spoonracer
New Member
- Joined
- Sep 22, 2010
- Messages
- 48
Are you sure the good stick is in place?
(St:nt!MmAccessFault+0x877)
Uninstall:
sptd.sys Sun Oct 11 23:54:02 2009
Uninstall this, Daemon/Alcohol/Duplex Secure
These drivers are good enough for Windows XP, but I would try to update them:
rt2870.sys Wed Oct 29 08:34:39 2008
Ralink 802.11 USB Wireless Adapter
BS_I2cIo.sys Mon Jun 16 04:02:32 2008
BIOSTAR I2C I/O
Test the hard disk too:
chkdsk /r
S.M.A.R.T. HDDScan
--------------------------------------------------------------------------------
Yes, I'm sure it was just the error-free RAM stick in place.
I used Link Removed to uninstall sptd.sys
I uninstalled Daemon Tools
I believe I updated the USB adaptor driver
I couldn't find an update for BS_I2cIo.sys
I went through chkdsk /r
I ran HDDScan and hit the S.M.A.R.T button and got one error it looks like. It is attached.
should I run anything else from HDDScan?
I will report back in the morning about whether I'm still getting BSOD's after cold start.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Oct 13 16:53:34.734 2010 (GMT-5)
System Uptime: 0 days 0:00:21.734
Loading Kernel Symbols
...............................................................
...........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 8054b10d, af20c80c, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+107 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8054b10d, The address that the exception occurred at
Arg3: af20c80c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExDeferredFreePool+107
8054b10d 893b mov dword ptr [ebx],edi
TRAP_FRAME: af20c80c -- (.trap 0xffffffffaf20c80c)
ErrCode = 00000002
eax=e1690c38 ebx=00000000 ecx=000001ff edx=e1690c38 esi=89e69078 edi=00000000
eip=8054b10d esp=af20c880 ebp=af20c8c0 iopl=0 nv up ei ng nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010297
nt!ExDeferredFreePool+0x107:
8054b10d 893b mov dword ptr [ebx],edi ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from 8054b75f to 8054b10d
STACK_TEXT:
af20c8c0 8054b75f 00000001 89e32510 89b893d8 nt!ExDeferredFreePool+0x107
af20c900 805bfea6 e2222c20 00000000 af20c93c nt!ExFreePoolWithTag+0x47f
af20c910 805c021e e2222c20 af20c901 00000000 nt!ObReleaseObjectSecurity+0x1a
af20c93c 8062e967 e20fc170 89b893d8 00000001 nt!ObCheckObjectAccess+0xd6
af20c988 8062f608 e1769008 00000410 00000000 nt!CmpDoOpen+0x2d5
af20cb88 805bf011 00000410 00000000 89b893d8 nt!CmpParseKey+0x5a6
af20cc00 805bb9c0 000002d4 af20cc40 00000040 nt!ObpLookupObjectName+0x119
af20cc54 80624d6e 00000000 89e324d0 00fe0001 nt!ObOpenObjectByName+0xea
af20cd50 8054164c 000a4c00 00020019 0174fa08 nt!NtOpenKey+0x1c8
af20cd50 7c90e514 000a4c00 00020019 0174fa08 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0174fa48 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+107
8054b10d 893b mov dword ptr [ebx],edi
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+107
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: 0x8E_nt!ExDeferredFreePool+107
BUCKET_ID: 0x8E_nt!ExDeferredFreePool+107
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Oct 13 16:59:32.671 2010 (GMT-5)
System Uptime: 0 days 0:05:29.294
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {7, 57241, 57f38, 0}
Probably caused by : memory_corruption ( nt!MiDeferredUnlockPages+17c )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000007, A driver has unlocked a page more times than it locked it
Arg2: 00057241, page frame number
Arg3: 00057f38, current share count
Arg4: 00000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: wuauclt.exe
LAST_CONTROL_TRANSFER: from 80522d33 to 804f9f43
STACK_TEXT:
af3d2b08 80522d33 0000004e 00000007 00057241 nt!KeBugCheckEx+0x1b
af3d2b28 805067be af3d2c0c af3d2c0c 0000000f nt!MiDecrementReferenceCount+0x33
af3d2b6c 805096d5 8055c588 08548020 ae710020 nt!MiDeferredUnlockPages+0x17c
