Windows 7 BSOD - possibly graphics card related?

Emlyn1984

New Member
I keep getting a BSOD, seemingly at random times. Sometimes when booting up, the pc get's stuck in a 'loop' and keeps re-booting.

When I do get a BSOD, I can't actually read it as it is all 'fuzzy' (not the best description, sorry!), which is what leads me to beleive it may be a graphics card problem.

I have attached a rar of the minidump files. Any help would be gratefully appreciated!!

thanks

View attachment minidump files.rar
 
1. Uninstall McAfee with this tool in safe mode:

How to uninstall or reinstall supported McAfee consumer products using the McAfee Consumer Products Removal tool (MCPR.exe)


Replace with MSE:

Link Removed due to 404 Error




2. Visit your notebook support to update drivers:

BCM42RLY.sys Tue Jul 07 20:34:55 2009
Broadcom iLine10(tm) PCI Network Adapter

bcmwl664.sys Tue Jul 07 20:45:04 2009
Broadcom 802.11 Network Adapter wireless

HECIx64.sys Thu Sep 17 15:54:16 2009
Intel Management Interface
Intel

risdpe64.sys Wed Jul 01 05:31:57 2009
RICOH SD/MMC Driver

Rt64win7.sys Thu Aug 20 12:05:06 2009
Realtek 8136/8168/8169 PCI/PCIe

SynTP.sys Mon Aug 24 13:37:05 2009
Touchpad







Crash Dump

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\123010-39483-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e1f000 PsLoadedModuleList = 0xfffff800`0305ce50
Debug session time: Thu Dec 30 11:23:42.017 2010 (UTC - 5:00)
System Uptime: 0 days 0:07:36.219
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002e93cd8, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002e93cd8, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!KiTryUnwaitThread+28
fffff800`02e93cd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c70e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  installShell64

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88008966238 -- (.exr 0xfffff88008966238)
ExceptionAddress: fffff80002e93cd8 (nt!KiTryUnwaitThread+0x0000000000000028)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff880089662e0 -- (.trap 0xfffff880089662e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88008966728 rbx=0000000000000000 rcx=fffff88002f63180
rdx=fffff8000318ecce rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e93cd8 rsp=fffff88008966470 rbp=0000000000000000
 r8=0000000000000100  r9=0000000000000000 r10=0000000000000002
r11=fffffa8002c05f40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`02e93cd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0 ds:c2a0:00000000`00000040=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ec9a39 to fffff80002e8f740

STACK_TEXT:  
fffff880`08965a68 fffff800`02ec9a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02e93cd8 00000000`00000000 : nt!KeBugCheckEx
fffff880`08965a70 fffff800`02e8ed82 : fffff880`08966238 415e415f`4120c483 fffff880`089662e0 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`08966100 fffff800`02e8d68a : fffffa80`034c1702 00000000`00000000 fffffa80`031a03f0 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`089662e0 fffff800`02e93cd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`08966470 fffff800`02f0af74 : fffffa80`054aba60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
fffff880`089664d0 fffff800`02e6c0c7 : ffd05b0a`e8ce8b48 00000000`00000000 00000000`00000000 fffffa80`00000000 : nt! ?? ::FNODOBFM::`string'+0x3ca30
fffff880`089665a0 fffff800`02eea098 : fffffa80`02d00220 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`08966620 fffff800`03190864 : fffffa80`00000000 fffff8a0`00000001 00000000`01000000 fffff8a0`02b12900 : nt! ?? ::FNODOBFM::`string'+0xf57e
fffff880`089666a0 fffff880`08966728 : fffff880`08966728 00000000`00000000 00000000`00000000 fffff880`010d0000 : nt!AlpcpCompleteDispatchMessage+0x9a4
fffff880`08966730 fffff880`08966728 : 00000000`00000000 00000000`00000000 fffff880`010d0000 00000000`00010000 : 0xfffff880`08966728
fffff880`08966738 00000000`00000000 : 00000000`00000000 fffff880`010d0000 00000000`00010000 fffff880`08966948 : 0xfffff880`08966728


