- Thread Author
-
- #1
Hey!
I have an Intel i5-2300 on a Asus P8P67 LE mobo, Corsair Vengeance 2x2GB 1333mhz memory and nVidia GeForce 250 gts.
Build the computer myself along with an experienced friend about 5days ago, keep getting these annoying BSODs and have no idea why, tryed updating drivers, changing place on memory sticks etc.
Any help is greatly appreciated!
Link Removed
I have an Intel i5-2300 on a Asus P8P67 LE mobo, Corsair Vengeance 2x2GB 1333mhz memory and nVidia GeForce 250 gts.
Build the computer myself along with an experienced friend about 5days ago, keep getting these annoying BSODs and have no idea why, tryed updating drivers, changing place on memory sticks etc.
Any help is greatly appreciated!
Link Removed
Solution
Looks like a hardware issue:
Possible (real) causers:
- incompattible, wrong set, or faulty RAM
- overclocked system
- bad motherboard or faulty CPU
Let's see if sorting the software turns out any helpful:
1. Replace AVG with MSE...
040111-32307-01.dmp
BugCheck 7F, {0, 0, 0, 0}
Stack: avg, hal, nt
Probably caused by : avgtdix.sys
040111-33992-01.dmp
BugCheck A, {f, 2, 0, 82e209d4}
Stack: nt, usb, hal
Probably caused by : USBPORT.SYS
033111-31090-01.dmp
BugCheck 1000008E, {c0000005, 82c8a762, 9bf4744c, 0}
Probably caused by : hardware ( nt!MiProtectVirtualMemory+15 )
040211-23322-01.dmp
BugCheck D1, {ffff2302, 2, 0, 8b6a7afd}
Probably caused by : tcpip.sys
Possible (real) causers:
- incompattible, wrong set, or faulty RAM
- overclocked system
- bad motherboard or faulty CPU
Let's see if sorting the software turns out any helpful:
1. Replace AVG with MSE...
cybercore
New Member
- Joined
- Jul 7, 2009
- Messages
- 15,641
Looks like a hardware issue:
Possible (real) causers:
- incompattible, wrong set, or faulty RAM
- overclocked system
- bad motherboard or faulty CPU
Let's see if sorting the software turns out any helpful:
1. Replace AVG with MSE:
Link Removed due to 404 Error
2. Update NVIDIA:
nvlddmkm.sys Thu May 14 16:32:27 2009
3. Update Card Reader:
shbecr.sys Fri May 30 08:27:05 2008
CRASH DUMPS
DRIVERS
040111-32307-01.dmp
BugCheck 7F, {0, 0, 0, 0}
Stack: avg, hal, nt
Probably caused by : avgtdix.sys
040111-33992-01.dmp
BugCheck A, {f, 2, 0, 82e209d4}
Stack: nt, usb, hal
Probably caused by : USBPORT.SYS
033111-31090-01.dmp
BugCheck 1000008E, {c0000005, 82c8a762, 9bf4744c, 0}
Probably caused by : hardware ( nt!MiProtectVirtualMemory+15 )
040211-23322-01.dmp
BugCheck D1, {ffff2302, 2, 0, 8b6a7afd}
Probably caused by : tcpip.sys
Possible (real) causers:
- incompattible, wrong set, or faulty RAM
- overclocked system
- bad motherboard or faulty CPU
Let's see if sorting the software turns out any helpful:
1. Replace AVG with MSE:
Link Removed due to 404 Error
2. Update NVIDIA:
nvlddmkm.sys Thu May 14 16:32:27 2009
3. Update Card Reader:
shbecr.sys Fri May 30 08:27:05 2008
CRASH DUMPS
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040111-32307-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82a12000 PsLoadedModuleList = 0x82b5a810
Debug session time: Fri Apr 1 11:47:14.177 2011 (UTC - 4:00)
System Uptime: 0 days 1:08:59.410
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {0, 0, 0, 0}
*** WARNING: Unable to verify timestamp for avgtdix.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
Unable to load image \SystemRoot\system32\DRIVERS\avgfwd6x.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgfwd6x.sys
*** ERROR: Module load completed but symbols could not be loaded for avgfwd6x.sys
Probably caused by : avgtdix.sys ( avgtdix+4ec )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000000, EXCEPTION_DIVIDED_BY_ZERO
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 88424184 to 82a5629b
STACK_TEXT:
a4bff864 88424184 badb0d00 0000a9d4 a4bff890 nt!KiTrap00+0x8b
WARNING: Frame IP not in any known module. Following frames may be wrong.