af3d2b9c 805b3f27 af3d2bb4 af3d2d00 0001258d nt!MmUnlockPages+0x201
af3d2c70 805b4233 895dd9e0 03b90020 898f8348 nt!MiDoMappedCopy+0x175
af3d2ca0 805a5dee 898f83c8 03b90020 898f8348 nt!MmCopyVirtualMemory+0x63
af3d2d20 805a5e78 00000001 00000218 000c5ed0 nt!LpcpCopyRequestData+0x1fc
af3d2d44 8054164c 00000218 000c5ed0 00000000 nt!NtWriteRequestData+0x1e
af3d2d44 7c90e514 00000218 000c5ed0 00000000 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
011ffe28 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeferredUnlockPages+17c
805067be 8b55e0 mov edx,dword ptr [ebp-20h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!MiDeferredUnlockPages+17c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_7_nt!MiDeferredUnlockPages+17c
BUCKET_ID: 0x4E_7_nt!MiDeferredUnlockPages+17c
Followup: MachineOwner
804d7000 806e4000 nt ntkrpamp.exe Tue Apr 27 16:04:40 2010 (4BD6E0E8)
806e4000 80704d00 hal halmacpi.dll Sun Apr 13 21:31:27 2008 (4802517F)
ae6b1000 ae6f1e00 HTTP HTTP.sys Tue Oct 20 19:20:15 2009 (4ADDE33F)
aee4a000 aeea0800 srv srv.sys Mon Jun 21 18:27:09 2010 (4C1F84CD)
aeec9000 aeedd480 wdmaud wdmaud.sys Sun Apr 13 22:17:18 2008 (48025C3E)
aefce000 aeffa180 mrxdav mrxdav.sys Sun Apr 13 21:32:42 2008 (480251CA)
af28b000 af299d80 sysaudio sysaudio.sys Sun Apr 13 22:15:55 2008 (48025BEB)
af32b000 af32e900 ndisuio ndisuio.sys Sun Apr 13 21:55:57 2008 (4802573D)
af633000 af64a900 dump_atapi dump_atapi.sys Sun Apr 13 21:40:29 2008 (4802539D)
af673000 af723f00 rt2870 rt2870.sys Mon Aug 03 05:57:37 2009 (4A765221)
af74c000 af7bb400 mrxsmb mrxsmb.sys Wed Feb 24 15:11:05 2010 (4B852569)
af7bc000 af7e6e80 rdbss rdbss.sys Sun Apr 13 22:28:38 2008 (48025EE6)
af7e7000 af808d00 afd afd.sys Thu Aug 14 13:04:35 2008 (48A40333)
af809000 af82e500 ipnat ipnat.sys Sun Apr 13 21:57:10 2008 (48025786)
af82f000 af856c00 netbt netbt.sys Sun Apr 13 22:20:59 2008 (48025D1B)
af857000 af8af480 tcpip tcpip.sys Fri Jun 20 14:51:09 2008 (485B99AD)
af8b0000 af8c2600 ipsec ipsec.sys Sun Apr 13 22:19:42 2008 (48025CCE)
af8e3000 af906000 MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
af93a000 af93cf80 mouhid mouhid.sys Fri Aug 17 23:47:57 2001 (3B7D82FD)
af93e000 af941900 kbdhid kbdhid.sys Sun Apr 13 21:39:47 2008 (48025373)
af952000 af954880 hidusb hidusb.sys Sun Apr 13 21:45:27 2008 (480254C7)
af956000 af979a80 portcls portcls.sys Sun Apr 13 22:19:40 2008 (48025CCC)
af97a000 aff79000 RtkHDAud RtkHDAud.sys Fri Apr 30 11:56:08 2010 (4BDA9B28)
aff8d000 aff90580 BIOS BIOS.sys Wed Mar 16 08:23:52 2005 (4237D0F8)
b2e09000 b2e0b280 rasacd rasacd.sys Fri Aug 17 23:55:39 2001 (3B7D84CB)
b2e40000 b2e9df00 update update.sys Sun Apr 13 21:39:46 2008 (48025372)
b2e9e000 b2ecde80 rdpdr rdpdr.sys Sun Apr 13 21:32:50 2008 (480251D2)
b2ece000 b2edee00 psched psched.sys Sun Apr 13 21:56:36 2008 (48025764)
b2edf000 b2ef5580 ndiswan ndiswan.sys Sun Apr 13 22:20:41 2008 (48025D09)
b2ef6000 b2f09900 parport parport.sys Sun Apr 13 21:40:09 2008 (48025389)
b2f0a000 b2f32000 HDAudBus HDAudBus.sys Thu May 26 18:46:29 2005 (4295EF55)
b2f32000 b2f55200 USBPORT USBPORT.SYS Sun Apr 13 21:45:34 2008 (480254CE)
b2f56000 b2f78700 ks ks.sys Sun Apr 13 22:16:34 2008 (48025C12)
b2f79000 b2f8cf00 VIDEOPRT VIDEOPRT.SYS Sun Apr 13 21:44:39 2008 (48025497)
b2f8d000 b39a9e60 nv4_mini nv4_mini.sys Sat Jul 10 00:19:49 2010 (4C379275)
b7daa000 b7dadc80 mssmbios mssmbios.sys Sun Apr 13 21:36:45 2008 (480252BD)
b7dc6000 b7dc8780 ndistapi ndistapi.sys Sun Apr 13 21:57:27 2008 (48025797)
b7dca000 b7dcc280 wmiacpi wmiacpi.sys Sun Apr 13 21:36:37 2008 (480252B5)
b7dee000 b7e07b80 Mup Mup.sys Sun Apr 13 22:17:05 2008 (48025C31)
b7e08000 b7e34980 NDIS NDIS.sys Sun Apr 13 22:20:35 2008 (48025D03)
b7e35000 b7ec1600 Ntfs Ntfs.sys Sun Apr 13 22:15:49 2008 (48025BE5)
b7ec2000 b7ed8b00 KSecDD KSecDD.sys Wed Jun 24 14:18:40 2009 (4A420B90)
b7ed9000 b7eeaf00 sr sr.sys Sun Apr 13 21:36:50 2008 (480252C2)
