Help me!!!

#2
Update Realtek LAN driver:
Rt86win7.sys Thu Feb 26 04:04:22 2009




Attach more information as requested in the sticky:


http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html


1) CPU-Z memory tab screenshot
2) CPU_Z CPU tab screenshot
3) RAMMon report saved as HTML




~~~~~~~


KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031811-45848-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x82650000 PsLoadedModuleList = 0x8279a850
Debug session time: Fri Mar 18 04:36:16.114 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:52.408
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 8287a682, 87b178f0, 0}

Probably caused by : ntkrpamp.exe ( nt!ObpWaitForMultipleObjects+14e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8287a682, The address that the exception occurred at
Arg3: 87b178f0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'igdkmd32' and 'igdkmd32.sys' overlap

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpWaitForMultipleObjects+14e
8287a682 8b4110          mov     eax,dword ptr [ecx+10h]

TRAP_FRAME:  87b178f0 -- (.trap 0xffffffff87b178f0)
ErrCode = 00000000
eax=00000000 ebx=855d8798 ecx=00000000 edx=84708808 esi=84708808 edi=a73dc180
eip=8287a682 esp=87b17964 ebp=87b17bc8 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!ObpWaitForMultipleObjects+0x14e:
8287a682 8b4110          mov     eax,dword ptr [ecx+10h] ds:0023:00000010=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 8287a503 to 8287a682

STACK_TEXT:  
87b17bc8 8287a503 00000040 87b17c90 00000001 nt!ObpWaitForMultipleObjects+0x14e
87b17d18 8268e1ea 00000040 001741c0 00000001 nt!NtWaitForMultipleObjects+0xcd
87b17d18 779570b4 00000040 001741c0 00000001 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
006afab0 00000000 00000000 00000000 00000000 0x779570b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ObpWaitForMultipleObjects+14e
8287a682 8b4110          mov     eax,dword ptr [ecx+10h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpWaitForMultipleObjects+14e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09

FAILURE_BUCKET_ID:  0x8E_nt!ObpWaitForMultipleObjects+14e

BUCKET_ID:  0x8E_nt!ObpWaitForMultipleObjects+14e

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-19094-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x8284d000 PsLoadedModuleList = 0x82997850
Debug session time: Sun Mar 20 06:34:21.780 2011 (UTC - 4:00)
System Uptime: 0 days 0:38:56.886
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 82a9310f, 93a7fc2c, 0}

GetPointerFromAddress: unable to read from 829b7718
Unable to read MiSystemVaType memory at 829971a0
GetPointerFromAddress: unable to read from 829b7718
Unable to read MiSystemVaType memory at 829971a0
GetPointerFromAddress: unable to read from 829b7718
Unable to read MiSystemVaType memory at 829971a0
Probably caused by : ntkrpamp.exe ( nt!ObpCloseHandleTableEntry+28 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a9310f, The address that the exception occurred at
Arg3: 93a7fc2c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------

GetPointerFromAddress: unable to read from 829b7718
Unable to read MiSystemVaType memory at 829971a0
GetPointerFromAddress: unable to read from 829b7718
Unable to read MiSystemVaType memory at 829971a0
GetPointerFromAddress: unable to read from 829b7718
Unable to read MiSystemVaType memory at 829971a0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpCloseHandleTableEntry+28
82a9310f 837b7400        cmp     dword ptr [ebx+74h],0

TRAP_FRAME:  93a7fc2c -- (.trap 0xffffffff93a7fc2c)
ErrCode = 00000000
eax=93865b40 ebx=00000000 ecx=00000000 edx=85d34b28 esi=85d34b28 edi=85dd5d48
eip=82a9310f esp=93a7fca0 ebp=93a7fcdc iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!ObpCloseHandleTableEntry+0x28:
82a9310f 837b7400        cmp     dword ptr [ebx+74h],0 ds:0023:00000074=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  sidebar.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 82a9302e to 82a9310f

STACK_TEXT:  
93a7fcdc 82a9302e 9227b170 93865b40 85dd7728 nt!ObpCloseHandleTableEntry+0x28
93a7fd0c 82a933c8 85dd7728 85dd5d01 021df340 nt!ObpCloseHandle+0x7f
93a7fd28 8288b1ea 000005a0 021df340 77b470b4 nt!NtClose+0x4e
93a7fd28 77b470b4 000005a0 021df340 77b470b4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
021df340 00000000 00000000 00000000 00000000 0x77b470b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ObpCloseHandleTableEntry+28
82a9310f 837b7400        cmp     dword ptr [ebx+74h],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCloseHandleTableEntry+28

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09

FAILURE_BUCKET_ID:  0x8E_nt!ObpCloseHandleTableEntry+28

BUCKET_ID:  0x8E_nt!ObpCloseHandleTableEntry+28

Followup: MachineOwner
---------



























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031911-31496-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x82801000 PsLoadedModuleList = 0x8294b850
Debug session time: Fri Mar 18 22:15:19.321 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:06.428
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000003, the pool freelist is corrupt.