a4bff8d4 a4bff9d0 a4bff969 a4bff96a a4bffa7c 0x88424184
a4bff8f4 82e27ba9 00000000 87bf5302 a4bff94c 0xa4bff9d0
a4bff904 82e257ab 8b7154ec 80000000 8b7190b3 hal!KfLowerIrql+0x61
a4bff908 8b7154ec 80000000 8b7190b3 8809fb50 hal!KfReleaseSpinLock+0xb
a4bff950 8fc02e72 8809f840 00000000 a4bff968 avgtdix+0x4ec
a4bff954 8809f840 00000000 a4bff968 a4bffa9c avgfwd6x+0x2e72
a4bff958 00000000 a4bff968 a4bffa9c 00000000 0x8809f840
STACK_COMMAND: kb
FOLLOWUP_IP:
avgtdix+4ec
8b7154ec ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: avgtdix+4ec
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avgtdix
IMAGE_NAME: avgtdix.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cdd1f96
FAILURE_BUCKET_ID: 0x7f_0_avgtdix+4ec
BUCKET_ID: 0x7f_0_avgtdix+4ec
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040111-33992-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0c000 PsLoadedModuleList = 0x82b54810
Debug session time: Thu Mar 31 20:38:38.673 2011 (UTC - 4:00)
System Uptime: 0 days 0:21:16.906
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {f, 2, 0, 82e209d4}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iMapTransfer+21e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000f, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82e209d4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b74718
Unable to read MiSystemVaType memory at 82b54160
0000000f
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalBuildScatterGatherList+160
82e209d4 85f6 test esi,esi
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: 82b32b20 -- (.trap 0xffffffff82b32b20)
ErrCode = 00000000
eax=89886498 ebx=00000000 ecx=898864a8 edx=00000000 esi=00000000 edi=897b2370
eip=82e209d4 esp=82b32b94 ebp=82b32ba8 iopl=0 nv up ei ng nz ac po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010292
hal!HalBuildScatterGatherList+0x160:
82e209d4 85f6 test esi,esi
Resetting default scope
LAST_CONTROL_TRANSFER: from 82e209d4 to 82a527eb
STACK_TEXT:
82b32b20 82e209d4 badb0d00 00000000 82b2c466 nt!KiTrap0E+0x2cf
82b32ba8 82e20c16 89886490 87e8d028 897b2350 hal!HalBuildScatterGatherList+0x160
82b32bd8 8f32ae70 87bd4490 87e8d028 897b2350 hal!HalGetScatterGatherList+0x26
82b32c24 8f32a807 87e8d028 87e8d970 00000008 USBPORT!USBPORT_Core_iMapTransfer+0x21e
82b32c54 8f324d18 87e8d028 87e8d970 87e8d002 USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x1e3
82b32c78 82a743b5 87e8d97c 87e8d002 00000000 USBPORT!USBPORT_Xdpc_Worker+0x173
82b32cd4 82a74218 82b35d20 82b3f280 00000000 nt!KiExecuteAllDpcs+0xf9
82b32d20 82a74038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xd5
82b32d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iMapTransfer+21e
8f32ae70 8945f4 mov dword ptr [ebp-0Ch],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!USBPORT_Core_iMapTransfer+21e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc871
FAILURE_BUCKET_ID: 0xA_USBPORT!USBPORT_Core_iMapTransfer+21e
BUCKET_ID: 0xA_USBPORT!USBPORT_Core_iMapTransfer+21e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\033111-31090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0b000 PsLoadedModuleList = 0x82b53810
Debug session time: Thu Mar 31 15:57:18.603 2011 (UTC - 4:00)
System Uptime: 0 days 0:46:16.836
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 82c8a762, 9bf4744c, 0}
Probably caused by : hardware ( nt!MiProtectVirtualMemory+15 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82c8a762, The address that the exception occurred at
Arg3: 9bf4744c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiProtectVirtualMemory+15
82c8a762 8b1d24010000 mov ebx,dword ptr ds:[124h]
TRAP_FRAME: 9bf4744c -- (.trap 0xffffffff9bf4744c)
ErrCode = 00000000
eax=9bf47514 ebx=890f27c8 ecx=01b7c000 edx=ffffffff esi=9bf47628 edi=00000000
eip=82c8a762 esp=9bf474c0 ebp=37e8e981 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
nt!MiProtectVirtualMemory+0x15:
82c8a762 8b1d24010000 mov ebx,dword ptr ds:[124h] ds:0023:00000124=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: aaHMSvc.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!MiProtectVirtualMemory+15
82c8a762 8b1d24010000 mov ebx,dword ptr ds:[124h]
LAST_CONTROL_TRANSFER: from 82c8ad6f to 82c8a762
STACK_TEXT:
9bf474c0 82c8ad6f 890f27c8 9bf47514 9bf47518 nt!MiProtectVirtualMemory+0x15
9bf47534 82a4e42a ffffffff 9bf47634 9bf47628 nt!NtProtectVirtualMemory+0x12e
9bf47534 82a4ca71 ffffffff 9bf47634 9bf47628 nt!KiFastCallEntry+0x12a
9bf475c0 82c6ebfe ffffffff 9bf47634 9bf47628 nt!ZwProtectVirtualMemory+0x11
9bf47654 82c69f5c 00000000 00000000 00000000 nt!RtlCreateUserStack+0x1e4
9bf47704 82c818a1 890f27c8 8595825c 00000000 nt!PspAllocateThread+0x2c2
9bf478cc 82c43f5c 0187fc38 001fffff 00000000 nt!PspCreateThread+0x1b7
9bf47d00 82a4e42a 0187fc38 001fffff 00000000 nt!NtCreateThreadEx+0x20b
