Help me!!!

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by decisive, Mar 20, 2011.

  1. decisive

    decisive New Member

    Joined:
    Mar 20, 2011
    Messages:
    2
    Likes Received:
    0
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Update Realtek LAN driver:
    Rt86win7.sys Thu Feb 26 04:04:22 2009




    Attach more information as requested in the sticky:


    http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html


    1) CPU-Z memory tab screenshot
    2) CPU_Z CPU tab screenshot
    3) RAMMon report saved as HTML




    ~~~~~~~


    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)


    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031811-45848-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x82650000 PsLoadedModuleList = 0x8279a850
    Debug session time: Fri Mar 18 04:36:16.114 2011 (UTC - 4:00)
    System Uptime: 0 days 0:06:52.408
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 8287a682, 87b178f0, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!ObpWaitForMultipleObjects+14e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8287a682, The address that the exception occurred at
    Arg3: 87b178f0, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'igdkmd32' and 'igdkmd32.sys' overlap
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ObpWaitForMultipleObjects+14e
    8287a682 8b4110          mov     eax,dword ptr [ecx+10h]
    
    TRAP_FRAME:  87b178f0 -- (.trap 0xffffffff87b178f0)
    ErrCode = 00000000
    eax=00000000 ebx=855d8798 ecx=00000000 edx=84708808 esi=84708808 edi=a73dc180
    eip=8287a682 esp=87b17964 ebp=87b17bc8 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!ObpWaitForMultipleObjects+0x14e:
    8287a682 8b4110          mov     eax,dword ptr [ecx+10h] ds:0023:00000010=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 8287a503 to 8287a682
    
    STACK_TEXT:  
    87b17bc8 8287a503 00000040 87b17c90 00000001 nt!ObpWaitForMultipleObjects+0x14e
    87b17d18 8268e1ea 00000040 001741c0 00000001 nt!NtWaitForMultipleObjects+0xcd
    87b17d18 779570b4 00000040 001741c0 00000001 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    006afab0 00000000 00000000 00000000 00000000 0x779570b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ObpWaitForMultipleObjects+14e
    8287a682 8b4110          mov     eax,dword ptr [ecx+10h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ObpWaitForMultipleObjects+14e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09
    
    FAILURE_BUCKET_ID:  0x8E_nt!ObpWaitForMultipleObjects+14e
    
    BUCKET_ID:  0x8E_nt!ObpWaitForMultipleObjects+14e
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032011-19094-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x8284d000 PsLoadedModuleList = 0x82997850
    Debug session time: Sun Mar 20 06:34:21.780 2011 (UTC - 4:00)
    System Uptime: 0 days 0:38:56.886
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 82a9310f, 93a7fc2c, 0}
    
    GetPointerFromAddress: unable to read from 829b7718
    Unable to read MiSystemVaType memory at 829971a0
    GetPointerFromAddress: unable to read from 829b7718
    Unable to read MiSystemVaType memory at 829971a0
    GetPointerFromAddress: unable to read from 829b7718
    Unable to read MiSystemVaType memory at 829971a0
    Probably caused by : ntkrpamp.exe ( nt!ObpCloseHandleTableEntry+28 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82a9310f, The address that the exception occurred at
    Arg3: 93a7fc2c, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    GetPointerFromAddress: unable to read from 829b7718
    Unable to read MiSystemVaType memory at 829971a0
    GetPointerFromAddress: unable to read from 829b7718
    Unable to read MiSystemVaType memory at 829971a0
    GetPointerFromAddress: unable to read from 829b7718
    Unable to read MiSystemVaType memory at 829971a0
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ObpCloseHandleTableEntry+28
    82a9310f 837b7400        cmp     dword ptr [ebx+74h],0
    
    TRAP_FRAME:  93a7fc2c -- (.trap 0xffffffff93a7fc2c)
    ErrCode = 00000000
    eax=93865b40 ebx=00000000 ecx=00000000 edx=85d34b28 esi=85d34b28 edi=85dd5d48
    eip=82a9310f esp=93a7fca0 ebp=93a7fcdc iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    nt!ObpCloseHandleTableEntry+0x28:
    82a9310f 837b7400        cmp     dword ptr [ebx+74h],0 ds:0023:00000074=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  sidebar.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82a9302e to 82a9310f
    