Arg2: 915c44e8, the pool entry being checked.
Arg3: 915c44e8, the read back flink freelist value (should be the same as 2).
Arg4: 915c40e8, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 8292335f to 82923996

STACK_TEXT:  
807fea28 8292335f 8411e140 00000000 ffff7fff nt!ExDeferredFreePool+0x336
807fea90 82fe1e69 903e0ca0 6e664d46 807feaac nt!ExFreePoolWithTag+0x8a4
807feaa0 82fe1eb9 903e0ccc 807feac4 82fe2282 fltmgr!FltpFreeFileNameInformation+0x17
807feaac 82fe2282 903e0ccc 84f43008 859dfac8 fltmgr!FltReleaseFileNameInformation+0x2b
807feac4 82fe2311 859dfac8 00008000 ffffffff fltmgr!DeleteNameCacheNodes+0xfe
807feae0 82fe57af 84f43008 859dfac8 859dfb08 fltmgr!FltpFreeNameCacheList+0x17
807feafc 82fe59b4 859dfac8 8976cb30 00000000 fltmgr!CleanupStreamListCtrl+0x37
807feb10 82a811e1 859dfacc 965e9a9e 00000000 fltmgr!DeleteStreamListCtrlCallback+0x5a
807feb50 86cce89c 8976cb30 8976ca40 8976cb30 nt!FsRtlTeardownPerStreamContexts+0x13a
807feb6c 86cbf0b5 00000705 8976ca68 8976ca40 Ntfs!NtfsDeleteScb+0x214
807feb84 86c429e2 842898d8 8976cb30 00000000 Ntfs!NtfsRemoveScb+0xc5
807feba0 86cce2d7 842898d8 8976ca40 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x62
807febe4 86c3e2cb 842898d8 8976cb30 8976ccd8 Ntfs!NtfsTeardownStructures+0x68
807fec0c 86cd2331 842898d8 8976cb30 8976ccd8 Ntfs!NtfsDecrementCloseCounts+0xaf
807fec6c 86cd6414 842898d8 8976cb30 8976ca40 Ntfs!NtfsCommonClose+0x4f2
807fed00 8287eaab 00000000 00000000 841a89e8 Ntfs!NtfsFspClose+0x118
807fed50 82a0af5e 00000000 965e9c5e 00000000 nt!ExpWorkerThread+0x10d
807fed90 828b2219 8287e99e 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+336
82923996 cc              int     3

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExDeferredFreePool+336

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  0x19_3_nt!ExDeferredFreePool+336

BUCKET_ID:  0x19_3_nt!ExDeferredFreePool+336

Followup: Pool_corruption
---------
























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032011-17113-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x8284f000 PsLoadedModuleList = 0x82999850
Debug session time: Sun Mar 20 11:37:27.292 2011 (UTC - 4:00)
System Uptime: 0 days 2:52:58.274
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 82a91360, a87bc8e8, 0}

Probably caused by : ntkrpamp.exe ( nt!CmpGetNameControlBlock+107 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a91360, The address that the exception occurred at
Arg3: a87bc8e8, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpGetNameControlBlock+107
82a91360 3b01            cmp     eax,dword ptr [ecx]

TRAP_FRAME:  a87bc8e8 -- (.trap 0xffffffffa87bc8e8)
ErrCode = 00000000
eax=2a5738f7 ebx=a87bc9a0 ecx=74655350 edx=1710291e esi=7465534c edi=87a0f000
eip=82a91360 esp=a87bc95c ebp=a87bc980 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!CmpGetNameControlBlock+0x107:
82a91360 3b01            cmp     eax,dword ptr [ecx]  ds:0023:74655350=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 82ad48ae to 82a91360

STACK_TEXT:  
a87bc980 82ad48ae 0000004c 017bc9b7 8e9d38ec nt!CmpGetNameControlBlock+0x107
a87bc9b8 82a7e76c 8d3bc9c8 0025e8e8 925cfd28 nt!CmpCreateKeyControlBlock+0x4e8
a87bcb48 82a75ac5 aaaf8a68 8419f3c0 842e7d20 nt!CmpParseKey+0xa1e
a87bcbc4 82a85ed6 00000810 a87bcc18 00000040 nt!ObpLookupObjectName+0x4fa
a87bcc20 82a83e07 0e24f2a8 8419f3c0 00000001 nt!ObOpenObjectByName+0x165
a87bcd00 82a60af5 0e24f398 00020019 0e24f2a8 nt!CmOpenKey+0x1f4
a87bcd1c 8288d1ea 0e24f398 00020019 0e24f2a8 nt!NtOpenKeyEx+0x18
a87bcd1c 773970b4 0e24f398 00020019 0e24f2a8 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0e24f2e8 00000000 00000000 00000000 00000000 0x773970b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!CmpGetNameControlBlock+107