9bf47d00 776e64f4 0187fc38 001fffff 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0187fe54 00000000 00000000 00000000 00000000 0x776e64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiProtectVirtualMemory+15
82c8a762 8b1d24010000 mov ebx,dword ptr ds:[124h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiProtectVirtualMemory+15
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040211-23322-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82a02000 PsLoadedModuleList = 0x82b4a810
Debug session time: Sat Apr 2 14:19:24.735 2011 (UTC - 4:00)
System Uptime: 0 days 2:25:58.062
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffff2302, 2, 0, 8b6a7afd}
Probably caused by : tcpip.sys ( tcpip!IppRouteSetTimeout+1b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff2302, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8b6a7afd, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b6a718
Unable to read MiSystemVaType memory at 82b4a160
ffff2302
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IppRouteSetTimeout+1b
8b6a7afd 83780400 cmp dword ptr [eax+4],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 82b28984 -- (.trap 0xffffffff82b28984)
ErrCode = 00000000
eax=ffff22fe ebx=82b28ac0 ecx=8b6aa22c edx=88b7f170 esi=8b6aa370 edi=8b6aa1ac
eip=8b6a7afd esp=82b289f8 ebp=82b28a14 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
tcpip!IppRouteSetTimeout+0x1b:
8b6a7afd 83780400 cmp dword ptr [eax+4],0 ds:0023:ffff2302=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8b6a7afd to 82a4881b
STACK_TEXT:
82b28984 8b6a7afd badb0d00 88b7f170 82b6a8c8 nt!KiTrap0E+0x2cf
82b28a14 82b28a44 8b6aa1ac 82b28a34 8883312c tcpip!IppRouteSetTimeout+0x1b
82b28a18 8b6aa1ac 82b28a34 8883312c 00000000 nt!KiDoubleFaultStack+0x2a44
82b28a44 8b6aa7b2 00000000 0000446c 00000001 tcpip!TtFireTimerEx+0x71
82b28ad8 8b6aa497 88998968 8b7114ac 875c3350 tcpip!IppAddressSetTimeout+0x4f
82b28af4 8b6a9f11 875c3388 01b2d900 82b28b00 tcpip!Ipv4pInterfaceSetTimeout+0x52
82b28b20 8b6a99d2 8b70ed98 00000000 82b28b7c tcpip!IppCompartmentSetTimeout+0x8a
82b28b30 8b6a99a8 8b70ed98 82a6c16d 8b71fb00 tcpip!IppProtocolTimeout+0xf
82b28b38 82a6c16d 8b71fb00 00000000 7ed7d4e7 tcpip!IppTimeout+0x3c
82b28b7c 82a6c111 82b2bd20 82b28ca8 00000001 nt!KiProcessTimerDpcTable+0x50
82b28c68 82a6bfce 82b2bd20 82b28ca8 00000000 nt!KiProcessExpiredTimerList+0x101
82b28cdc 82a6a34e 00089102 895e5a68 82b35280 nt!KiTimerExpiration+0x25c
82b28d20 82a6a178 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82b28d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!IppRouteSetTimeout+1b
8b6a7afd 83780400 cmp dword ptr [eax+4],0
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: tcpip!IppRouteSetTimeout+1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c15a3db
FAILURE_BUCKET_ID: 0xD1_tcpip!IppRouteSetTimeout+1b
BUCKET_ID: 0xD1_tcpip!IppRouteSetTimeout+1b
Followup: MachineOwner
---------
DRIVERS
Code:
start end module name
90d8d000 90db9000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8ae8d000 8aed5000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
9041e000 90478000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
90c00000 90c12000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b141000 8b14a000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
905d6000 905d7040 AsIO AsIO.sys Tue Aug 24 03:24:46 2010 (4C7373BE)
9298c000 929a6000 asmthub3 asmthub3.sys Wed Dec 08 05:12:46 2010 (4CFF5A1E)
8adb3000 8adfe000 asmtxhci asmtxhci.sys Wed Dec 08 05:12:30 2010 (4CFF5A0E)
905d4000 905d51a0 AsUpIO AsUpIO.sys Mon Aug 02 22:48:02 2010 (4C578362)
8b10b000 8b114000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b114000 8b137000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
8fbd2000 8fbe3000 avgfwd6x avgfwd6x.sys Sun Jul 11 21:37:25 2010 (4C3A71D5)
9a54b000 9a573000 AVGIDSDriver AVGIDSDriver.Sys Tue Aug 03 18:24:21 2010 (4C589715)
8b5b5000 8b5be000 AVGIDSEH AVGIDSEH.Sys Mon Sep 13 18:46:35 2010 (4C8EA9CB)
9a4f2000 9a4fc000 AVGIDSFilter AVGIDSFilter.Sys Tue Aug 03 18:23:18 2010 (4C5896D6)
8fb16000 8fb1f000 AVGIDSShim AVGIDSShim.Sys Tue Aug 03 18:25:56 2010 (4C589774)
8afb2000 8afedd00 avgldx86 avgldx86.sys Tue Dec 07 21:00:20 2010 (4CFEE6B4)
8fb4d000 8fb59000 avgmfx86 avgmfx86.sys Mon Sep 06 20:48:01 2010 (4C858BC1)
8b619000 8b61db80 avgrkx86 avgrkx86.sys Mon Sep 06 20:48:16 2010 (4C858BD0)
8b18f000 8b1d6980 avgtdix avgtdix.sys Fri Nov 12 06:05:58 2010 (4CDD1F96)
8fb60000 8fb67000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
905c6000 905d4000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8acbe000 8acc6000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
913d5000 913ee000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
988a0000 988be000 cdd cdd.dll unavailable (00000000)