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiTryUnwaitThread+28
fffff800`02e93cd8 f0480fba6b4000  lock bts qword ptr [rbx+40h],0

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiTryUnwaitThread+28

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!KiTryUnwaitThread+28

BUCKET_ID:  X64_0x1E_c0000005_nt!KiTryUnwaitThread+28

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\123010-24195-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e65000 PsLoadedModuleList = 0xfffff800`030a2e50
Debug session time: Thu Dec 30 11:36:52.368 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:43.945
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 18, {0, fffffa8003370000, 2, ffffffffffffffff}

Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mfehidk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
Probably caused by : mfehidk.sys ( mfehidk+4827d )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: fffffa8003370000, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: ffffffffffffffff, Reserved
	The reference count of an object is illegal for the current state of the object.
	Each time a driver uses a pointer to an object the driver calls a kernel routine
	to increment the reference count of the object. When the driver is done with the
	pointer the driver calls another kernel routine to decrement the reference count.
	Drivers must match calls to the increment and decrement routines. This bugcheck
	can occur because an object's reference count goes to zero while there are still
	open handles to the object, in which case the fourth parameter indicates the number
	of opened handles. It may also occur when the object’s reference count drops below zero
	whether or not there are open handles to the object, and in that case the fourth parameter
	contains the actual value of the pointer references count.

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x18

PROCESS_NAME:  AtBroker.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002e6cfdc to fffff80002ed5740

STACK_TEXT:  
fffff880`065423a8 fffff800`02e6cfdc : 00000000`00000018 00000000`00000000 fffffa80`03370000 00000000`00000002 : nt!KeBugCheckEx
fffff880`065423b0 fffff880`010b927d : 00000000`00001fc4 fffffa80`00000000 fffffa80`04959010 00000000`00001fc4 : nt! ?? ::FNODOBFM::`string'+0x46411
fffff880`06542410 00000000`00001fc4 : fffffa80`00000000 fffffa80`04959010 00000000`00001fc4 00000000`00000000 : mfehidk+0x4827d
fffff880`06542418 fffffa80`00000000 : fffffa80`04959010 00000000`00001fc4 00000000`00000000 00000000`00000000 : 0x1fc4
fffff880`06542420 fffffa80`04959010 : 00000000`00001fc4 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`00000000
fffff880`06542428 00000000`00001fc4 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03370000 : 0xfffffa80`04959010
fffff880`06542430 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`03370000 fffffa80`04959010 : 0x1fc4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
mfehidk+4827d
fffff880`010b927d ??              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  mfehidk+4827d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mfehidk

IMAGE_NAME:  mfehidk.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cacd445

FAILURE_BUCKET_ID:  X64_0x18_OVER_DEREFERENCE_mfehidk+4827d

BUCKET_ID:  X64_0x18_OVER_DEREFERENCE_mfehidk+4827d

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\123010-28485-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`0304ee50
Debug session time: Thu Dec 30 11:29:16.508 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:46.085
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002ea12b3}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ea12b3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b90e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02ea12b3 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  cvtres.exe

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff880080e6db0 -- (.trap 0xfffff880080e6db0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880080e7428 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ea12b3 rsp=fffff880080e6f40 rbp=0000000000000000
 r8=fffffa800621e010  r9=fffff880080e7040 r10=0000000000000002
r11=fffffa800627be70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02ea12b3 488b09          mov     rcx,qword ptr [rcx] ds:6fb8:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e80ca9 to fffff80002e81740

