BSOD - help!!!

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by race, Mar 23, 2011.

  1. race

    race New Member

    Joined:
    Mar 17, 2011
    Messages:
    2
    Likes Received:
    0
    I've tried to update my drivers but the BSOD seems to keep coming back! Need help!!
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    WinDbg shows that all of your crashes were caused by Atheros driver, which is old and must be updated:


    Update drivers:

    Atheros Extensible Wireless LAN
    athr.sys Mon Aug 10 21:14:25 2009

    Atheros L1c PCI-E Gigabit Ethernet
    L1C60x86.sys Mon Jul 27 02:38:59 2009

    Dritek Keyboard
    DKbFltr.sys Wed Mar 25 23:10:12 2009

    Intel Matrix Storage
    iaStor.sys Thu Jun 04 21:42:33 2009

    Intel GMA
    igdkmd32.sys Wed Sep 23 15:18:09 2009

    Fingerprint Device
    mwlPSDNServ.sys Tue Jun 02 06:06:48 2009

    Realtek Audio
    RTKVHDA.sys Mon Jul 06 05:12:43 2009

    Touchpad
    SynTP.sys Thu Sep 03 20:32:25 2009




    If your notebook is compatible with Windows 7, you'll find the updates at the notebook support site. Old drivers often cause blue screens, as in your case. Once you have updated them, install Service Pack 1.




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032311-23743-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c4a000 PsLoadedModuleList = 0x81d89570
    Debug session time: Wed Mar 23 17:11:22.988 2011 (UTC - 4:00)
    System Uptime: 0 days 0:00:36.706
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {4, 2, 0, 8743fb02}
    
    Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for athr.sys
    *** ERROR: Module load completed but symbols could not be loaded for athr.sys
    Probably caused by : athr.sys ( athr+212e1 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000004, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 8743fb02, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 81da9700
    Unable to read MiSystemVaType memory at 81d890c0
     00000004 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ndis!NdisFreeTimerObject+18
    8743fb02 8b4b04          mov     ecx,dword ptr [ebx+4]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  86a5cba8 -- (.trap 0xffffffff86a5cba8)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=8744b970 edx=85086020 esi=85046028 edi=8744b970
    eip=8743fb02 esp=86a5cc1c ebp=86a5cc28 iopl=0         nv up ei ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
    ndis!NdisFreeTimerObject+0x18:
    8743fb02 8b4b04          mov     ecx,dword ptr [ebx+4] ds:0023:00000004=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8743fb02 to 81c82b5b
    
    STACK_TEXT:  
    86a5cba8 8743fb02 badb0d00 85086020 86a5cbc4 nt!KiTrap0E+0x2cf
    86a5cc28 8c6642e1 00000000 86a5cc40 8c6642bf ndis!NdisFreeTimerObject+0x18
    WARNING: Stack unwind information not available. Following frames may be wrong.
    86a5cc34 8c6642bf 85086210 86a5cc4c 8c669f0c athr+0x212e1
    86a5cc40 8c669f0c 85086020 86a5cc64 8c669ebf athr+0x212bf
    86a5cc4c 8c669ebf 85086020 c000009a 85086020 athr+0x26f0c
    86a5cc64 8c65b82e 85245028 86a5cc78 00000001 athr+0x26ebf
    86a5cc84 8c654313 85245028 00000001 86a5cc9c athr+0x1882e
    86a5ccc4 8c6541e8 85245028 86a7038c 85245028 athr+0x11313
    86a5ccdc 8740a30a 85245028 85006600 86a5cd00 athr+0x111e8
    86a5ccec 81e36f34 85046028 85006600 83670d48 ndis!ndisDispatchIoWorkItem+0xf
    86a5cd00 81ca5043 852067e8 00000000 83670d48 nt!IopProcessWorkItem+0x23
    86a5cd50 81e31d16 00000000 90b1dba4 00000000 nt!ExpWorkerThread+0x10d
    86a5cd90 81cd3159 81ca4f36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    athr+212e1
    8c6642e1 ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  athr+212e1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: athr
    
    IMAGE_NAME:  athr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a80c5f1
    
    FAILURE_BUCKET_ID:  0xD1_athr+212e1
    
    BUCKET_ID:  0xD1_athr+212e1
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032311-22916-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c48000 PsLoadedModuleList = 0x81d87570
    Debug session time: Wed Mar 23 17:00:10.600 2011 (UTC - 4:00)
    System Uptime: 0 days 0:01:04.318
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {4, 2, 0, 86f6db02}
    
    Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for athr.sys
    *** ERROR: Module load completed but symbols could not be loaded for athr.sys
    Probably caused by : athr.sys ( athr+212e1 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000004, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 86f6db02, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 81da7700
    Unable to read MiSystemVaType memory at 81d870c0
     00000004 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ndis!NdisFreeTimerObject+18
    86f6db02 8b4b04          mov     ecx,dword ptr [ebx+4]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  86a3bba8 -- (.trap 0xffffffff86a3bba8)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=86f79970 edx=84324020 esi=85058028 edi=86f79970
    eip=86f6db02 esp=86a3bc1c ebp=86a3bc28 iopl=0         nv up ei ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
    ndis!NdisFreeTimerObject+0x18:
    86f6db02 8b4b04          mov     ecx,dword ptr [ebx+4] ds:0023:00000004=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 86f6db02 to 81c80b5b
    
    STACK_TEXT:  
    86a3bba8 86f6db02 badb0d00 84324020 86a3bbc4 nt!KiTrap0E+0x2cf
    86a3bc28 8ca642e1 00000000 86a3bc40 8ca642bf ndis!NdisFreeTimerObject+0x18
    WARNING: Stack unwind information not available. Following frames may be wrong.
    86a3bc34 8ca642bf 84324210 86a3bc4c 8ca69f0c athr+0x212e1
    86a3bc40 8ca69f0c 84324020 86a3bc64 8ca69ebf athr+0x212bf
    86a3bc4c 8ca69ebf 84324020 c000009a 84324020 athr+0x26f0c
    86a3bc64 8ca5b82e 84320028 86a3bc78 00000001 athr+0x26ebf
    86a3bc84 8ca54313 84320028 00000001 86a3bc9c athr+0x1882e
    86a3bcc4 8ca541e8 84320028 86a7438c 84320028 athr+0x11313
    86a3bcdc 86f3830a 84320028 8518b108 86a3bd00 athr+0x111e8
    86a3bcec 81e34f34 85058028 8518b108 83687350 ndis!ndisDispatchIoWorkItem+0xf
    86a3bd00 81ca3043 850dfe08 00000000 83687350 nt!IopProcessWorkItem+0x23
    86a3bd50 81e2fd16 00000000 90b4b8be 00000000 nt!ExpWorkerThread+0x10d
    86a3bd90 81cd1159 81ca2f36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    athr+212e1
    8ca642e1 ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  athr+212e1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: athr
    
    IMAGE_NAME:  athr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a80c5f1
    
    FAILURE_BUCKET_ID:  0xD1_athr+212e1
    
    BUCKET_ID:  0xD1_athr+212e1
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032311-22198-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d3f570
    Debug session time: Wed Mar 23 17:33:59.459 2011 (UTC - 4:00)
    System Uptime: 0 days 0:10:18.037
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {4, 2, 0, 8736cb02}
    
    Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for athr.sys
    *** ERROR: Module load completed but symbols could not be loaded for athr.sys
    Probably caused by : athr.sys ( athr+212e1 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000004, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 8736cb02, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 81d5f700
    Unable to read MiSystemVaType memory at 81d3f0c0
     00000004 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ndis!NdisFreeTimerObject+18
    8736cb02 8b4b04          mov     ecx,dword ptr [ebx+4]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  86a58ba8 -- (.trap 0xffffffff86a58ba8)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=87378970 edx=84007020 esi=83a7b028 edi=87378970
    eip=8736cb02 esp=86a58c1c ebp=86a58c28 iopl=0         nv up ei ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
    ndis!NdisFreeTimerObject+0x18:
    8736cb02 8b4b04          mov     ecx,dword ptr [ebx+4] ds:0023:00000004=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8736cb02 to 81c38b5b
    