82a91360 3b01            cmp     eax,dword ptr [ecx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpGetNameControlBlock+107

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09

FAILURE_BUCKET_ID:  0x8E_nt!CmpGetNameControlBlock+107

BUCKET_ID:  0x8E_nt!CmpGetNameControlBlock+107

Followup: MachineOwner
---------




DRIVERS

Code:
start    end        module name
86a8a000 86ad2000   ACPI     ACPI.sys     Sat Nov 20 03:37:52 2010 (4CE788E0)
8b02c000 8b086000   afd      afd.sys      Sat Nov 20 03:40:00 2010 (4CE78960)
8c91a000 8c92c000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
86bdb000 86be4000   amdxata  amdxata.sys  Fri Mar 19 12:19:01 2010 (4BA3A3F5)
86baf000 86bb8000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
86bb8000 86bdb000   ataport  ataport.SYS  Sat Nov 20 03:38:00 2010 (4CE788E8)
86e2e000 86e35000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8b1a3000 8b1b1000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
82ed3000 82edb000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9269d000 926b6000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
92170000 9218e000   cdd      cdd.dll      Sat Nov 20 06:56:35 2010 (4CE7B773)
82f1d000 82fc8000   CI       CI.dll       Sat Nov 20 07:05:17 2010 (4CE7B97D)
86fb1000 86fd6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
82edb000 82f1d000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
86d99000 86df6000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
8c90d000 8c91a000   CompositeBus CompositeBus.sys Sat Nov 20 04:50:21 2010 (4CE799DD)
8bd83000 8bd90000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8b18b000 8b1a3000   dfsc     dfsc.sys     Sat Nov 20 03:42:32 2010 (4CE789F8)
8b17f000 8b18b000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
87008000 87019000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
8bd03000 8bd1c000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
8bd9b000 8bda4000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8bd90000 8bd9b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8bda4000 8bdb5000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8bdb5000 8bdbf000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
8c710000 8c7c7000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:08:14 2010 (4CE78FFE)
8c7c7000 8c800000   dxgmms1  dxgmms1.sys  Wed Feb 02 22:45:05 2011 (4D4A24C1)
8bd1c000 8bd46000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
86be4000 86bf5000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
82fc8000 82ffc000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
86c0e000 86c17000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
86f7f000 86fb1000   fvevol   fvevol.sys   Sat Nov 20 03:40:22 2010 (4CE78976)
87173000 871a4000   fwpkclnt fwpkclnt.sys Sat Nov 20 03:39:08 2010 (4CE7892C)
82818000 8284f000   hal      halmacpi.dll Sat Nov 20 03:37:38 2010 (4CE788D2)
8c810000 8c82f000   HDAudBus HDAudBus.sys Sat Nov 20 04:59:28 2010 (4CE79C00)
8bc84000 8bcd4000   HdAudio  HdAudio.sys  Sat Nov 20 05:00:19 2010 (4CE79C33)
92618000 9269d000   HTTP     HTTP.sys     Sat Nov 20 03:40:17 2010 (4CE78971)
87000000 87008000   hwpolicy hwpolicy.sys Sat Nov 20 03:37:35 2010 (4CE788CF)
8c8db000 8c8f3000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
92748000 92760000   idmwfp   idmwfp.sys   Thu Mar 17 11:32:06 2011 (4D822976)
8c207000 8c710000   igdkmd32 igdkmd32.sys Wed Sep 23 15:18:09 2009 (4ABA7471)
86b84000 86b8b000   intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8b1d2000 8b1e4000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8c900000 8c90d000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bd4000 80bdc000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8c9b9000 8c9ed000   ks       ks.sys       Sat Nov 20 04:50:17 2010 (4CE799D9)