STACK_TEXT:  
fffff880`080e6c68 fffff800`02e80ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`080e6c70 fffff800`02e7f920 : fffffa80`05bc34e0 fffffa80`05dfe590 00000000`00000000 fffffa80`03c12760 : nt!KiBugCheckDispatch+0x69
fffff880`080e6db0 fffff800`02ea12b3 : fffff8a0`046da140 fffff880`012526fb fffff880`080e7160 fffffa80`0619c010 : nt!KiPageFault+0x260
fffff880`080e6f40 fffff800`02e5e0c7 : 00000000`00000001 fffff8a0`003292e0 00000000`00000100 fffff8a0`00000000 : nt!IopCompleteRequest+0xae3
fffff880`080e7010 fffff800`02e34bb5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`080e7090 fffff800`02ead0f3 : ffffffff`ffffffff 00000000`00000002 fffff880`080e7100 00000000`00000001 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`080e70c0 fffff800`02fb2ceb : 00000000`00002000 00000000`00002000 00000000`00000001 fffff800`02e76dff : nt!MiAllocatePagedPoolPages+0xc73
fffff880`080e71e0 fffff800`02e94050 : 00000000`00002000 fffffa80`02372000 00000000`00000001 fffff800`02fb234f : nt!MiAllocatePoolPages+0x8e2
fffff880`080e7330 00000000`00000200 : 00000001`00000080 fffff880`080e7428 fffff880`080e7428 fffffa80`02372000 : nt!ExpAllocateBigPool+0xb0
fffff880`080e7420 00000001`00000080 : fffff880`080e7428 fffff880`080e7428 fffffa80`02372000 fffffa80`0239e380 : 0x200
fffff880`080e7428 fffff880`080e7428 : fffff880`080e7428 fffffa80`02372000 fffffa80`0239e380 fffff800`02e67b45 : 0x1`00000080
fffff880`080e7430 fffff880`080e7428 : fffffa80`02372000 fffffa80`0239e380 fffff800`02e67b45 00000000`0021b142 : 0xfffff880`080e7428
fffff880`080e7438 fffffa80`02372000 : fffffa80`0239e380 fffff800`02e67b45 00000000`0021b142 fffffa80`03086000 : 0xfffff880`080e7428
fffff880`080e7440 fffffa80`0239e380 : fffff800`02e67b45 00000000`0021b142 fffffa80`03086000 00000000`00000000 : 0xfffffa80`02372000
fffff880`080e7448 fffff800`02e67b45 : 00000000`0021b142 fffffa80`03086000 00000000`00000000 fffff880`080e7520 : 0xfffffa80`0239e380
fffff880`080e7450 fffff880`080e7780 : fffffa80`03af2500 00000000`00002000 00000000`00000000 fffff800`03167e96 : nt!EtwpReserveTraceBuffer+0xe1
fffff880`080e74f0 fffffa80`03af2500 : 00000000`00002000 00000000`00000000 fffff800`03167e96 fffff880`00401802 : 0xfffff880`080e7780
fffff880`080e74f8 00000000`00002000 : 00000000`00000000 fffff800`03167e96 fffff880`00401802 fffffa80`03af25c0 : 0xfffffa80`03af2500
fffff880`080e7500 00000000`00000000 : fffff800`03167e96 fffff880`00401802 fffffa80`03af25c0 fffff8a0`20206f49 : 0x2000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02e7f920 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------