    STACK_TEXT:  
    86a58ba8 8736cb02 badb0d00 84007020 86a58bc4 nt!KiTrap0E+0x2cf
    86a58c28 a3e622e1 00000000 86a58c40 a3e622bf ndis!NdisFreeTimerObject+0x18
    WARNING: Stack unwind information not available. Following frames may be wrong.
    86a58c34 a3e622bf 84007210 86a58c4c a3e67f0c athr+0x212e1
    86a58c40 a3e67f0c 84007020 86a58c64 a3e67ebf athr+0x212bf
    86a58c4c a3e67ebf 84007020 c000009a 84007020 athr+0x26f0c
    86a58c64 a3e5982e 83a7c408 86a58c78 00000001 athr+0x26ebf
    86a58c84 a3e52313 83a7c408 00000001 86a58c9c athr+0x1882e
    86a58cc4 a3e521e8 83a7c408 86a6c38c 83a7c408 athr+0x11313
    86a58cdc 8733730a 83a7c408 83698258 86a58d00 athr+0x111e8
    86a58cec 81decf34 83a7b028 83698258 83670020 ndis!ndisDispatchIoWorkItem+0xf
    86a58d00 81c5b043 83780a08 00000000 83670020 nt!IopProcessWorkItem+0x23
    86a58d50 81de7d16 00000000 90dd2603 00000000 nt!ExpWorkerThread+0x10d
    86a58d90 81c89159 81c5af36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    athr+212e1
    a3e622e1 ??              ???
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  athr+212e1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: athr
    