b7eeb000 b7f0ab00 fltMgr fltMgr.sys Sun Apr 13 21:32:58 2008 (480251DA)
b7f0b000 b7f22900 atapi atapi.sys Sun Apr 13 21:40:29 2008 (4802539D)
b7f23000 b7f48700 dmio dmio.sys Sun Apr 13 21:44:45 2008 (4802549D)
b7f49000 b7f67880 ftdisk ftdisk.sys Fri Aug 17 23:52:41 2001 (3B7D8419)
b7f68000 b7f78a80 pci pci.sys Sun Apr 13 21:36:43 2008 (480252BB)
b7f79000 b7fa6d80 ACPI ACPI.sys Sun Apr 13 21:36:33 2008 (480252B1)
b80a8000 b80b1180 isapnp isapnp.sys Sun Apr 13 21:36:40 2008 (480252B8)
b80b8000 b80c2580 MountMgr MountMgr.sys Sun Apr 13 21:39:45 2008 (48025371)
b80c8000 b80d4c80 VolSnap VolSnap.sys Sun Apr 13 21:41:00 2008 (480253BC)
b80d8000 b80e0e00 disk disk.sys Sun Apr 13 21:40:46 2008 (480253AE)
b80e8000 b80f4180 CLASSPNP CLASSPNP.SYS Sun Apr 13 22:16:21 2008 (48025C05)
b8138000 b8146b00 drmk drmk.sys Sun Apr 13 21:45:12 2008 (480254B8)
b8158000 b8160700 wanarp wanarp.sys Sun Apr 13 21:57:20 2008 (48025790)
b8168000 b8170780 netbios netbios.sys Sun Apr 13 21:56:01 2008 (48025741)
b8188000 b8192e00 Fips Fips.SYS Sun Apr 13 21:33:27 2008 (480251F7)
b81a8000 b81b1000 HIDCLASS HIDCLASS.SYS Sun Apr 13 21:45:25 2008 (480254C5)
b81b8000 b81c7900 Cdfs Cdfs.SYS Sun Apr 13 22:14:21 2008 (48025B8D)
b8268000 b8270c00 processr processr.sys Sun Apr 13 21:31:29 2008 (48025181)
b8278000 b8282480 imapi imapi.sys Sun Apr 13 21:40:57 2008 (480253B9)
b8288000 b8297600 cdrom cdrom.sys Sun Apr 13 21:40:45 2008 (480253AD)
b8298000 b82a6100 redbook redbook.sys Sun Apr 13 21:40:27 2008 (4802539B)
b82a8000 b82b7c00 serial serial.sys Sun Apr 13 22:15:44 2008 (48025BE0)
b82b8000 b82c4880 rasl2tp rasl2tp.sys Sun Apr 13 22:19:43 2008 (48025CCF)
b82c8000 b82d2200 raspppoe raspppoe.sys Sun Apr 13 21:57:31 2008 (4802579B)
b82d8000 b82e3d00 raspptp raspptp.sys Sun Apr 13 22:19:47 2008 (48025CD3)
b82e8000 b82f0900 msgpc msgpc.sys Sun Apr 13 21:56:32 2008 (48025760)
b82f8000 b8301f00 termdd termdd.sys Sun Apr 13 21:38:36 2008 (4802532C)
b8308000 b8316880 usbhub usbhub.sys Sun Apr 13 21:45:36 2008 (480254D0)
b8318000 b8321e80 NDProxy NDProxy.SYS Sun Apr 13 21:57:28 2008 (48025798)
b8328000 b832e180 PCIIDEX PCIIDEX.SYS Sun Apr 13 21:40:29 2008 (4802539D)
b8330000 b8334d00 PartMgr PartMgr.sys Sun Apr 13 21:40:48 2008 (480253B0)
b83e0000 b83e4300 usbohci usbohci.sys Sun Apr 13 21:45:34 2008 (480254CE)
b83e8000 b83edc80 usbfilter usbfilter.sys Tue Dec 22 10:26:07 2009 (4B30829F)
b83f0000 b83f7600 usbehci usbehci.sys Sun Apr 13 21:45:34 2008 (480254CE)
b83f8000 b83fca80 TDI TDI.SYS Sun Apr 13 22:00:04 2008 (48025834)
b8400000 b8404580 ptilink ptilink.sys Fri Aug 17 23:49:53 2001 (3B7D8371)
b8408000 b840c080 raspti raspti.sys Fri Aug 17 23:55:32 2001 (3B7D84C4)
b8410000 b8416000 kbdclass kbdclass.sys Sun Apr 13 21:39:46 2008 (48025372)
b8418000 b841da00 mouclass mouclass.sys Sun Apr 13 21:39:47 2008 (48025373)
b8440000 b8447d80 usbccgp usbccgp.sys Sun Apr 13 21:45:38 2008 (480254D2)
b8450000 b8456180 HIDPARSE HIDPARSE.SYS Sun Apr 13 21:45:22 2008 (480254C2)
b8458000 b845d200 vga vga.sys Sun Apr 13 21:44:40 2008 (48025498)
b8460000 b8464a80 Msfs Msfs.SYS Sun Apr 13 21:32:38 2008 (480251C6)
b8468000 b846f880 Npfs Npfs.SYS Sun Apr 13 21:32:38 2008 (480251C6)
b8470000 b8474280 BS_I2cIo BS_I2cIo.sys Mon Jun 16 04:02:32 2008 (4855BBA8)
b8478000 b847c500 watchdog watchdog.sys Sun Apr 13 21:44:59 2008 (480254AB)
b8498000 b849c880 pnarp pnarp.sys Tue Oct 28 07:57:27 2008 (4906A9C7)
b84a0000 b84a4d80 purendis purendis.sys Tue Oct 28 06:31:49 2008 (490695B5)
b84b8000 b84bb000 BOOTVID BOOTVID.dll Fri Aug 17 23:49:09 2001 (3B7D8345)
b859c000 b859e900 Dxapi Dxapi.sys Fri Aug 17 23:53:19 2001 (3B7D843F)
b85a4000 b85a7d80 serenum serenum.sys Sun Apr 13 21:40:12 2008 (4802538C)
b85a8000 b85a9b80 kdcom kdcom.dll Fri Aug 17 23:49:10 2001 (3B7D8346)
b85aa000 b85ab100 WMILIB WMILIB.SYS Sat Aug 18 00:07:23 2001 (3B7D878B)