Drivers

Code:
start             end                 module name
fffff880`05384000 fffff880`053c2000   1394ohci 1394ohci.sys Wed Oct 14 23:35:12 2009 (4AD69870)
fffff880`0488c000 fffff880`04898000   Acceler  Acceler.sys  Fri Jun 26 16:56:34 2009 (4A453602)
fffff880`00f23000 fffff880`00f7a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a9c000 fffff880`03b26000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02c00000 fffff880`02c16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c00000 fffff880`00c0b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e2f000 fffff880`00e38000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e38000 fffff880`00e62000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`06565000 fffff880`06586000   AtiHdmi  AtiHdmi.sys  Wed Sep 30 09:54:46 2009 (4AC36326)
fffff880`0647b000 fffff880`064a7000   atikmpag atikmpag.sys Fri Jan 22 08:07:54 2010 (4B59A32A)
fffff880`048b2000 fffff880`04ef6000   atipmdag atipmdag.sys Fri Jan 22 08:46:46 2010 (4B59AC46)
fffff960`00980000 fffff960`009e1000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
fffff880`00feb000 fffff880`00ff7000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`06592000 fffff880`0659b000   BCM42RLY BCM42RLY.sys Tue Jul 07 20:34:55 2009 (4A53E9AF)
fffff880`05047000 fffff880`052ef000   bcmwl664 bcmwl664.sys Tue Jul 07 20:45:04 2009 (4A53EC10)
fffff880`01833000 fffff880`0183a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ce8000 fffff880`02cf9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05b54000 fffff880`05b72000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00750000 fffff960`00777000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`01800000 fffff880`0182a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`065ed000 fffff880`065fa980   cfwids   cfwids.sys   Wed Oct 06 16:00:36 2010 (4CACD564)
fffff880`00ccb000 fffff880`00d8b000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01992000 fffff880`019c2000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c6d000 fffff880`00ccb000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0503f000 fffff880`05043500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`0116d000 fffff880`011e0000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fe2000 fffff880`00feb000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`02dec000 fffff880`02dfc000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`045db000 fffff880`045e9000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02cca000 fffff880`02ce8000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02cbb000 fffff880`02cca000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0197c000 fffff880`01992000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04000000 fffff880`04022000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`045e9000 fffff880`045f5000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04400000 fffff880`04413000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`045f5000 fffff880`04600000   dump_msahci dump_msahci.sys Fri Nov 13 23:36:50 2009 (4AFE33E2)
fffff880`045cf000 fffff880`045db000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04ef6000 fffff880`04fea000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04800000 fffff880`04846000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`065b7000 fffff880`065ed000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01070000 fffff880`01084000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01024000 fffff880`01070000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013cf000 fffff880`013d9000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01942000 fffff880`0197c000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033fb000 fffff800`03444000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04846000 fffff880`0486a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0486a000 fffff880`0487b000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`05a82000 fffff880`05b4a000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01939000 fffff880`01942000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`053c2000 fffff880`053e0000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04898000 fffff880`048ae000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`053e0000 fffff880`053ef000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bbd000 fffff800`00bc0000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`040dc000 fffff880`0411f000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013a4000 fffff880`013be000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04022000 fffff880`04027200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0448f000 fffff880`044a4000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0446c000 fffff880`0448f000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c15000 fffff880`00c59000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0659b000 fffff880`065b6c80   mfeapfk  mfeapfk.sys  Wed Oct 06 15:56:26 2010 (4CACD46A)
fffff880`04538000 fffff880`04564800   mfeavfk  mfeavfk.sys  Wed Oct 06 15:56:49 2010 (4CACD481)
fffff880`04565000 fffff880`045ce780   mfefirek mfefirek.sys Wed Oct 06 15:59:47 2010 (4CACD533)
fffff880`01084000 fffff880`01102c80   mfehidk  mfehidk.sys  Wed Oct 06 15:55:49 2010 (4CACD445)
fffff880`03b6b000 fffff880`03b7b900   mfenlfk  mfenlfk.sys  Wed Oct 06 15:56:13 2010 (4CACD45D)
fffff880`01840000 fffff880`01883200   mfewfpk  mfewfpk.sys  Wed Oct 06 15:56:04 2010 (4CACD454)
fffff880`064a7000 fffff880`064b5000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`053f1000 fffff880`05400000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00e15000 fffff880`00e2f000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05b72000 fffff880`05b8a000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05b8a000 fffff880`05bb7000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05a00000 fffff880`05a4e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05a4e000 fffff880`05a71000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`00e62000 fffff880`00e6d000   msahci   msahci.sys   Fri Nov 13 23:36:50 2009 (4AFE33E2)
