Windows 7 BSOD Help

Alinay Gomez

New Member
Joined
Mar 6, 2011
Hey guys, I have been getting a lot of BSODs lately, I think it might be related to Hard Drive problems because when I try to download things they come out corrupt. Here are some mini dumps if anyone would be kind enough to look through some so I can fix the issue as soon as possible, thanks a lot!

memory.png

View attachment Minidump.rar
 
You have some very old drivers that you should update or uninstall:


1. Analog Devices ADC Analyzer/SwiftForth/Disspy
giveio.sys Wed Apr 03 22:33:25 1996


2. AMD motherboard
AmdLLD.sys Fri Jun 29 15:47:32 2007


3. Eset
eamon.sys Fri Sep 11 01:12:15 2009


4. JMicron JMB36X RAID Driver
jraid.sys Thu Aug 13 04:10:15 2009


5. Realtek NDIS Protocol Driver
RtNdPt60.sys Sun Jul 19 22:26:38 2009


6. Power ISO
SCDEmu.SYS Sun Jul 26 22:43:19 2009






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030511-14664-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x83214000 PsLoadedModuleList = 0x8335c810
Debug session time: Sat Mar  5 10:26:48.174 2011 (UTC - 5:00)
System Uptime: 0 days 10:47:57.171
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 8344bcb1, a7be36dc, 0}

Probably caused by : ntkrpamp.exe ( nt!CmpRemoveFromDelayedClose+54 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8344bcb1, The address that the exception occurred at
Arg3: a7be36dc, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpRemoveFromDelayedClose+54
8344bcb1 890a            mov     dword ptr [edx],ecx

TRAP_FRAME:  a7be36dc -- (.trap 0xffffffffa7be36dc)
ErrCode = 00000002
eax=893894dc ebx=8337b0c0 ecx=bb8f7edc edx=2087a1bc esi=89389468 edi=86015d48
eip=8344bcb1 esp=a7be3750 ebp=a7be3760 iopl=0         nv up ei pl nz ac po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010212
nt!CmpRemoveFromDelayedClose+0x54:
8344bcb1 890a            mov     dword ptr [edx],ecx  ds:0023:2087a1bc=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 8348acdd to 8344bcb1

STACK_TEXT:  
a7be3760 8348acdd 0000fffe 89389468 a7be380c nt!CmpRemoveFromDelayedClose+0x54
a7be3770 834555ac a7be3a00 a7be3a28 00000000 nt!CmpReferenceKeyControlBlock+0x4a
a7be37b4 83468f15 a7be37f0 00000004 a7be3a28 nt!CmpKcbCacheLookup+0x5fa
a7be39a0 8344a901 a08824c8 a7be3a60 a7be39e4 nt!CmpBuildHashStackAndLookupCache+0x2e6
a7be3b48 8343521f a08824c8 859f5980 881d47c8 nt!CmpParseKey+0x36e
a7be3bc4 8345b28d 0000011e a7be3c18 00000040 nt!ObpLookupObjectName+0x4fa
a7be3c20 834529e4 039aec44 859f5980 00000001 nt!ObOpenObjectByName+0x159
a7be3d00 8344d737 039af19c 00000001 039aec44 nt!CmOpenKey+0x1f4
a7be3d1c 8325744a 039af19c 00000001 039aec44 nt!NtOpenKeyEx+0x18
a7be3d1c 777e64f4 039af19c 00000001 039aec44 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
039aee78 00000000 00000000 00000000 00000000 0x777e64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!CmpRemoveFromDelayedClose+54
8344bcb1 890a            mov     dword ptr [edx],ecx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpRemoveFromDelayedClose+54

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf

FAILURE_BUCKET_ID:  0x8E_nt!CmpRemoveFromDelayedClose+54

BUCKET_ID:  0x8E_nt!CmpRemoveFromDelayedClose+54

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030411-18080-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x83216000 PsLoadedModuleList = 0x8335e810
Debug session time: Fri Mar  4 21:39:16.146 2011 (UTC - 5:00)
System Uptime: 0 days 0:16:35.144
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 8341946b, 9db3bb94, 0}