b85ac000 b85ad700 dmload dmload.sys Fri Aug 17 23:58:15 2001 (3B7D8567)
b85ee000 b85ef100 swenum swenum.sys Sun Apr 13 21:39:52 2008 (48025378)
b85f2000 b85f3280 USBD USBD.SYS Sat Aug 18 00:02:58 2001 (3B7D8682)
b8600000 b8601f00 Fs_Rec Fs_Rec.SYS Fri Aug 17 23:49:37 2001 (3B7D8361)
b8602000 b8603080 Beep Beep.SYS Fri Aug 17 23:47:33 2001 (3B7D82E5)
b8604000 b8605080 mnmdd mnmdd.SYS Fri Aug 17 23:57:28 2001 (3B7D8538)
b8606000 b8607080 RDPCDD RDPCDD.sys Fri Aug 17 23:46:56 2001 (3B7D82C0)
b8608000 b8609100 dump_WMILIB dump_WMILIB.SYS Sat Aug 18 00:07:23 2001 (3B7D878B)
b862e000 b862fa80 ParVdm ParVdm.SYS Fri Aug 17 23:49:49 2001 (3B7D836D)
b8670000 b8670d00 pciide pciide.sys Fri Aug 17 23:51:49 2001 (3B7D83E5)
b869c000 b869cc00 audstub audstub.sys Fri Aug 17 23:59:40 2001 (3B7D85BC)
b86d6000 b86d6b80 Null Null.SYS Fri Aug 17 23:47:39 2001 (3B7D82EB)
b8721000 b8721d00 dxgthk dxgthk.sys Fri Aug 17 23:53:12 2001 (3B7D8438)
bd000000 bd011600 dxg dxg.sys Sun Apr 13 21:38:27 2008 (48025323)
bd012000 bd61e980 nv4_disp nv4_disp.dll Sat Jul 10 00:18:40 2010 (4C379230)
bf800000 bf9c4200 win32k win32k.sys Wed Jun 23 16:43:54 2010 (4C220F9A)
bffa0000 bffe5c00 ATMFD ATMFD.DLL Tue Apr 20 08:30:07 2010 (4BCD3BDF)
Unloaded modules:
ad99e000 ad9c9000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ad99e000 ad9c9000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
aed0c000 aed37000 kmixer.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
aee27000 aee4a000 aec.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b876e000 b876f000 drmkaud.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
af063000 af070000 DMusic.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
af073000 af081000 swmidi.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b863e000 b8640000 splitter.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b8178000 b8184000 SysTool.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b2e0d000 b2e11000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b8148000 b8155000 i8042prt.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8448000 b844d000 Cdaudio.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b2e1d000 b2e20000 Sfloppy.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8428000 b842d000 Flpydisk.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8420000 b8427000 Fdc.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
I ran chkdsk /r
I checked the hard drive connection and even changed the cable
But I ran defrag about 5 days ago and I ran memtest about 2 days ago with each stick overnight like you previously suggested and reported that previously.
Do I really need to do that again?
Use !analyze -v to get detailed debugging information.
BugCheck 10000050, {ffffffff, 1, cbcbcc50, 0}
Could not read faulting driver name
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
Probably caused by : nv4_mini.sys ( nv4_mini+8cf2b )
Followup: MachineOwner
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {0, 2, 1, b7f41962}
Probably caused by : dmio.sys ( dmio!dmdbg+2 )
Followup: MachineOwner
---------
1: kd> lmvm dmio
start end module name
b7f23000 b7f48700 dmio (pdb symbols) c:\symcache\dmio.pdb\7DD31474CC0941E9B2175DDBC956E4601\dmio.pdb
Loaded symbol image file: dmio.sys
Mapped memory image file: c:\symcache\dmio.sys\4802549D25700\dmio.sys
Image path: dmio.sys
Image name: dmio.sys
Timestamp: Sun Apr 13 14:44:45 2008 (4802549D)
CheckSum: 00034FCE
ImageSize: 00025700
File version: 2600.5512.503.0
Product version: 1.0.0.0
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04e4
CompanyName: Microsoft Corp., Veritas Software
ProductName: VERITAS® NT Disk Manager
InternalName: dmio.sys
OriginalFilename: dmio.sys
ProductVersion: 1.0
FileVersion: 2600.5512.503.0
FileDescription: NT Disk Manager I/O Driver
LegalCopyright: Copyright © 1985-2000 Microsoft Corporation. All rights reserved.
