b0 fffff800`02da1f0d : fffff980`0b866000 fffff8a0`021c7260 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x2c00f
    fffff880`0a579590 fffff800`02aa5567 : 00000000`014c0000 fffffa80`039c6fc0 00000000`00000000 00000000`01600000 : nt!CcUnmapVacb+0x5d
    fffff880`0a5795d0 fffff800`02aab3b5 : fffff980`00000001 00000000`00e00000 fffffa80`07f2ee10 00000000`00000001 : nt!CcUnmapVacbArray+0x1b7
    fffff880`0a579660 fffff800`02da8692 : 00000000`00e00000 00000000`01600000 fffff880`0a579730 fffff880`0a5797c0 : nt!CcGetVirtualAddress+0x2c5
    fffff880`0a5796f0 fffff880`012bcd28 : fffff880`00000000 00000000`00000005 fffffa80`0000ac00 fffffa80`00020001 : nt!CcCopyRead+0x132
    fffff880`0a5797b0 fffff880`00c360c8 : fffffa80`07f90a20 fffffa80`07ebe258 fffffa80`00000000 fffffa80`07f90a01 : Ntfs!NtfsCopyReadA+0x1a8
    fffff880`0a579980 fffff880`00c39c2a : fffff880`0a579a50 00000000`03750003 00000000`03750000 fffffa80`07f90a00 : fltmgr!FltpPerformFastIoCall+0x88
    fffff880`0a5799e0 fffff880`00c575f0 : fffffa80`07f90a20 00000000`00000000 fffff880`0a579b40 00000000`00020000 : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`0a579a20 fffff800`02da8ff9 : fffffa80`07f90a20 fffffa80`00000001 fffffa80`039f4360 fffffa80`07f90a20 : fltmgr!FltpFastIoRead+0x1d0
    fffff880`0a579ac0 fffff800`02a8b953 : 00000000`00000104 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
    fffff880`0a579bb0 00000000`73712dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`006af0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73712dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+2c00f
    fffff800`02a30316 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2c00f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34
    
    FAILURE_BUCKET_ID:  X64_0x1a_5010_nt!_??_::FNODOBFM::_string_+2c00f
    
    BUCKET_ID:  X64_0x1a_5010_nt!_??_::FNODOBFM::_string_+2c00f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-23821-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
    Debug session time: Mon May 16 07:48:53.733 2011 (UTC - 4:00)
    System Uptime: 0 days 7:28:24.793
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff880030470a0, 2, 0, fffff80002ab5940}
    
    Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+240 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff880030470a0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ab5940, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0
     fffff880030470a0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!RtlDispatchException+240
    fffff800`02ab5940 498b02          mov     rax,qword ptr [r10]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  uTorrent.exe
    
    TRAP_FRAME:  fffff88003045c50 -- (.trap 0xfffff88003045c50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000024 rbx=0000000000000000 rcx=fffff80002ab5a67
    rdx=00000000000001d8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ab5940 rsp=fffff88003045de0 rbp=000000000000022c
     r8=0000000000000000  r9=000000000000083c r10=fffff880030470a0
    r11=fffff88003045e28 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di ng nz ac pe nc
    nt!RtlDispatchException+0x240:
    fffff800`02ab5940 498b02          mov     rax,qword ptr [r10] ds:6d78:fffff880`030470a0=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a87c69 to fffff80002a88700
    
    STACK_TEXT:  
    fffff880`03045b08 fffff800`02a87c69 : 00000000`0000000a fffff880`030470a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03045b10 fffff800`02a868e0 : fffff880`02d52110 00000000`00000024 fffffa80`079811d0 fffff800`02bbd2dd : nt!KiBugCheckDispatch+0x69
    fffff880`03045c50 fffff800`02ab5940 : fffff800`02a87eac fffff880`03045e28 00000000`00000001 fffff880`0837a3a0 : nt!KiPageFault+0x260
    fffff880`03045de0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDispatchException+0x240
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!RtlDispatchException+240
    fffff800`02ab5940 498b02          mov     rax,qword ptr [r10]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!RtlDispatchException+240
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd34
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!RtlDispatchException+240
    
    BUCKET_ID:  X64_0xA_nt!RtlDispatchException+240
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\051611-16582-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
    Machine Name:
    Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
    Debug session time: Mon May 16 09:09:05.301 2011 (UTC - 4:00)
    System Uptime: 0 days 1:16:20.737
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff88006ad2b90, 0, 0}
    