    STACK_TEXT:  
    93a7fcdc 82a9302e 9227b170 93865b40 85dd7728 nt!ObpCloseHandleTableEntry+0x28
    93a7fd0c 82a933c8 85dd7728 85dd5d01 021df340 nt!ObpCloseHandle+0x7f
    93a7fd28 8288b1ea 000005a0 021df340 77b470b4 nt!NtClose+0x4e
    93a7fd28 77b470b4 000005a0 021df340 77b470b4 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    021df340 00000000 00000000 00000000 00000000 0x77b470b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ObpCloseHandleTableEntry+28
    82a9310f 837b7400        cmp     dword ptr [ebx+74h],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ObpCloseHandleTableEntry+28
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09
    
    FAILURE_BUCKET_ID:  0x8E_nt!ObpCloseHandleTableEntry+28
    
    BUCKET_ID:  0x8E_nt!ObpCloseHandleTableEntry+28
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\031911-31496-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x82801000 PsLoadedModuleList = 0x8294b850
    Debug session time: Fri Mar 18 22:15:19.321 2011 (UTC - 4:00)
    System Uptime: 0 days 0:06:06.428
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........
    Loading User Symbols
    Loading unloaded module list
    ....
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 00000003, the pool freelist is corrupt.
    Arg2: 915c44e8, the pool entry being checked.
    Arg3: 915c44e8, the read back flink freelist value (should be the same as 2).
    Arg4: 915c40e8, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 8292335f to 82923996
    
    STACK_TEXT:  
    807fea28 8292335f 8411e140 00000000 ffff7fff nt!ExDeferredFreePool+0x336
    807fea90 82fe1e69 903e0ca0 6e664d46 807feaac nt!ExFreePoolWithTag+0x8a4
    807feaa0 82fe1eb9 903e0ccc 807feac4 82fe2282 fltmgr!FltpFreeFileNameInformation+0x17
    807feaac 82fe2282 903e0ccc 84f43008 859dfac8 fltmgr!FltReleaseFileNameInformation+0x2b
    807feac4 82fe2311 859dfac8 00008000 ffffffff fltmgr!DeleteNameCacheNodes+0xfe
    807feae0 82fe57af 84f43008 859dfac8 859dfb08 fltmgr!FltpFreeNameCacheList+0x17
    807feafc 82fe59b4 859dfac8 8976cb30 00000000 fltmgr!CleanupStreamListCtrl+0x37
    807feb10 82a811e1 859dfacc 965e9a9e 00000000 fltmgr!DeleteStreamListCtrlCallback+0x5a
    807feb50 86cce89c 8976cb30 8976ca40 8976cb30 nt!FsRtlTeardownPerStreamContexts+0x13a
    807feb6c 86cbf0b5 00000705 8976ca68 8976ca40 Ntfs!NtfsDeleteScb+0x214
    807feb84 86c429e2 842898d8 8976cb30 00000000 Ntfs!NtfsRemoveScb+0xc5
    807feba0 86cce2d7 842898d8 8976ca40 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x62
    807febe4 86c3e2cb 842898d8 8976cb30 8976ccd8 Ntfs!NtfsTeardownStructures+0x68
    807fec0c 86cd2331 842898d8 8976cb30 8976ccd8 Ntfs!NtfsDecrementCloseCounts+0xaf
    807fec6c 86cd6414 842898d8 8976cb30 8976ca40 Ntfs!NtfsCommonClose+0x4f2
    807fed00 8287eaab 00000000 00000000 841a89e8 Ntfs!NtfsFspClose+0x118
    807fed50 82a0af5e 00000000 965e9c5e 00000000 nt!ExpWorkerThread+0x10d
    807fed90 828b2219 8287e99e 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+336
    82923996 cc              int     3
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+336
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  0x19_3_nt!ExDeferredFreePool+336
    
    BUCKET_ID:  0x19_3_nt!ExDeferredFreePool+336
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032011-17113-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x8284f000 PsLoadedModuleList = 0x82999850
    Debug session time: Sun Mar 20 11:37:27.292 2011 (UTC - 4:00)
    System Uptime: 0 days 2:52:58.274
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 82a91360, a87bc8e8, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!CmpGetNameControlBlock+107 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82a91360, The address that the exception occurred at
    Arg3: a87bc8e8, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpGetNameControlBlock+107
    82a91360 3b01            cmp     eax,dword ptr [ecx]
    