Portions Copyright © 1997-2000 Veritas Software. All rights reserved.
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {0, 2, 1, b7f41962}
Probably caused by : dmio.sys ( dmio!dmdbg+2 )
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 14 07:25:40.812 2010 (GMT-5)
System Uptime: 0 days 0:00:21.799
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 5ad67, 1, 0}
Probably caused by : memory_corruption ( nt!MiDecrementShareCount+3a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 0005ad67, page frame number
Arg3: 00000001, current page state
Arg4: 00000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: MsMpEng.exe
LAST_CONTROL_TRANSFER: from 80522dfc to 804f9f43
STACK_TEXT:
af324794 80522dfc 0000004e 00000099 0005ad67 nt!KeBugCheckEx+0x1b
af3247c4 8051a59d c0039338 c0039340 89605820 nt!MiDecrementShareCount+0x3a
af324860 8051aa4e af3249ac 00000067 89605820 nt!MiProcessValidPteList+0x9b
af324ca4 805b34e6 07268000 c0039338 89605820 nt!MiDecommitPages+0x3f0
af324d4c 8054164c ffffffff 00adf874 00adf878 nt!NtFreeVirtualMemory+0x588
af324d4c 7c90e514 ffffffff 00adf874 00adf878 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00adf820 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDecrementShareCount+3a
80522dfc ff4e08 dec dword ptr [esi+8]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDecrementShareCount+3a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 14 07:26:26.031 2010 (GMT-5)
System Uptime: 0 days 0:00:22.650
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
Unable to load image HTTP.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for HTTP.sys
*** ERROR: Module load completed but symbols could not be loaded for HTTP.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 2e73a392, b8513a9c, b8513798}
Probably caused by : HTTP.sys ( HTTP+2b6b2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 2e73a392, The address that the exception occurred at
Arg3: b8513a9c, Exception Record Address
Arg4: b8513798, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+16
2e73a392 ?? ???
EXCEPTION_RECORD: b8513a9c -- (.exr 0xffffffffb8513a9c)
ExceptionAddress: 2e73a392
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 2e73a392
Attempt to execute non-executable address 2e73a392
CONTEXT: b8513798 -- (.cxr 0xffffffffb8513798)
eax=ae74cd53 ebx=00000003 ecx=0000000d edx=00000031 esi=8053058a edi=00000000
eip=2e73a392 esp=b8513b64 ebp=b8513ba8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
2e73a392 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 10
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: 2e73a392
WRITE_ADDRESS: 2e73a392
FOLLOWUP_IP:
HTTP+2b6b2
ae7596b2 ?? ???
FAILED_INSTRUCTION_ADDRESS:
+2b6b2
2e73a392 ?? ???
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from ae7596b2 to 2e73a392
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
b8513b60 ae7596b2 ae74cd53 0000000d 00000000 0x2e73a392
b8513ba8 ae73a986 00000001 f6fd49b4 01cb6b57 HTTP+0x2b6b2
b8513be0 ae73a9d0 ae768ccb 89b61348 e187319a HTTP+0xc986
b8513c84 80581377 89b61348 89007000 00000000 HTTP+0xc9d0
b8513d54 80581487 80000cf4 00000001 00000000 nt!IopLoadDriver+0x66d
b8513d7c 8053879d 80000cf4 00000000 89e3e3c8 nt!IopLoadUnloadDriver+0x45
b8513dac 805cff62 aef36cf4 00000000 00000000 nt!ExpWorkerThread+0xef
b8513ddc 8054612e 805386ae 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: HTTP+2b6b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HTTP
IMAGE_NAME: HTTP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4adde33f