    Unable to load image Darusb_win7x.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Darusb_win7x.sys
    *** ERROR: Module load completed but symbols could not be loaded for Darusb_win7x.sys
    Probably caused by : nwifi.sys ( nwifi!Dot11SendCompletion+44 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff88006ad2b90, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    +3661376264666230
    fffff880`06ad2b90 a83a            test    al,3Ah
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cba0e0
     0000000000000000 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR:  0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff88006ad3aa8 -- (.exr 0xfffff88006ad3aa8)
    ExceptionAddress: fffff8800604fc04 (nwifi!Dot11TXCompletion)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff88006ad3b50 -- (.trap 0xfffff88006ad3b50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800494b9b0
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800604fc04 rsp=fffff88006ad3ce8 rbp=0000000000000000
     r8=7d10b8c9631b835c  r9=fffffa800799a010 r10=fffffa8005bafd80
    r11=fffffa8004d24c30 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nwifi!Dot11TXCompletion:
    fffff880`0604fc04 f0418380e0000000ff lock add dword ptr [r8+0E0h],0FFFFFFFFh ds:b280:7d10b8c9`631b843c=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b14aeb to fffff80002a82700
    
    STACK_TEXT:  
    fffff880`06ad2ad8 fffff800`02b14aeb : 00000000`0000001e ffffffff`c0000005 fffff880`06ad2b90 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06ad2ae0 fffff800`02ad3e78 : fffff880`06ad2d10 00000000`00000000 00000000`00000000 ffffffff`00000000 : nt!KipFatalFilter+0x1b
    fffff880`06ad2b20 fffff800`02ab0d9c : fffff880`06ad33d0 00000000`00000000 00000000`00000001 fffffa80`07849080 : nt! ?? ::FNODOBFM::`string'+0x95d
    fffff880`06ad2b60 fffff800`02aa849d : fffff800`02bceb18 fffff880`06ad5360 00000000`00000000 fffff800`02a12000 : nt!_C_specific_handler+0x8c
    fffff880`06ad2bd0 fffff800`02aafb10 : fffff800`02bceb18 fffff880`06ad2c48 fffff880`06ad3aa8 fffff800`02a12000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`06ad2c00 fffff800`02abca6f : fffff880`06ad3aa8 fffff880`06ad3310 fffff880`00000000 fffffa80`00000005 : nt!RtlDispatchException+0x410
    fffff880`06ad32e0 fffff800`02a81d42 : fffff880`06ad3aa8 fffffa80`03f16968 fffff880`06ad3b50 fffffa80`0494b9b0 : nt!KiDispatchException+0x16f
    fffff880`06ad3970 fffff800`02a8064a : fffffa80`04de01a0 fffff880`0849eb48 fffffa80`080f68e6 1b904488`e6e71800 : nt!KiExceptionDispatch+0xc2
    fffff880`06ad3b50 fffff880`0604fc04 : fffff880`06050f58 00000000`00000000 fffffa80`04cff530 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
    fffff880`06ad3ce8 fffff880`06050f58 : 00000000`00000000 fffffa80`04cff530 00000000`00000000 fffffa80`04de01a0 : nwifi!Dot11TXCompletion
    fffff880`06ad3cf0 fffff880`06054860 : 00000000`00000000 00000000`00000000 fffffa80`0494b9b0 00000000`00000010 : nwifi!Dot11SendCompletion+0x44
    fffff880`06ad3d20 fffff880`041371bb : fffffa80`05bb2d78 00000000`00000000 00000000`00000000 fffffa80`04bdacf0 : nwifi!Pt6SendComplete+0x28
    fffff880`06ad3d50 fffff880`015925ad : fffffa80`04de01a0 00000000`00000000 00000000`00000000 ffff0001`04de0000 : vwififlt!FilterSendNetBufferListsComplete+0x10b
    fffff880`06ad3da0 fffff880`08499159 : fffffa80`04de01a0 fffffa80`03f16030 fffffa80`080f68e6 fffffa80`05d255f4 : ndis!NdisMSendNetBufferListsComplete+0x6d
    fffff880`06ad3de0 fffffa80`04de01a0 : fffffa80`03f16030 fffffa80`080f68e6 fffffa80`05d255f4 00000000`00000000 : Darusb_win7x+0xb159
    fffff880`06ad3de8 fffffa80`03f16030 : fffffa80`080f68e6 fffffa80`05d255f4 00000000`00000000 fffff880`014d6af4 : 0xfffffa80`04de01a0
    fffff880`06ad3df0 fffffa80`080f68e6 : fffffa80`05d255f4 00000000`00000000 fffff880`014d6af4 fffffa80`04bf6b40 : 0xfffffa80`03f16030
    fffff880`06ad3df8 fffffa80`05d255f4 : 00000000`00000000 fffff880`014d6af4 fffffa80`04bf6b40 00000000`00000000 : 0xfffffa80`080f68e6
    fffff880`06ad3e00 00000000`00000000 : fffff880`014d6af4 fffffa80`04bf6b40 00000000`00000000 00000000`00000000 : 0xfffffa80`05d255f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nwifi!Dot11SendCompletion+44
    fffff880`06050f58 4883eb18        sub     rbx,18h
    