Probably caused by : ntkrpamp.exe ( nt!HvpIsFreeNeighbor+49 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8341946b, The address that the exception occurred at
Arg3: 9db3bb94, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!HvpIsFreeNeighbor+49
8341946b 8b0e            mov     ecx,dword ptr [esi]

TRAP_FRAME:  9db3bb94 -- (.trap 0xffffffff9db3bb94)
ErrCode = 00000000
eax=a55c3ff8 ebx=00000000 ecx=255be4b8 edx=9db3bc2c esi=255be4b8 edi=a55ba000
eip=8341946b esp=9db3bc08 ebp=9db3bc10 iopl=0         nv up ei pl nz na pe cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010207
nt!HvpIsFreeNeighbor+0x49:
8341946b 8b0e            mov     ecx,dword ptr [esi]  ds:0023:255be4b8=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 834136db to 8341946b

STACK_TEXT:  
9db3bc10 834136db a55339d0 00000000 0005eff8 nt!HvpIsFreeNeighbor+0x49
9db3bc30 8341657b a55339d0 0005eff8 a55339d0 nt!HvFreeCell+0xde
9db3bc40 83410aa1 a55c020c 00000000 a1512aa8 nt!CmpFreeValue+0x3d
9db3bc60 83412d6b 0005b208 00000005 a13e5460 nt!CmpFreeKeyByCell+0x174
9db3bcc4 83413589 a13e5460 00000af4 043aeca4 nt!CmDeleteKey+0x86a
9db3bd28 8325944a 00000af4 043aecd4 77a164f4 nt!NtDeleteKey+0x332
9db3bd28 77a164f4 00000af4 043aecd4 77a164f4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
043aecd4 00000000 00000000 00000000 00000000 0x77a164f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!HvpIsFreeNeighbor+49
8341946b 8b0e            mov     ecx,dword ptr [esi]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!HvpIsFreeNeighbor+49

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf

FAILURE_BUCKET_ID:  0x8E_nt!HvpIsFreeNeighbor+49

BUCKET_ID:  0x8E_nt!HvpIsFreeNeighbor+49

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030611-19640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x83445000 PsLoadedModuleList = 0x8358d810
Debug session time: Sun Mar  6 12:50:26.011 2011 (UTC - 5:00)
System Uptime: 0 days 0:42:01.993
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 001904fb
Arg2: 8f657b68
Arg3: 8f657740
Arg4: 8baba51e

Debugging Details:
------------------


EXCEPTION_RECORD:  8f657b68 -- (.exr 0xffffffff8f657b68)
ExceptionAddress: 8baba51e (Ntfs!NtfsCommonClose+0x000004b5)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000001
   Parameter[1]: 0a75a57c
Attempt to write to address 0a75a57c

CONTEXT:  8f657740 -- (.cxr 0xffffffff8f657740)
eax=0a75a57c ebx=8a75a530 ecx=8a75a57c edx=00180041 esi=86564338 edi=8f657cd0
eip=8baba51e esp=8f657c30 ebp=8f657c6c iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
Ntfs!NtfsCommonClose+0x4b5:
8baba51e 8908            mov     dword ptr [eax],ecx  ds:0023:0a75a57c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  1

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  00000001

EXCEPTION_PARAMETER2:  0a75a57c

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 835ad718
Unable to read MiSystemVaType memory at 8358d160
 0a75a57c 

FOLLOWUP_IP: 
Ntfs!NtfsCommonClose+4b5
8baba51e 8908            mov     dword ptr [eax],ecx

FAULTING_IP: 
Ntfs!NtfsCommonClose+4b5
8baba51e 8908            mov     dword ptr [eax],ecx