STACK_COMMAND: .cxr 0xffffffffb8513798 ; kb
FAILURE_BUCKET_ID: 0x7E_BAD_IP_HTTP+2b6b2
BUCKET_ID: 0x7E_BAD_IP_HTTP+2b6b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-11.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 14 07:27:11.671 2010 (GMT-5)
System Uptime: 0 days 0:00:23.670
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 59ad1, 1, 0}
Probably caused by : memory_corruption ( nt!MiDecrementShareCount+3a )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00059ad1, page frame number
Arg3: 00000001, current page state
Arg4: 00000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 11
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: MsMpEng.exe
LAST_CONTROL_TRANSFER: from 80522dfc to 804f9f43
STACK_TEXT:
af31f794 80522dfc 0000004e 00000099 00059ad1 nt!KeBugCheckEx+0x1b
af31f7c4 8051a59d c002a5b0 c002a5b8 89bcaa80 nt!MiDecrementShareCount+0x3a
af31f860 8051aa4e af31f8d0 00000077 89bcaa80 nt!MiProcessValidPteList+0x9b
af31fca4 805b34e6 054b7000 c002a5b0 89bcaa80 nt!MiDecommitPages+0x3f0
af31fd4c 8054164c ffffffff 00adf8bc 00adf8c0 nt!NtFreeVirtualMemory+0x588
af31fd4c 7c90e514 ffffffff 00adf8bc 00adf8c0 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00adf868 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDecrementShareCount+3a
80522dfc ff4e08 dec dword ptr [esi+8]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDecrementShareCount+3a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
Followup: MachineOwner
804d7000 806e4000 nt ntkrpamp.exe Tue Apr 27 16:04:40 2010 (4BD6E0E8)
806e4000 80704d00 hal halmacpi.dll Sun Apr 13 21:31:27 2008 (4802517F)
ae72e000 ae76ee00 HTTP HTTP.sys Tue Oct 20 19:20:15 2009 (4ADDE33F)
aeb09000 aeb33180 kmixer kmixer.sys Sun Apr 13 21:45:07 2008 (480254B3)
aeb34000 aeb56d00 aec aec.sys Thu May 24 22:53:32 2007 (4655ED3C)
aeb57000 aeb6b480 wdmaud wdmaud.sys Sun Apr 13 22:17:18 2008 (48025C3E)
aeddc000 aede8e80 DMusic DMusic.sys Sun Apr 13 21:45:00 2008 (480254AC)
aee3c000 aee92800 srv srv.sys Mon Jun 21 18:27:09 2010 (4C1F84CD)
aefab000 aefd7180 mrxdav mrxdav.sys Sun Apr 13 21:32:42 2008 (480251CA)
af330000 af333900 ndisuio ndisuio.sys Sun Apr 13 21:55:57 2008 (4802573D)
af638000 af64f900 dump_atapi dump_atapi.sys Sun Apr 13 21:40:29 2008 (4802539D)
af678000 af728f00 rt2870 rt2870.sys Mon Aug 03 05:57:37 2009 (4A765221)
af751000 af7c0400 mrxsmb mrxsmb.sys Wed Feb 24 15:11:05 2010 (4B852569)
af7c1000 af7ebe80 rdbss rdbss.sys Sun Apr 13 22:28:38 2008 (48025EE6)
af7ec000 af80dd00 afd afd.sys Thu Aug 14 13:04:35 2008 (48A40333)
af80e000 af833500 ipnat ipnat.sys Sun Apr 13 21:57:10 2008 (48025786)
af834000 af85bc00 netbt netbt.sys Sun Apr 13 22:20:59 2008 (48025D1B)
af85c000 af8b4480 tcpip tcpip.sys Fri Jun 20 14:51:09 2008 (485B99AD)
af8b5000 af8c7600 ipsec ipsec.sys Sun Apr 13 22:19:42 2008 (48025CCE)
af8e8000 af90b000 MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
af92f000 af931900 Dxapi Dxapi.sys Fri Aug 17 23:53:19 2001 (3B7D843F)
af93f000 af941f80 mouhid mouhid.sys Fri Aug 17 23:47:57 2001 (3B7D82FD)
af943000 af946900 kbdhid kbdhid.sys Sun Apr 13 21:39:47 2008 (48025373)
af957000 af959880 hidusb hidusb.sys Sun Apr 13 21:45:27 2008 (480254C7)
af95b000 af97ea80 portcls portcls.sys Sun Apr 13 22:19:40 2008 (48025CCC)
af97f000 aff7e000 RtkHDAud RtkHDAud.sys Fri Apr 30 11:56:08 2010 (4BDA9B28)
aff96000 aff99580 BIOS BIOS.sys Wed Mar 16 08:23:52 2005 (4237D0F8)
b2e12000 b2e14280 rasacd rasacd.sys Fri Aug 17 23:55:39 2001 (3B7D84CB)
b2e45000 b2ea2f00 update update.sys Sun Apr 13 21:39:46 2008 (48025372)