86d86000 86d99000   ksecdd   ksecdd.sys   Sat Nov 20 03:38:54 2010 (4CE7891E)
86f2d000 86f52000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
8bc00000 8bc10000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8bdca000 8bde5000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
82e3d000 82ec2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 07:00:54 2010 (4CE7B876)
8bdbf000 8bdca000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
8c8f3000 8c900000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
86b99000 86baf000   mountmgr mountmgr.sys Sat Nov 20 03:38:09 2010 (4CE788F1)
86e00000 86e26680   MpFilter MpFilter.sys Tue Sep 14 17:23:59 2010 (4C8FE7EF)
936f0000 936f5900   MpKslec536325 MpKslec536325.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
936da000 936e3200   MpNWMon  MpNWMon.sys  Tue Sep 14 17:23:50 2010 (4C8FE7E6)
926b6000 926c8000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
926c8000 926eb000   mrxsmb   mrxsmb.sys   Sat Nov 20 03:42:40 2010 (4CE78A00)
926eb000 92726000   mrxsmb10 mrxsmb10.sys Sat Nov 20 03:44:15 2010 (4CE78A5F)
92726000 92741000   mrxsmb20 mrxsmb20.sys Sat Nov 20 03:42:47 2010 (4CE78A07)
86a00000 86a0b000   Msfs     Msfs.SYS     unavailable (00000000)
86adb000 86ae3000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
86d5b000 86d86000   msrpc    msrpc.sys    unavailable (00000000)
8b175000 8b17f000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
871eb000 871fb000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
86e38000 86eef000   ndis     ndis.sys     Sat Nov 20 03:39:19 2010 (4CE78937)
8c944000 8c94f000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8c94f000 8c971000   ndiswan  ndiswan.sys  Sat Nov 20 05:07:48 2010 (4CE79DF4)
8bc73000 8bc84000   NDProxy  NDProxy.SYS  Sat Nov 20 05:07:39 2010 (4CE79DEB)
8b0de000 8b0ec000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8b086000 8b0b8000   netbt    netbt.sys    Sat Nov 20 03:39:22 2010 (4CE7893A)
86eef000 86f2d000   NETIO    NETIO.SYS    Sat Nov 20 03:40:03 2010 (4CE78963)
936e4000 936efc00   NisDrvWFP NisDrvWFP.sys Tue Sep 14 17:24:12 2010 (4C8FE7FC)
82e2e000 82e3c000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8b16b000 8b175000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
8284f000 82c61000   nt       ntkrpamp.exe Sat Nov 20 03:42:49 2010 (4CE78A09)
86c2c000 86d5b000   Ntfs     Ntfs.sys     Sat Nov 20 03:39:08 2010 (4CE7892C)
86e27000 86e2e000   Null     Null.SYS     unavailable (00000000)
8b0bf000 8b0de000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8c8c3000 8c8db000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
86b18000 86b29000   partmgr  partmgr.sys  Sat Nov 20 03:38:14 2010 (4CE788F6)
92741000 92748000   parvdm   parvdm.sys   unavailable (00000000)
86ae3000 86b0d000   pci      pci.sys      Sat Nov 20 03:37:57 2010 (4CE788E5)
86b8b000 86b99000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
86c00000 86c0e000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
92760000 927f7000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
8bcd4000 8bd03000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
82ec2000 82ed3000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8c92c000 8c944000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
8c971000 8c989000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8c989000 8c9a0000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
8c9a0000 8c9b7000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8b12a000 8b16b000   rdbss    rdbss.sys    Sat Nov 20 03:42:44 2010 (4CE78A04)
86c23000 86c2b000   RDPCDD   RDPCDD.sys   Sat Nov 20 05:22:19 2010 (4CE7A15B)
86df6000 86dfe000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