    SYMBOL_STACK_INDEX:  a
    
    SYMBOL_NAME:  nwifi!Dot11SendCompletion+44
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nwifi
    
    IMAGE_NAME:  nwifi.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc3b
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nwifi!Dot11SendCompletion+44
    
    BUCKET_ID:  X64_0x1E_c0000005_nwifi!Dot11SendCompletion+44
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`06d90000 fffff880`06dce000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00e66000 fffff880`00ebd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`0406f000 fffff880`040f9000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`06c8e000 fffff880`06ca4000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03e37000 fffff880`03e4c000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00e00000 fffff880`00e0b000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`04128000 fffff880`04131000   anodlwfx anodlwfx.sys Fri Mar 06 05:10:08 2009 (49B0F680)
    fffff880`06d88000 fffff880`06d90000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
    fffff880`041fa000 fffff880`04200000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
    fffff880`041f4000 fffff880`041fa000   AsUpIO   AsUpIO.sys   Sun Jul 05 22:21:38 2009 (4A515FB2)
    fffff880`08fda000 fffff880`08fe5000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`00fc7000 fffff880`00fd0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fd0000 fffff880`00ffa000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00850000 fffff960`008b1000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
    fffff880`03ee2000 fffff880`03ee9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03e00000 fffff880`03e11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`06191000 fffff880`061af000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
    fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
    fffff880`03e7e000 fffff880`03ea8000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d33000 fffff880`00df3000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`0103a000 fffff880`0106a000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00cd5000 fffff880`00d33000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010d7000 fffff880`0114a000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`06c7e000 fffff880`06c8e000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`073ed000 fffff880`073fb000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0848e000 fffff880`0859b000   Darusb_win7x Darusb_win7x.sys Wed Jun 23 23:42:49 2010 (4C22D439)
    fffff880`03fd3000 fffff880`03ff1000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`041e5000 fffff880`041f4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`015e1000 fffff880`015f7000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`073c5000 fffff880`073e7000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`04173000 fffff880`041b6000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
    fffff880`0720c000 fffff880`07215000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`07200000 fffff880`0720c000   dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`07215000 fffff880`07228000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`0841b000 fffff880`08427000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`148ea000 fffff880`149de000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`13c00000 fffff880`13c46000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`010a9000 fffff880`010bd000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00e0b000 fffff880`00e57000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0115b000 fffff880`01165000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01000000 fffff880`0103a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01165000 fffff880`011af000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02fee000 fffff800`03037000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`06d58000 fffff880`06d7c000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`0732c000 fffff880`07388000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`085d3000 fffff880`085ec000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`085ec000 fffff880`085f4080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`085c5000 fffff880`085d3000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`060c9000 fffff880`06191000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015d8000 fffff880`015e1000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03e66000 fffff880`03e75000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`08400000 fffff880`0840e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bbb000 fffff800`00bc5000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
    fffff880`07250000 fffff880`07293000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`010bd000 fffff880`010d7000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`073e7000 fffff880`073ec200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`08479000 fffff880`0848e000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`08435000 fffff880`08458000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cb4000 fffff880`00cc1000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`08427000 fffff880`08435000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03ff1000 fffff880`04000000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0840e000 fffff880`0841b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00fad000 fffff880`00fc7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03ea8000 fffff880`03ed9000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`08fe5000 fffff880`08ff5000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`061af000 fffff880`061c7000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`061c7000 fffff880`061f4000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
    fffff880`0888a000 fffff880`088d8000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
    fffff880`088d8000 fffff880`088fb000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