fffff880`011e9000 fffff880`011f4000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f83000 fffff880`00f8d000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0110f000 fffff880`0116d000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02cb0000 fffff880`02cbb000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01927000 fffff880`01939000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014e4000 fffff880`015d6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04ff3000 fffff880`04fff000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`044a4000 fffff880`044b7000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03a00000 fffff880`03a2f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0418b000 fffff880`041a0000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03b7c000 fffff880`03b8b000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03a57000 fffff880`03a9c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01000000 fffff880`01011000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02ca4000 fffff880`02cb0000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e1f000 fffff800`033fb000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01201000 fffff880`013a4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0182a000 fffff880`01833000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04028000 fffff880`0407b000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03b2f000 fffff880`03b55000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fcd000 fffff880`00fe2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8d000 fffff880`00fc0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00de7000 fffff880`00df7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013be000 fffff880`013cf000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`060f3000 fffff880`06199000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`041c1000 fffff880`041fe000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c59000 fffff880`00c6d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01103000 fffff880`0110ee00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`02c16000 fffff880`02c3a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03bd4000 fffff880`03bef000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0409f000 fffff880`040c0000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`040c0000 fffff880`040da000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c53000 fffff880`02ca4000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`013e9000 fffff880`013f2000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f2000 fffff880`013fb000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`011e0000 fffff880`011e9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018ed000 fffff880`01927000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05315000 fffff880`0532e000   rimspe64 rimspe64.sys Wed Jul 01 19:54:49 2009 (4A4BF749)
fffff880`052fc000 fffff880`05315000   risdpe64 risdpe64.sys Wed Jul 01 05:31:57 2009 (4A4B2D0D)
fffff880`0532e000 fffff880`05384000   rixdpe64 rixdpe64.sys Sat Jul 04 06:27:00 2009 (4A4F2E74)
fffff880`0407b000 fffff880`04093000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05000000 fffff880`0503f000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`03bba000 fffff880`03bd4000   SCDEmu   SCDEmu.SYS   Mon Apr 12 04:52:25 2010 (4BC2DF49)
fffff880`06199000 fffff880`061a4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`018e5000 fffff880`018ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06400000 fffff880`06471000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`064cf000 fffff880`06565000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06000000 fffff880`06067000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`061a4000 fffff880`061d1000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`018dd000 fffff880`018e5000   stdflt   stdflt.sys   Thu Jul 16 11:36:50 2009 (4A5F4912)
fffff880`044b9000 fffff880`04538000   stwrt64  stwrt64.sys  Thu Jan 21 05:15:11 2010 (4B58292F)
fffff880`040da000 fffff880`040db480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`02da1000 fffff880`02dec000   SynTP    SynTP.sys    Mon Aug 24 13:37:05 2009 (4A92CFC1)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`061d1000 fffff880`061e3000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01884000 fffff880`01891000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`03a39000 fffff880`03a57000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03ba6000 fffff880`03bba000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02cf9000 fffff880`02d1f000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0411f000 fffff880`04131000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04413000 fffff880`04430000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`053ef000 fffff880`053f0f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0487b000 fffff880`0488c000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
fffff880`04131000 fffff880`0418b000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF)
fffff880`02d4b000 fffff880`02da1000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04430000 fffff880`0445d200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00fc0000 fffff880`00fcd000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`014d5000 fffff880`014e3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015d6000 fffff880`015fb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d8b000 fffff880`00de7000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01891000 fffff880`018dd000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`052ef000 fffff880`052fc000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`03b55000 fffff880`03b6b000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`05b4a000 fffff880`05b54000   vwifimp  vwifimp.sys  Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`03b8b000 fffff880`03ba6000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`013d9000 fffff880`013e9000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e70000 fffff880`00f14000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f14000 fffff880`00f23000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b26000 fffff880`03b2f000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00040000 fffff960`00350000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`04fea000 fffff880`04ff3000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f7a000 fffff880`00f83000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`06471000 fffff880`06479000   drmkaud.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
fffff880`0658b000 fffff880`0658d000   MSTEE.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`0658d000 fffff880`0658f000   MSPQM.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`06588000 fffff880`0658b000   MSKSSRV.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00003000
fffff880`06586000 fffff880`06588000   MSPCLOCK.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`041a0000 fffff880`041c1000   AtiHdmi.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00021000
fffff880`02d1f000 fffff880`02d4b000   atikmpag.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002C000
fffff880`0445e000 fffff880`0446c000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`06471000 fffff880`0647b000   atdcm64a.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`06565000 fffff880`06592000   mfeavfk01.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002D000
fffff880`019c2000 fffff880`019d0000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019d0000 fffff880`019dc000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019dc000 fffff880`019e7000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`019e7000 fffff880`019fa000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Back
Top