86bf5000 86bfd000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
86f52000 86f7f000   rdyboost rdyboost.sys Sat Nov 20 04:00:07 2010 (4CE78E17)
8bc10000 8bc23000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8c82f000 8c854000   Rt86win7 Rt86win7.sys Thu Feb 26 04:04:22 2009 (49A65B16)
92600000 9260a000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
8c8b9000 8c8c3000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8b0ec000 8b106000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
871e3000 871eb000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
93689000 936da000   srv      srv.sys      Sat Nov 20 03:45:29 2010 (4CE78AA9)
9363a000 93689000   srv2     srv2.sys     Sat Nov 20 03:44:35 2010 (4CE78A73)
86fd6000 86ff7000   srvnet   srvnet.sys   Sat Nov 20 03:44:27 2010 (4CE78A6B)
8c9b7000 8c9b8380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
87029000 87173000   tcpip    tcpip.sys    Sat Nov 20 03:41:36 2010 (4CE789C0)
9260a000 92617000   tcpipreg tcpipreg.sys Sat Nov 20 05:07:13 2010 (4CE79DD1)
8b020000 8b02c000   TDI      TDI.SYS      Sat Nov 20 03:39:18 2010 (4CE78936)
8b009000 8b020000   tdx      tdx.sys      Sat Nov 20 03:39:17 2010 (4CE78935)
8b119000 8b12a000   termdd   termdd.sys   Sat Nov 20 05:21:10 2010 (4CE7A116)
92140000 92149000   TSDDD    TSDDD.dll    unavailable (00000000)
8b1b1000 8b1d2000   tunnel   tunnel.sys   Sat Nov 20 05:06:40 2010 (4CE79DB0)
8c9ed000 8c9fb000   umbus    umbus.sys    Sat Nov 20 05:00:23 2010 (4CE79C37)
8bd46000 8bd5d000   usbccgp  usbccgp.sys  Sat Nov 20 05:00:08 2010 (4CE79C28)
8bd5d000 8bd5e700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
8c8aa000 8c8b9000   usbehci  usbehci.sys  Sat Nov 20 04:59:43 2010 (4CE79C0F)
8bc2f000 8bc73000   usbhub   usbhub.sys   Sat Nov 20 05:00:34 2010 (4CE79C42)
8c85f000 8c8aa000   USBPORT  USBPORT.SYS  Sat Nov 20 04:59:49 2010 (4CE79C15)
8c854000 8c85f000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
8bd5f000 8bd82c00   usbvideo usbvideo.sys Sat Nov 20 05:00:20 2010 (4CE79C34)
86b0d000 86b18000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
86c17000 86c23000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
82e00000 82e21000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
86b29000 86b39000   volmgr   volmgr.sys   Sat Nov 20 03:38:06 2010 (4CE788EE)
86b39000 86b84000   volmgrx  volmgrx.sys  unavailable (00000000)
871a4000 871e3000   volsnap  volsnap.sys  Sat Nov 20 03:38:13 2010 (4CE788F5)
8b106000 8b119000   wanarp   wanarp.sys   Sat Nov 20 05:07:45 2010 (4CE79DF1)
82e21000 82e2e000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
86a0b000 86a7c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
86a7c000 86a8a000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b0b8000 8b0bf000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
91ee0000 9212d000   win32k   win32k.sys   Tue Jan 04 22:50:40 2011 (4D23EA90)
86ad2000 86adb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8bde5000 8bdff000   WudfPf   WudfPf.sys   Sat Nov 20 04:58:55 2010 (4CE79BDF)

Unloaded modules:
936fb000 93765000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
936f6000 936f8000   MSTEE.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
936f8000 936fb000   MSKSSRV.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00003000
87019000 87026000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
86fd6000 86fe1000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
86fe1000 86fea000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
86fea000 86ffb000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
86e00000 86e1f000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001F000
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.