b2ea3000 b2ed2e80 rdpdr rdpdr.sys Sun Apr 13 21:32:50 2008 (480251D2)
b2ed3000 b2ee3e00 psched psched.sys Sun Apr 13 21:56:36 2008 (48025764)
b2ee4000 b2efa580 ndiswan ndiswan.sys Sun Apr 13 22:20:41 2008 (48025D09)
b2efb000 b2f0e900 parport parport.sys Sun Apr 13 21:40:09 2008 (48025389)
b2f0f000 b2f37000 HDAudBus HDAudBus.sys Thu May 26 18:46:29 2005 (4295EF55)
b2f37000 b2f5a200 USBPORT USBPORT.SYS Sun Apr 13 21:45:34 2008 (480254CE)
b2f5b000 b2f7d700 ks ks.sys Sun Apr 13 22:16:34 2008 (48025C12)
b2f7e000 b2f91f00 VIDEOPRT VIDEOPRT.SYS Sun Apr 13 21:44:39 2008 (48025497)
b2f92000 b39aee60 nv4_mini nv4_mini.sys Sat Jul 10 00:19:49 2010 (4C379275)
b7dee000 b7e07b80 Mup Mup.sys Sun Apr 13 22:17:05 2008 (48025C31)
b7e08000 b7e34980 NDIS NDIS.sys Sun Apr 13 22:20:35 2008 (48025D03)
b7e35000 b7ec1600 Ntfs Ntfs.sys Sun Apr 13 22:15:49 2008 (48025BE5)
b7ec2000 b7ed8b00 KSecDD KSecDD.sys Wed Jun 24 14:18:40 2009 (4A420B90)
b7ed9000 b7eeaf00 sr sr.sys Sun Apr 13 21:36:50 2008 (480252C2)
b7eeb000 b7f0ab00 fltMgr fltMgr.sys Sun Apr 13 21:32:58 2008 (480251DA)
b7f0b000 b7f22900 atapi atapi.sys Sun Apr 13 21:40:29 2008 (4802539D)
b7f23000 b7f48700 dmio dmio.sys Sun Apr 13 21:44:45 2008 (4802549D)
b7f49000 b7f67880 ftdisk ftdisk.sys Fri Aug 17 23:52:41 2001 (3B7D8419)
b7f68000 b7f78a80 pci pci.sys Sun Apr 13 21:36:43 2008 (480252BB)
b7f79000 b7fa6d80 ACPI ACPI.sys Sun Apr 13 21:36:33 2008 (480252B1)
b80a8000 b80b1180 isapnp isapnp.sys Sun Apr 13 21:36:40 2008 (480252B8)
b80b8000 b80c2580 MountMgr MountMgr.sys Sun Apr 13 21:39:45 2008 (48025371)
b80c8000 b80d4c80 VolSnap VolSnap.sys Sun Apr 13 21:41:00 2008 (480253BC)
b80d8000 b80e0e00 disk disk.sys Sun Apr 13 21:40:46 2008 (480253AE)
b80e8000 b80f4180 CLASSPNP CLASSPNP.SYS Sun Apr 13 22:16:21 2008 (48025C05)
b8128000 b8130700 wanarp wanarp.sys Sun Apr 13 21:57:20 2008 (48025790)
b8138000 b8140780 netbios netbios.sys Sun Apr 13 21:56:01 2008 (48025741)
b8148000 b8156d80 sysaudio sysaudio.sys Sun Apr 13 22:15:55 2008 (48025BEB)
b8158000 b8162e00 Fips Fips.SYS Sun Apr 13 21:33:27 2008 (480251F7)
b8178000 b8187900 Cdfs Cdfs.SYS Sun Apr 13 22:14:21 2008 (48025B8D)
b8188000 b8191000 HIDCLASS HIDCLASS.SYS Sun Apr 13 21:45:25 2008 (480254C5)
b81a8000 b81b5d00 swmidi swmidi.sys Sun Apr 13 21:45:07 2008 (480254B3)
b8238000 b8240c00 processr processr.sys Sun Apr 13 21:31:29 2008 (48025181)
b8248000 b8252480 imapi imapi.sys Sun Apr 13 21:40:57 2008 (480253B9)
b8258000 b8267600 cdrom cdrom.sys Sun Apr 13 21:40:45 2008 (480253AD)
b8268000 b8276100 redbook redbook.sys Sun Apr 13 21:40:27 2008 (4802539B)
b8278000 b8287c00 serial serial.sys Sun Apr 13 22:15:44 2008 (48025BE0)
b8288000 b8294880 rasl2tp rasl2tp.sys Sun Apr 13 22:19:43 2008 (48025CCF)
b8298000 b82a2200 raspppoe raspppoe.sys Sun Apr 13 21:57:31 2008 (4802579B)
b82a8000 b82b3d00 raspptp raspptp.sys Sun Apr 13 22:19:47 2008 (48025CD3)
b82b8000 b82c0900 msgpc msgpc.sys Sun Apr 13 21:56:32 2008 (48025760)
b82c8000 b82d1f00 termdd termdd.sys Sun Apr 13 21:38:36 2008 (4802532C)
b82d8000 b82e6880 usbhub usbhub.sys Sun Apr 13 21:45:36 2008 (480254D0)
b82e8000 b82f1e80 NDProxy NDProxy.SYS Sun Apr 13 21:57:28 2008 (48025798)
b8308000 b8316b00 drmk drmk.sys Sun Apr 13 21:45:12 2008 (480254B8)
b8328000 b832e180 PCIIDEX PCIIDEX.SYS Sun Apr 13 21:40:29 2008 (4802539D)
b8330000 b8334d00 PartMgr PartMgr.sys Sun Apr 13 21:40:48 2008 (480253B0)
b83c8000 b83cc300 usbohci usbohci.sys Sun Apr 13 21:45:34 2008 (480254CE)
b83d0000 b83d5c80 usbfilter usbfilter.sys Tue Dec 22 10:26:07 2009 (4B30829F)