    TRAP_FRAME:  a87bc8e8 -- (.trap 0xffffffffa87bc8e8)
    ErrCode = 00000000
    eax=2a5738f7 ebx=a87bc9a0 ecx=74655350 edx=1710291e esi=7465534c edi=87a0f000
    eip=82a91360 esp=a87bc95c ebp=a87bc980 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!CmpGetNameControlBlock+0x107:
    82a91360 3b01            cmp     eax,dword ptr [ecx]  ds:0023:74655350=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82ad48ae to 82a91360
    
    STACK_TEXT:  
    a87bc980 82ad48ae 0000004c 017bc9b7 8e9d38ec nt!CmpGetNameControlBlock+0x107
    a87bc9b8 82a7e76c 8d3bc9c8 0025e8e8 925cfd28 nt!CmpCreateKeyControlBlock+0x4e8
    a87bcb48 82a75ac5 aaaf8a68 8419f3c0 842e7d20 nt!CmpParseKey+0xa1e
    a87bcbc4 82a85ed6 00000810 a87bcc18 00000040 nt!ObpLookupObjectName+0x4fa
    a87bcc20 82a83e07 0e24f2a8 8419f3c0 00000001 nt!ObOpenObjectByName+0x165
    a87bcd00 82a60af5 0e24f398 00020019 0e24f2a8 nt!CmOpenKey+0x1f4
    a87bcd1c 8288d1ea 0e24f398 00020019 0e24f2a8 nt!NtOpenKeyEx+0x18
    a87bcd1c 773970b4 0e24f398 00020019 0e24f2a8 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0e24f2e8 00000000 00000000 00000000 00000000 0x773970b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!CmpGetNameControlBlock+107
    82a91360 3b01            cmp     eax,dword ptr [ecx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!CmpGetNameControlBlock+107
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09
    