    fffff880`03f47000 fffff880`03f52000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00ec6000 fffff880`00ed0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01200000 fffff880`0125e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`0405d000 fffff880`04068000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015c6000 fffff880`015d8000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014d4000 fffff880`015c6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`06cc8000 fffff880`06cd4000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`0609e000 fffff880`060b1000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`06dce000 fffff880`06dfd000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`07317000 fffff880`0732c000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`04147000 fffff880`04156000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03f8e000 fffff880`03fd3000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`08f54000 fffff880`08f69000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`03f52000 fffff880`03f63000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04051000 fffff880`0405d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a12000 fffff800`02fee000   nt       ntkrnlmp.exe Sat Apr 09 00:14:44 2011 (4D9FDD34)
    fffff880`0125e000 fffff880`01400000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
    fffff880`03ed9000 fffff880`03ee2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`072a5000 fffff880`072bd000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
    fffff880`13c46000 fffff880`13c77000   nusb3xhc nusb3xhc.sys Thu Feb 10 00:52:33 2011 (4D537D21)
    fffff880`148e8000 fffff880`148e9180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
    fffff880`13c8d000 fffff880`148e7d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
    fffff880`0604b000 fffff880`0609e000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`04102000 fffff880`04128000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f10000 fffff880`00f25000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00ed0000 fffff880`00f03000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00f96000 fffff880`00f9d000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00f9d000 fffff880`00fad000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0114a000 fffff880`0115b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`088fb000 fffff880`089a1000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`07388000 fffff880`073c5000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cc1000 fffff880`00cd5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`06ca4000 fffff880`06cc8000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`06cd4000 fffff880`06cef000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`149de000 fffff880`149ff000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03e4c000 fffff880`03e66000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04000000 fffff880`04051000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03f2c000 fffff880`03f35000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03f35000 fffff880`03f3e000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03f3e000 fffff880`03f47000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01493000 fffff880`014cd000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`060b1000 fffff880`060c9000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06c00000 fffff880`06c75000   Rt64win7 Rt64win7.sys Thu Apr 21 14:15:33 2011 (4DB07445)
    fffff880`089a1000 fffff880`089ac000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`06d7c000 fffff880`06d88000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04156000 fffff880`04173000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`0148b000 fffff880`01493000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`08ebf000 fffff880`08f54000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
    fffff880`08800000 fffff880`08867000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
    fffff880`089ac000 fffff880`089d9000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
    fffff880`06cef000 fffff880`06cf0480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`089d9000 fffff880`089eb000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`03f81000 fffff880`03f8e000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`03f63000 fffff880`03f81000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`041d1000 fffff880`041e5000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03e11000 fffff880`03e37000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`07293000 fffff880`072a5000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`085a8000 fffff880`085c5000   usbccgp  usbccgp.sys  Thu Mar 24 23:23:03 2011 (4D8C0A97)
    fffff880`13c77000 fffff880`13c78f00   USBD     USBD.SYS     Thu Mar 24 23:22:51 2011 (4D8C0A8B)
    fffff880`06d47000 fffff880`06d58000   usbehci  usbehci.sys  Thu Mar 24 23:22:57 2011 (4D8C0A91)
    fffff880`072bd000 fffff880`07317000   usbhub   usbhub.sys   Thu Mar 24 23:23:22 2011 (4D8C0AAA)
    fffff880`13c79000 fffff880`13c84000   usbohci  usbohci.sys  Thu Mar 24 23:22:56 2011 (4D8C0A90)
    fffff880`06cf1000 fffff880`06d47000   USBPORT  USBPORT.SYS  Thu Mar 24 23:23:03 2011 (4D8C0A97)
    fffff880`00f03000 fffff880`00f10000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`03ee9000 fffff880`03ef7000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`03ef7000 fffff880`03f1c000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00f25000 fffff880`00f3a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f3a000 fffff880`00f96000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`011af000 fffff880`011fb000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0859b000 fffff880`085a8000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`04131000 fffff880`04147000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`041b6000 fffff880`041d1000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`03f1c000 fffff880`03f2c000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ca4000 fffff880`00cb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`040f9000 fffff880`04102000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
    fffff880`06c75000 fffff880`06c7e000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00ebd000 fffff880`00ec6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`08458000 fffff880`08479000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`08f69000 fffff880`08fda000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0106a000 fffff880`01078000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01078000 fffff880`01084000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`015f7000 fffff880`01600000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01084000 fffff880`01097000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    

     

Share This Page

Loading...