b83d8000 b83df600 usbehci usbehci.sys Sun Apr 13 21:45:34 2008 (480254CE)
b83e0000 b83e4a80 TDI TDI.SYS Sun Apr 13 22:00:04 2008 (48025834)
b83e8000 b83ec580 ptilink ptilink.sys Fri Aug 17 23:49:53 2001 (3B7D8371)
b83f0000 b83f4080 raspti raspti.sys Fri Aug 17 23:55:32 2001 (3B7D84C4)
b83f8000 b83fe000 kbdclass kbdclass.sys Sun Apr 13 21:39:46 2008 (48025372)
b8400000 b8405a00 mouclass mouclass.sys Sun Apr 13 21:39:47 2008 (48025373)
b8438000 b843e180 HIDPARSE HIDPARSE.SYS Sun Apr 13 21:45:22 2008 (480254C2)
b8440000 b8445200 vga vga.sys Sun Apr 13 21:44:40 2008 (48025498)
b8448000 b844ca80 Msfs Msfs.SYS Sun Apr 13 21:32:38 2008 (480251C6)
b8450000 b8457880 Npfs Npfs.SYS Sun Apr 13 21:32:38 2008 (480251C6)
b8458000 b845c280 BS_I2cIo BS_I2cIo.sys Mon Jun 16 04:02:32 2008 (4855BBA8)
b8460000 b8467d80 usbccgp usbccgp.sys Sun Apr 13 21:45:38 2008 (480254D2)
b8468000 b846c500 watchdog watchdog.sys Sun Apr 13 21:44:59 2008 (480254AB)
b8478000 b847c880 pnarp pnarp.sys Tue Oct 28 07:57:27 2008 (4906A9C7)
b8480000 b8484d80 purendis purendis.sys Tue Oct 28 06:31:49 2008 (490695B5)
b84b8000 b84bb000 BOOTVID BOOTVID.dll Fri Aug 17 23:49:09 2001 (3B7D8345)
b857c000 b857fd80 serenum serenum.sys Sun Apr 13 21:40:12 2008 (4802538C)
b8580000 b8582280 wmiacpi wmiacpi.sys Sun Apr 13 21:36:37 2008 (480252B5)
b8584000 b8586780 ndistapi ndistapi.sys Sun Apr 13 21:57:27 2008 (48025797)
b85a0000 b85a3c80 mssmbios mssmbios.sys Sun Apr 13 21:36:45 2008 (480252BD)
b85a8000 b85a9b80 kdcom kdcom.dll Fri Aug 17 23:49:10 2001 (3B7D8346)
b85aa000 b85ab100 WMILIB WMILIB.SYS Sat Aug 18 00:07:23 2001 (3B7D878B)
b85ac000 b85ad700 dmload dmload.sys Fri Aug 17 23:58:15 2001 (3B7D8567)
b85c6000 b85c7100 swenum swenum.sys Sun Apr 13 21:39:52 2008 (48025378)
b85ca000 b85cb280 USBD USBD.SYS Sat Aug 18 00:02:58 2001 (3B7D8682)
b85de000 b85dff00 Fs_Rec Fs_Rec.SYS Fri Aug 17 23:49:37 2001 (3B7D8361)
b85e0000 b85e1080 Beep Beep.SYS Fri Aug 17 23:47:33 2001 (3B7D82E5)
b85e2000 b85e3080 mnmdd mnmdd.SYS Fri Aug 17 23:57:28 2001 (3B7D8538)
b85e4000 b85e5080 RDPCDD RDPCDD.sys Fri Aug 17 23:46:56 2001 (3B7D82C0)
b85e6000 b85e7100 dump_WMILIB dump_WMILIB.SYS Sat Aug 18 00:07:23 2001 (3B7D878B)
b860e000 b860fa80 ParVdm ParVdm.SYS Fri Aug 17 23:49:49 2001 (3B7D836D)
b865e000 b865f880 splitter splitter.sys Sun Apr 13 21:45:07 2008 (480254B3)
b8670000 b8670d00 pciide pciide.sys Fri Aug 17 23:51:49 2001 (3B7D83E5)
b8697000 b8697b80 Null Null.SYS Fri Aug 17 23:47:39 2001 (3B7D82EB)
b8719000 b8719b80 drmkaud drmkaud.sys Sun Apr 13 21:45:13 2008 (480254B9)
b873e000 b873ed00 dxgthk dxgthk.sys Fri Aug 17 23:53:12 2001 (3B7D8438)
b87d1000 b87d1c00 audstub audstub.sys Fri Aug 17 23:59:40 2001 (3B7D85BC)
bd000000 bd011600 dxg dxg.sys Sun Apr 13 21:38:27 2008 (48025323)
bd012000 bd61e980 nv4_disp nv4_disp.dll Sat Jul 10 00:18:40 2010 (4C379230)
bf800000 bf9c4200 win32k win32k.sys Wed Jun 23 16:43:54 2010 (4C220F9A)
bffa0000 bffe5c00 ATMFD ATMFD.DLL Tue Apr 20 08:30:07 2010 (4BCD3BDF)
Unloaded modules:
b8148000 b8154000 SysTool.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b2e16000 b2e1a000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b8318000 b8325000 i8042prt.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8430000 b8435000 Cdaudio.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b2e26000 b2e29000 Sfloppy.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8418000 b841d000 Flpydisk.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8410000 b8417000 Fdc.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000