    FAILURE_BUCKET_ID:  0x8E_nt!CmpGetNameControlBlock+107
    
    BUCKET_ID:  0x8E_nt!CmpGetNameControlBlock+107
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start    end        module name
    86a8a000 86ad2000   ACPI     ACPI.sys     Sat Nov 20 03:37:52 2010 (4CE788E0)
    8b02c000 8b086000   afd      afd.sys      Sat Nov 20 03:40:00 2010 (4CE78960)
    8c91a000 8c92c000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    86bdb000 86be4000   amdxata  amdxata.sys  Fri Mar 19 12:19:01 2010 (4BA3A3F5)
    86baf000 86bb8000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    86bb8000 86bdb000   ataport  ataport.SYS  Sat Nov 20 03:38:00 2010 (4CE788E8)
    86e2e000 86e35000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8b1a3000 8b1b1000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    82ed3000 82edb000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    9269d000 926b6000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    92170000 9218e000   cdd      cdd.dll      Sat Nov 20 06:56:35 2010 (4CE7B773)
    82f1d000 82fc8000   CI       CI.dll       Sat Nov 20 07:05:17 2010 (4CE7B97D)
    86fb1000 86fd6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    82edb000 82f1d000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    86d99000 86df6000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    8c90d000 8c91a000   CompositeBus CompositeBus.sys Sat Nov 20 04:50:21 2010 (4CE799DD)
    8bd83000 8bd90000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8b18b000 8b1a3000   dfsc     dfsc.sys     Sat Nov 20 03:42:32 2010 (4CE789F8)
    8b17f000 8b18b000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    87008000 87019000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8bd03000 8bd1c000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    8bd9b000 8bda4000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8bd90000 8bd9b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8bda4000 8bdb5000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    8bdb5000 8bdbf000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    8c710000 8c7c7000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:08:14 2010 (4CE78FFE)
    8c7c7000 8c800000   dxgmms1  dxgmms1.sys  Wed Feb 02 22:45:05 2011 (4D4A24C1)
    8bd1c000 8bd46000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
    86be4000 86bf5000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    82fc8000 82ffc000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    86c0e000 86c17000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    86f7f000 86fb1000   fvevol   fvevol.sys   Sat Nov 20 03:40:22 2010 (4CE78976)
    87173000 871a4000   fwpkclnt fwpkclnt.sys Sat Nov 20 03:39:08 2010 (4CE7892C)
    82818000 8284f000   hal      halmacpi.dll Sat Nov 20 03:37:38 2010 (4CE788D2)
    8c810000 8c82f000   HDAudBus HDAudBus.sys Sat Nov 20 04:59:28 2010 (4CE79C00)
    8bc84000 8bcd4000   HdAudio  HdAudio.sys  Sat Nov 20 05:00:19 2010 (4CE79C33)
    92618000 9269d000   HTTP     HTTP.sys     Sat Nov 20 03:40:17 2010 (4CE78971)
    87000000 87008000   hwpolicy hwpolicy.sys Sat Nov 20 03:37:35 2010 (4CE788CF)
    8c8db000 8c8f3000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    92748000 92760000   idmwfp   idmwfp.sys   Thu Mar 17 11:32:06 2011 (4D822976)
    8c207000 8c710000   igdkmd32 igdkmd32.sys Wed Sep 23 15:18:09 2009 (4ABA7471)
    86b84000 86b8b000   intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8b1d2000 8b1e4000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8c900000 8c90d000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    80bd4000 80bdc000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8c9b9000 8c9ed000   ks       ks.sys       Sat Nov 20 04:50:17 2010 (4CE799D9)
    86d86000 86d99000   ksecdd   ksecdd.sys   Sat Nov 20 03:38:54 2010 (4CE7891E)
    86f2d000 86f52000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
    8bc00000 8bc10000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    8bdca000 8bde5000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    82e3d000 82ec2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 07:00:54 2010 (4CE7B876)
    8bdbf000 8bdca000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8c8f3000 8c900000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    86b99000 86baf000   mountmgr mountmgr.sys Sat Nov 20 03:38:09 2010 (4CE788F1)
    86e00000 86e26680   MpFilter MpFilter.sys Tue Sep 14 17:23:59 2010 (4C8FE7EF)
    936f0000 936f5900   MpKslec536325 MpKslec536325.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
    936da000 936e3200   MpNWMon  MpNWMon.sys  Tue Sep 14 17:23:50 2010 (4C8FE7E6)
    926b6000 926c8000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    926c8000 926eb000   mrxsmb   mrxsmb.sys   Sat Nov 20 03:42:40 2010 (4CE78A00)
    926eb000 92726000   mrxsmb10 mrxsmb10.sys Sat Nov 20 03:44:15 2010 (4CE78A5F)
    92726000 92741000   mrxsmb20 mrxsmb20.sys Sat Nov 20 03:42:47 2010 (4CE78A07)
    86a00000 86a0b000   Msfs     Msfs.SYS     unavailable (00000000)
    86adb000 86ae3000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    86d5b000 86d86000   msrpc    msrpc.sys    unavailable (00000000)
    8b175000 8b17f000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    871eb000 871fb000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    86e38000 86eef000   ndis     ndis.sys     Sat Nov 20 03:39:19 2010 (4CE78937)
    8c944000 8c94f000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    8c94f000 8c971000   ndiswan  ndiswan.sys  Sat Nov 20 05:07:48 2010 (4CE79DF4)
    8bc73000 8bc84000   NDProxy  NDProxy.SYS  Sat Nov 20 05:07:39 2010 (4CE79DEB)
    8b0de000 8b0ec000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    8b086000 8b0b8000   netbt    netbt.sys    Sat Nov 20 03:39:22 2010 (4CE7893A)