929a6000 929bc000 cdfs cdfs.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8fb2e000 8fb4d000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8ad08000 8adb3000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b590000 8b5b5000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8acc6000 8ad08000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8b381000 8b3de000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
90de7000 90df4000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
929e0000 929ed000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
9054a000 905ae000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
905ae000 905c6000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
9053e000 9054a000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b608000 8b619000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
92973000 9298c000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
929ed000 929fe000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
91257000 91358000 dump_iaStor dump_iaStor.sys Sat Nov 06 03:37:33 2010 (4CD505BD)
91382000 9138c000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
90c19000 90cd0000 dxgkrnl dxgkrnl.sys Mon Nov 01 22:37:53 2010 (4CCF7981)
90cd0000 90d09000 dxgmms1 dxgmms1.sys Wed Feb 02 22:34:49 2011 (4D4A2259)
8b17e000 8b18f000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b14a000 8b17e000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b3ec000 8b3f5000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8b55e000 8b590000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55)
8b76e000 8b79f000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82e12000 82e49000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
90d6e000 90d8d000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
90d09000 90d13080 HECI HECI.sys Tue Oct 19 19:33:38 2010 (4CBE2AD2)
91358000 9136b000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
92622000 92628480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
92617000 92622000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
8fa18000 8fa9d000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b600000 8b608000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8b00a000 8b10b000 iaStor iaStor.sys Sat Nov 06 03:37:33 2010 (4CD505BD)
90dc3000 90dcc000 ICCWDT ICCWDT.sys Wed Aug 18 04:27:40 2010 (4C6B997C)
90dd5000 90de7000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8fa0b000 8fa18000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
9136b000 91377000 kbdhid kbdhid.sys Mon Jul 13 19:45:09 2009 (4A5BC705)
80ba1000 80ba9000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8ac00000 8ac34000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0)
8b36e000 8b381000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8b50c000 8b531000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
913b2000 913c2000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
91397000 913b2000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
8ac35000 8acad000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
9138c000 91397000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8b200000 8b20d000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
91377000 91382000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8af9c000 8afb2000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
913ee000 91400000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
8fa9d000 8fac0000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
8fac0000 8fafb000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
8fafb000 8fb16000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8b137000 8b141000 msahci msahci.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8fbb9000 8fbc4000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8aede000 8aee6000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b343000 8b36e000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
90534000 9053e000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b7ef000 8b7ff000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b417000 8b4ce000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
90df4000 90dff000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
91600000 91622000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
91246000 91257000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
9049e000 904ac000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8b5cb000 8b5fd000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
8b4ce000 8b50c000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
8fbc4000 8fbd2000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
9052a000 90534000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a02000 82e12000 nt ntkrpamp.exe Tue Oct 26 22:30:44 2010 (4CC78ED4)
8b214000 8b343000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
8fb59000 8fb60000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
91627000 91f8c940 nvlddmkm nvlddmkm.sys Thu May 14 16:32:27 2009 (4A0C7FDB)