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from 8bad94c3 to 8baba51e

STACK_TEXT:  
8f657c6c 8bad94c3 86564338 8a75a318 8a75a228 Ntfs!NtfsCommonClose+0x4b5
8f657d00 834b2f3b 00000000 00000000 864d5b40 Ntfs!NtfsFspClose+0x118
8f657d50 836536bb 80000000 a2e7c2b0 00000000 nt!ExpWorkerThread+0x10d
8f657d90 835050f9 834b2e2e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsCommonClose+4b5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45

STACK_COMMAND:  .cxr 0xffffffff8f657740 ; kb

FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsCommonClose+4b5

BUCKET_ID:  0x24_Ntfs!NtfsCommonClose+4b5

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030611-19531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x83407000 PsLoadedModuleList = 0x8354f810
Debug session time: Sun Mar  6 13:03:08.539 2011 (UTC - 5:00)
System Uptime: 0 days 0:12:12.146
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 836a1f51, 8db93bd0, 8db937b0}

Probably caused by : ntkrpamp.exe ( nt!CmpDelayCloseWorker+79 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 836a1f51, The address that the exception occurred at
Arg3: 8db93bd0, Exception Record Address
Arg4: 8db937b0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpDelayCloseWorker+79
836a1f51 c702a8e05683    mov     dword ptr [edx],offset nt!CmpDelayedLRUListHead (8356e0a8)

EXCEPTION_RECORD:  8db93bd0 -- (.exr 0xffffffff8db93bd0)
ExceptionAddress: 836a1f51 (nt!CmpDelayCloseWorker+0x00000079)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000001
   Parameter[1]: 36f43c5c
Attempt to write to address 36f43c5c

CONTEXT:  8db937b0 -- (.cxr 0xffffffff8db937b0)
eax=b6f43468 ebx=46188e4e ecx=8db93cd4 edx=36f43c5c esi=0000092e edi=8356e0c0
eip=836a1f51 esp=8db93c98 ebp=8db93d00 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!CmpDelayCloseWorker+0x79:
836a1f51 c702a8e05683    mov     dword ptr [edx],offset nt!CmpDelayedLRUListHead (8356e0a8) ds:0023:36f43c5c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  00000001

EXCEPTION_PARAMETER2:  36f43c5c

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8356f718
Unable to read MiSystemVaType memory at 8354f160
 36f43c5c 

FOLLOWUP_IP: 
nt!CmpDelayCloseWorker+79
836a1f51 c702a8e05683    mov     dword ptr [edx],offset nt!CmpDelayedLRUListHead (8356e0a8)

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from 83474f3b to 836a1f51

STACK_TEXT:  
8db93d00 83474f3b 00000000 00000000 85dd1a70 nt!CmpDelayCloseWorker+0x79
8db93d50 836156bb 00000001 a02dbb88 00000000 nt!ExpWorkerThread+0x10d
8db93d90 834c70f9 83474e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpDelayCloseWorker+79

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf

STACK_COMMAND:  .cxr 0xffffffff8db937b0 ; kb

FAILURE_BUCKET_ID:  0x7E_nt!CmpDelayCloseWorker+79

BUCKET_ID:  0x7E_nt!CmpDelayCloseWorker+79

Followup: MachineOwner
---------




Drivers:

Code:
start    end        module name
92d8f000 92dbb000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8b89f000 8b8e7000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
91b12000 91b6c000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
929eb000 929fd000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
9324c000 9325b000   AmdLLD   AmdLLD.sys   Fri Jun 29 15:47:32 2007 (468561D4)
8b9f0000 8b9f9000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
8b9c4000 8b9cd000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b9cd000 8b9f0000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
9221f000 929a5000   atikmdag atikmdag.sys Wed Jan 26 17:42:31 2011 (4D40A357)
92159000 92198000   atikmpag atikmpag.sys Wed Jan 26 17:13:11 2011 (4D409C77)
9aed0000 9af1d000   ATMFD    ATMFD.DLL    unavailable (00000000)
929b2000 929bc000   aubridge aubridge.sys Wed Feb 15 09:41:21 2006 (43F33D91)
91a61000 91a68000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
92118000 92126000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
83ab6000 83abe000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9bcb7000 9bcd0000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
9aeb0000 9aece000   cdd      cdd.dll      unavailable (00000000)
83a00000 83a1f000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
83b00000 83bab000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8bbc9000 8bbee000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
83abe000 83b00000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8bc08000 8bc65000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
929a5000 929b2000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
9bd6c000 9bd6f180   cpuz132_x32 cpuz132_x32.sys Thu Mar 26 19:16:27 2009 (49CC0CCB)
995a6000 995b3000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
9209c000 92100000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
92100000 92118000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
92090000 9209c000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8be00000 8be11000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
92200000 92219000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
995be000 995c7000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
995b3000 995be000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
995c7000 995d8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
9950e000 99518000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
92c11000 92cc8000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
92cc8000 92d01000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
8303a000 83106000   eamon    eamon.sys    Fri Sep 11 01:12:15 2009 (4AA9DC2F)
91a68000 91a85000   ehdrv    ehdrv.sys    Fri Sep 11 01:12:49 2009 (4AA9DC51)
9c1ad000 9c1d7000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
92dbb000 92dc6000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
8ba4b000 8ba5c000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
932bd000 932c7000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
8ba17000 8ba4b000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8bc73000 8bc7c000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
8bdc3000 8bdf5000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
8bf60000 8bf91000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
92d85000 92d8f000   GEARAspiWDM GEARAspiWDM.sys Thu Mar 19 11:32:37 2009 (49C26595)
8bff9000 8bff9680   giveio   giveio.sys   Wed Apr 03 22:33:25 1996 (316334F5)
83817000 8384e000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
92d01000 92d20000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
932d8000 93328000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
9952e000 99541000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
99541000 99547480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
99523000 9952e000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
9bc32000 9bcb7000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8bff1000 8bff9000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
92de8000 92e00000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
92147000 92159000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8b800000 8b81b000   jraid    jraid.sys    Thu Aug 13 04:10:15 2009 (4A83CA67)
92c00000 92c0d000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bd0000 80bd8000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
92198000 921cc000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
8bbb6000 8bbc9000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8bd71000 8bd96000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
932ad000 932bb000   libusb0  libusb0.sys  Wed Mar 09 14:50:17 2005 (422F5379)
83120000 83130000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
995d8000 995f3000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
83a2d000 83aa5000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
99518000 99523000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
9323d000 9324a000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
99552000 9955d000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8b9ae000 8b9c4000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
91a33000 91a59680   MpFilter MpFilter.sys Tue Sep 14 17:23:59 2010 (4C8FE7EF)
9208a000 9208f900   MpKsl28377136 MpKsl28377136.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
9c1e3000 9c1e8900   MpKsld9f0ad31 MpKsld9f0ad31.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
9bd5b000 9bd64200   MpNWMon  MpNWMon.sys  Tue Sep 14 17:23:50 2010 (4C8FE7E6)
9bcd0000 9bce2000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
9bce2000 9bd05000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
9bd05000 9bd40000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
9bd40000 9bd5b000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
91ad7000 91ae2000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8b8f0000 8b8f8000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8bb8b000 8bbb6000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
92080000 9208a000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8bfe1000 8bff1000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8bc7c000 8bd33000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
921e4000 921ef000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
83176000 83186000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
92000000 92022000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