    86eef000 86f2d000   NETIO    NETIO.SYS    Sat Nov 20 03:40:03 2010 (4CE78963)
    936e4000 936efc00   NisDrvWFP NisDrvWFP.sys Tue Sep 14 17:24:12 2010 (4C8FE7FC)
    82e2e000 82e3c000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    8b16b000 8b175000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    8284f000 82c61000   nt       ntkrpamp.exe Sat Nov 20 03:42:49 2010 (4CE78A09)
    86c2c000 86d5b000   Ntfs     Ntfs.sys     Sat Nov 20 03:39:08 2010 (4CE7892C)
    86e27000 86e2e000   Null     Null.SYS     unavailable (00000000)
    8b0bf000 8b0de000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    8c8c3000 8c8db000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
    86b18000 86b29000   partmgr  partmgr.sys  Sat Nov 20 03:38:14 2010 (4CE788F6)
    92741000 92748000   parvdm   parvdm.sys   unavailable (00000000)
    86ae3000 86b0d000   pci      pci.sys      Sat Nov 20 03:37:57 2010 (4CE788E5)
    86b8b000 86b99000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    86c00000 86c0e000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    92760000 927f7000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    8bcd4000 8bd03000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    82ec2000 82ed3000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8c92c000 8c944000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    8c971000 8c989000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    8c989000 8c9a0000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8c9a0000 8c9b7000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8b12a000 8b16b000   rdbss    rdbss.sys    Sat Nov 20 03:42:44 2010 (4CE78A04)
    86c23000 86c2b000   RDPCDD   RDPCDD.sys   Sat Nov 20 05:22:19 2010 (4CE7A15B)
    86df6000 86dfe000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    86bf5000 86bfd000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    86f52000 86f7f000   rdyboost rdyboost.sys Sat Nov 20 04:00:07 2010 (4CE78E17)
    8bc10000 8bc23000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    8c82f000 8c854000   Rt86win7 Rt86win7.sys Thu Feb 26 04:04:22 2009 (49A65B16)
    92600000 9260a000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    8c8b9000 8c8c3000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    8b0ec000 8b106000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    871e3000 871eb000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    93689000 936da000   srv      srv.sys      Sat Nov 20 03:45:29 2010 (4CE78AA9)
    9363a000 93689000   srv2     srv2.sys     Sat Nov 20 03:44:35 2010 (4CE78A73)
    86fd6000 86ff7000   srvnet   srvnet.sys   Sat Nov 20 03:44:27 2010 (4CE78A6B)
    8c9b7000 8c9b8380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    87029000 87173000   tcpip    tcpip.sys    Sat Nov 20 03:41:36 2010 (4CE789C0)
    9260a000 92617000   tcpipreg tcpipreg.sys Sat Nov 20 05:07:13 2010 (4CE79DD1)
    8b020000 8b02c000   TDI      TDI.SYS      Sat Nov 20 03:39:18 2010 (4CE78936)
    8b009000 8b020000   tdx      tdx.sys      Sat Nov 20 03:39:17 2010 (4CE78935)
    8b119000 8b12a000   termdd   termdd.sys   Sat Nov 20 05:21:10 2010 (4CE7A116)
    92140000 92149000   TSDDD    TSDDD.dll    unavailable (00000000)
    8b1b1000 8b1d2000   tunnel   tunnel.sys   Sat Nov 20 05:06:40 2010 (4CE79DB0)
    8c9ed000 8c9fb000   umbus    umbus.sys    Sat Nov 20 05:00:23 2010 (4CE79C37)
    8bd46000 8bd5d000   usbccgp  usbccgp.sys  Sat Nov 20 05:00:08 2010 (4CE79C28)
    8bd5d000 8bd5e700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8c8aa000 8c8b9000   usbehci  usbehci.sys  Sat Nov 20 04:59:43 2010 (4CE79C0F)
    8bc2f000 8bc73000   usbhub   usbhub.sys   Sat Nov 20 05:00:34 2010 (4CE79C42)
    8c85f000 8c8aa000   USBPORT  USBPORT.SYS  Sat Nov 20 04:59:49 2010 (4CE79C15)
    8c854000 8c85f000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    8bd5f000 8bd82c00   usbvideo usbvideo.sys Sat Nov 20 05:00:20 2010 (4CE79C34)
    86b0d000 86b18000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    86c17000 86c23000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    82e00000 82e21000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    86b29000 86b39000   volmgr   volmgr.sys   Sat Nov 20 03:38:06 2010 (4CE788EE)
    86b39000 86b84000   volmgrx  volmgrx.sys  unavailable (00000000)
    871a4000 871e3000   volsnap  volsnap.sys  Sat Nov 20 03:38:13 2010 (4CE788F5)
    8b106000 8b119000   wanarp   wanarp.sys   Sat Nov 20 05:07:45 2010 (4CE79DF1)
    82e21000 82e2e000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    86a0b000 86a7c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    86a7c000 86a8a000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8b0b8000 8b0bf000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    91ee0000 9212d000   win32k   win32k.sys   Tue Jan 04 22:50:40 2011 (4D23EA90)
    86ad2000 86adb000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    8bde5000 8bdff000   WudfPf   WudfPf.sys   Sat Nov 20 04:58:55 2010 (4CE79BDF)
    
    Unloaded modules:
    936fb000 93765000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0006A000
    936f6000 936f8000   MSTEE.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00002000
    936f8000 936fb000   MSKSSRV.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00003000
    87019000 87026000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    86fd6000 86fe1000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    86fe1000 86fea000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    86fea000 86ffb000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
    86e00000 86e1f000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001F000
    
    
     

Share This Page

Loading...