9047f000 9049e000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
8af1b000 8af2c000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8aee6000 8af10000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8af87000 8af8e000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8af8e000 8af9c000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b3de000 8b3ec000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9a423000 9a4ba000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
92944000 92973000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
8acad000 8acbe000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
91fde000 91ff6000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
90400000 90418000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8b400000 8b417000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8b1d7000 8b1ee000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
904e9000 9052a000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
91ff6000 92000000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
8fba1000 8fba9000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8fba9000 8fbb1000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8fbb1000 8fbb9000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8b531000 8b55e000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
913c2000 913d5000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
91f8d000 91fde000 Rt86win7 Rt86win7.sys Wed Dec 29 06:43:32 2010 (4D1B1EE4)
9262b000 92943a00 RTKVHDA RTKVHDA.sys Tue Nov 23 05:06:52 2010 (4CEB923C)
929d4000 929e0000 scfilter scfilter.sys Mon Jul 13 19:33:50 2009 (4A5BC45E)
9a4ba000 9a4c4000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
90db9000 90dc3000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
904ac000 904c6000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
929bc000 929c6580 shbecr shbecr.sys Fri May 30 08:27:05 2008 (483FF299)
929c7000 929d2000 SMCLIB SMCLIB.SYS Mon Jul 13 19:45:28 2009 (4A5BC718)
8b7e7000 8b7ef000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
a502b000 a5095000 spsys spsys.sys Mon May 11 12:37:10 2009 (4A085436)
9a573000 9a5c4000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
9a4fc000 9a54b000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
9a4c4000 9a4e5000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
90c12000 90c13380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8b625000 8b76e000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
9a4e5000 9a4f2000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8fa00000 8fa0b000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8fbe3000 8fbfa000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
904d9000 904e9000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
98870000 98879000 TSDDD TSDDD.dll unavailable (00000000)
905d8000 905f9000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
8b1ee000 8b1fc000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
92600000 92617000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
929d2000 929d3700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
90d14000 90d23000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
91202000 91246000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
90d23000 90d6e000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
8af10000 8af1b000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8fb67000 8fb73000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
8fb73000 8fb94000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8b79f000 8b7a7380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8af2c000 8af3c000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8af3c000 8af87000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8b7a8000 8b7e7000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
904c6000 904d9000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
8fb94000 8fba1000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8ae0e000 8ae7f000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8ae7f000 8ae8d000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
90478000 9047f000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
98610000 9885b000 win32k win32k.sys unavailable (00000000)
90dcc000 90dd5000 wmiacpi wmiacpi.sys Mon Jul 13 19:19:16 2009 (4A5BC0F4)
8aed5000 8aede000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
Unloaded modules:
8fb16000 8fb2e000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
8b5be000 8b5cb000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
8fa1c000 8fb1d000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00101000
8fb1d000 8fb2e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
Similar threads
- Featured
- Article
- Replies
- 0
- Views
- 2K
- Solved
- Replies
- 3
- Views
- 2K
- Replies
- 18
- Views
- 6K
- Solved
- Replies
- 1
- Views
- 3K