    IMAGE_NAME:  athr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a80c5f1
    
    FAILURE_BUCKET_ID:  0xD1_athr+212e1
    
    BUCKET_ID:  0xD1_athr+212e1
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start    end        module name
    86e1f000 86e67000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    8b46f000 8b4c9000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    8c727000 8c739000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    87107000 87110000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    870db000 870e4000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    870e4000 87107000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    a3e41000 a3f65000   athr     athr.sys     Mon Aug 10 21:14:25 2009 (4A80C5F1)
    86ec6000 86ed1000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
    8761c000 87623000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8b5fc000 8b60a000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    86cab000 86cb3000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    8b79c000 8b7b5000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    81330000 8134e000   cdd      cdd.dll      unavailable (00000000)
    86cf5000 86da0000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    874aa000 874cf000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    86cb3000 86cf5000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8c698000 8c69b700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    872c2000 8731f000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    86ebe000 86ec6000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    8c71a000 8c727000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    80eec000 80ef9000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8b5e4000 8b5fc000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    8b5d8000 8b5e4000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    87499000 874aa000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8c6b4000 8c6be000   DKbFltr  DKbFltr.sys  Wed Mar 25 23:10:12 2009 (49CAF214)
    80ec9000 80ee2000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    80fd3000 80fe4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    80ef9000 80fd3000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
    80ee2000 80eec000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    8c524000 8c5db000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:26:15 2009 (4A5BC297)
    8c5db000 8c614000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    8b772000 8b79c000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
    87144000 87155000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    87110000 87144000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8732d000 87336000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    87467000 87499000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
    8b41c000 8b44d000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    82000000 82037000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8c614000 8c633000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    874cf000 87554000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8745f000 87467000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    8c69c000 8c6b4000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    87001000 870db000   iaStor   iaStor.sys   Thu Jun 04 21:42:33 2009 (4A287809)
    8c01b000 8c524000   igdkmd32 igdkmd32.sys Wed Sep 23 15:18:09 2009 (4ABA7471)
    86f2c000 86f33000   intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8b62b000 8b63d000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8c6be000 8c6cb000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    81a0c000 81a14000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8c7c6000 8c7fa000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    872af000 872c2000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    86f95000 86fba000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
    a3e31000 a3e41000   L1C60x86 L1C60x86.sys Mon Jul 27 02:38:59 2009 (4A6D4B83)
    80fef000 80fff000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    8b6e4000 8b6ff000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    86c22000 86c9a000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    80fe4000 80fef000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8c704000 8c711000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    86f41000 86f57000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    875e6000 8760c680   MpFilter MpFilter.sys Tue Sep 14 17:23:59 2010 (4C8FE7EF)
    a3da0000 a3da5900   MpKsl4ff56318 MpKsl4ff56318.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
    8b5d2000 8b5d7900   MpKsl6658dfa3 MpKsl6658dfa3.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
    a3d8a000 a3d93200   MpNWMon  MpNWMon.sys  Tue Sep 14 17:23:50 2010 (4C8FE7E6)
    8b7b5000 8b7c7000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    8b7c7000 8b7ea000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:14:24 2009 (4A5BBFD0)
    87554000 8758f000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
    8b400000 8b41b000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
    87675000 87680000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    86e70000 86e78000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    87284000 872af000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    8b5c8000 8b5d2000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8744f000 8745f000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8760d000 87615000   mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:06:37 2009 (4A24F9AD)
    8b5c0000 8b5c8000   mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:06:48 2009 (4A24F9B8)
    8b5ae000 8b5c0000   mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:07:00 2009 (4A24F9C4)
    87336000 873ed000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    8c751000 8c75c000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    80c00000 80c10000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
    8c75c000 8c77e000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    8b681000 8b692000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    8b532000 8b540000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    8b4c9000 8b4fb000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    86f57000 86f95000   NETIO    NETIO.SYS    Thu Apr 08 22:32:21 2010 (4BBE91B5)
    a3d94000 a3d9fc00   NisDrvWFP NisDrvWFP.sys Tue Sep 14 17:24:12 2010 (4C8FE7FC)
    87680000 8768e000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    8b5a4000 8b5ae000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    81c00000 82000000   nt       ntkrnlmp.exe Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    87155000 87284000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    87615000 8761c000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    8b719000 8b75f000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
    8b502000 8b521000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    86ead000 86ebe000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    86e78000 86ea2000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    86f33000 86f41000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8731f000 8732d000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    a3c1b000 a3cb2000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    80e9a000 80ec9000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    86c9a000 86cab000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8c739000 8c751000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    8c77e000 8c796000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    8c796000 8c7ad000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8c7ad000 8c7c4000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8b563000 8b5a4000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    8765d000 87665000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    87665000 8766d000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    8766d000 87675000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    87422000 8744f000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    8b75f000 8b772000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    80c12000 80e99140   RTKVHDA  RTKVHDA.sys  Mon Jul 06 05:12:43 2009 (4A51C00B)
    a3cb2000 a3cbc000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    873ed000 873f5000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    a3dc7000 a3e31000   spsys    spsys.sys    Mon May 11 12:37:10 2009 (4A085436)
    a3d39000 a3d8a000   srv      srv.sys      Mon Jul 13 19:15:10 2009 (4A5BBFFE)
    a3cea000 a3d39000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
    a3cbc000 a3cdd000   srvnet   srvnet.sys   Mon Jul 13 19:14:45 2009 (4A5BBFE5)
    8c7c4000 8c7c5380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8c6cb000 8c701400   SynTP    SynTP.sys    Thu Sep 03 20:32:25 2009 (4AA06019)
    8768e000 877d7000   tcpip    tcpip.sys    Thu Apr 08 22:32:59 2010 (4BBE91DB)
    a3cdd000 a3cea000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8b464000 8b46f000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    8b44d000 8b464000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    8b553000 8b563000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    81300000 81309000   TSDDD    TSDDD.dll    unavailable (00000000)
    8b60a000 8b62b000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    8c000000 8c00e000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    8b6a9000 8b6c0000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    8c702000 8c703700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8c689000 8c698000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8b63d000 8b681000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    8c63e000 8c689000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    8b692000 8b6a9000   USBSTOR  USBSTOR.SYS  Mon Jul 13 19:51:19 2009 (4A5BC877)
    8c633000 8c63e000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    8b6c0000 8b6e3b00   usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897)
    86ea2000 86ead000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    87623000 8762f000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    8762f000 87650000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    86ed1000 86ee1000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    86ee1000 86f2c000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    86fba000 86ff9000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    a3f65000 a3f6f000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
    8b521000 8b532000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
    a3f6f000 a3f78000   vwifimp  vwifimp.sys  Mon Jul 13 19:52:09 2009 (4A5BC8A9)
    8b540000 8b553000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    87650000 8765d000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    86da0000 86e11000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    86e11000 86e1f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8b4fb000 8b502000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    810a0000 812ea000   win32k   win32k.sys   unavailable (00000000)
    8c711000 8c71a000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:19:16 2009 (4A5BC0F4)
    86e67000 86e70000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    8b6ff000 8b719000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    a3da6000 a3dc6480   WUDFRd   WUDFRd.sys   Mon Jul 13 19:50:44 2009 (4A5BC854)
    
    Unloaded modules:
    8758f000 875a7000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    874cf000 874dc000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    874dc000 875b6000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  000DA000
    875b6000 875c7000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
    875c7000 875e6000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001F000
    
    
     
  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

Share This Page

Loading...