932c7000 932d8000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
91bd5000 91be3000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
91b6c000 91b9e000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
8bd33000 8bd71000   NETIO    NETIO.SYS    Thu Apr 08 22:32:21 2010 (4BBE91B5)
93328000 933fc000   netr28u  netr28u.sys  Fri Jan 15 03:15:35 2010 (4B502427)
9c1d7000 9c1e2c00   NisDrvWFP NisDrvWFP.sys Tue Sep 14 17:24:12 2010 (4C8FE7FC)
91ae2000 91af0000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
92076000 92080000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
83407000 83817000   nt       ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF)
8ba5c000 8bb8b000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
91a5a000 91a61000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
83130000 83176000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
91ba5000 91bc4000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
92dd0000 92de8000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
8b92d000 8b93e000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
9bd65000 9bd6c000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
8b8f8000 8b922000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8b999000 8b9a0000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
8b9a0000 8b9ae000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
8bc65000 8bc73000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9c03e000 9c0d5000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
9955d000 99565800   point32  point32.sys  Tue Jun 29 04:54:24 2010 (4C29B4C0)
929bc000 929eb000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
83aa5000 83ab6000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
921cc000 921e4000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
83be2000 83bfa000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
93205000 9321c000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
9321c000 93233000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
92035000 92076000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
93233000 9323d000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
91abf000 91ac7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
91ac7000 91acf000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
91acf000 91ad7000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8bd96000 8bdc3000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
83186000 83199000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
99205000 9950d180   RTKVHDA  RTKVHDA.sys  Fri Sep 03 04:00:20 2010 (4C80AB14)
83199000 831a5000   RtNdPt60 RtNdPt60.sys Sun Jul 19 22:26:38 2009 (4A63D5DE)
91a23000 91a30880   SCDEmu   SCDEmu.SYS   Sun Jul 26 22:43:19 2009 (4A6D1447)
83bab000 83bd1000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
9c0d5000 9c0df000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
92dc6000 92dd0000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
91be3000 91bfd000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
8bfd9000 8bfe1000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
9c15c000 9c1ad000   srv      srv.sys      Tue Dec 08 03:05:37 2009 (4B1E08D1)
9c10d000 9c15c000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
9c0df000 9c100000   srvnet   srvnet.sys   Tue Dec 08 03:05:06 2009 (4B1E08B2)
9324a000 9324b380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8be17000 8bf60000   tcpip    tcpip.sys    Thu Apr 08 22:32:59 2010 (4BBE91DB)
9c100000 9c10d000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
91b07000 91b12000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
91af0000 91b07000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
91a13000 91a23000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
9ae80000 9ae89000   TSDDD    TSDDD.dll    unavailable (00000000)
92126000 92147000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
99566000 995a6000   udfs     udfs.sys     Mon Jul 13 19:14:09 2009 (4A5BBFC1)
9325b000 93269000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
932bb000 932bc700   usbd     usbd.sys     Mon Jul 13 19:51:05 2009 (4A5BC869)
92d76000 92d85000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
93269000 932ad000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
92d2b000 92d76000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
92d20000 92d2b000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
8b922000 8b92d000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
91a85000 91a91000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
91a91000 91ab2000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8bf91000 8bf99380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8b93e000 8b94e000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b94e000 8b999000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8bf9a000 8bfd9000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
99548000 99552000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
91bc4000 91bd5000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
91a00000 91a13000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
91ab2000 91abf000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8b820000 8b891000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8b891000 8b89f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
91b9e000 91ba5000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
9ac20000 9ae6a000   win32k   win32k.sys   unavailable (00000000)
8b8e7000 8b8f0000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
83106000 83120000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)

Unloaded modules:
8bbee000 8bbfb000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8bdf5000 8be00000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
8ba00000 8ba09000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
83bd1000 83be2000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
Hu.. that's it? I would have never thought it was jut old drivers. How would I get rid of these? Because I'm sure I don't use any of the things mentioned above and my motherboard is a Intel one...
 
Update devices drivers and uninstall the software that you don't use. Those are old drivers, not quite compatible with Windows 7:

Code:
[B]giveio.sys Wed Apr 03 22:33:25 1996
AmdLLD.sys Fri Jun 29 15:47:32 2007
eamon.sys Fri Sep 11 01:12:15 2009
jraid.sys Thu Aug 13 04:10:15 2009
RtNdPt60.sys Sun Jul 19 22:26:38 2009
SCDEmu.SYS Sun Jul 26 22:43:19 2009[/B]
 
Back
Top Bottom