BSOD

Joined
May 9, 2011
Messages
8
Reaction score
0
Hello guys,

I am new here
and getting sometimes the following BSOD on my pc.

driver irql not less or equal

My Minidump filesare in attachment also screenshots from CPU-z

View attachment Minidump.rar
cpu.jpg

Can someone help me please?

Thanks already;

Kasier Sven
 
Last edited:
Joined
Sep 22, 2010
Messages
613
Reaction score
102
RAM is slightly overstock - 1632mhz, a good idea to reduce the frequency to 1600.

~~~~~~~~~~~

GData is the culprit of your blue screens.

A few of your recent crashes were caused by G DATA AntiVirusKit InternetSecurity,

gdwfpcd64.sys Mon Jul 06 21:07:21 2009

Reinstall it with the latest version, or uninstall it and replace it with MSE:

http://www.microsoft.com/en-us/security_essentials/default.aspx


Update Logitech WingMan
LGBusEnum.sys Tue Jul 14 18:34:45 2009





CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042811-17394-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03264000 PsLoadedModuleList = 0xfffff800`034a1e50
Debug session time: Thu Apr 28 11:29:42.866 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:39.193
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 0, fffff880018897a0}

Unable to load image \??\C:\Windows\system32\drivers\PktIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PktIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for PktIcpt.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018897a0, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350c0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`018897a0 488b01          mov     rax,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031cb520 -- (.trap 0xfffff880031cb520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a38d3d0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800a38d3d1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018897a0 rsp=fffff880031cb6b0 rbp=0000000000000000
 r8=fffffa800a38d3d0  r9=00000000000000d0 r10=fffff880009f3e80
r11=fffffa80093c2880 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`018897a0 488b01          mov     rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032d3ca9 to fffff800032d4740

STACK_TEXT:  
fffff880`031cb3d8 fffff800`032d3ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031cb3e0 fffff800`032d2920 : fffffa80`06ed4f48 fffffa80`093c2690 00000000`00000000 fffffa80`07a60670 : nt!KiBugCheckDispatch+0x69
fffff880`031cb520 fffff880`018897a0 : fffffa80`093c2690 fffff880`06f18b37 00000000`206c644d fffffa80`0a0000d0 : nt!KiPageFault+0x260
fffff880`031cb6b0 fffff880`017436a6 : fffffa80`093c2690 00000000`07bcf000 00000000`00000000 fffffa80`07bcf000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`031cb700 fffff880`0174135d : 00000000`00000000 fffffa80`08a98030 00000000`00000000 fffff880`0196b9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031cb730 fffff880`0185de26 : fffffa80`07bcf000 fffffa80`08a98100 00000000`00000011 fffffa80`093c2690 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`031cb7b0 fffff880`0185cb21 : 00000000`faffffef fffffa80`07bcf000 fffff880`0196b9a0 00000000`0a38d301 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`031cb890 fffff880`01934542 : fffffa80`095408f0 00000000`00000000 fffffa80`0a38d301 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`031cba90 fffff880`01609afa : fffffa80`0a343202 fffffa80`0a3432d0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`031cbad0 fffff880`06f1558d : fffffa80`0aa40a50 fffffa80`0a38d3d0 fffffa80`093c2700 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`031cbb80 fffffa80`0aa40a50 : fffffa80`0a38d3d0 fffffa80`093c2700 00000000`00000000 fffffa80`0a380002 : PktIcpt+0x258d
fffff880`031cbb88 fffffa80`0a38d3d0 : fffffa80`093c2700 00000000`00000000 fffffa80`0a380002 00000000`00000001 : 0xfffffa80`0aa40a50
fffff880`031cbb90 fffffa80`093c2700 : 00000000`00000000 fffffa80`0a380002 00000000`00000001 fffff880`0000000b : 0xfffffa80`0a38d3d0
fffff880`031cbb98 00000000`00000000 : fffffa80`0a380002 00000000`00000001 fffff880`0000000b fffff880`00000000 : 0xfffffa80`093c2700


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioDereferenceNetBufferList+86
fffff880`017436a6 4885ff          test    rdi,rdi

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042811-27861-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0325d000 PsLoadedModuleList = 0xfffff800`0349ae50
Debug session time: Wed Apr 27 19:17:42.649 2011 (UTC - 4:00)
System Uptime: 1 days 11:26:45.601
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 0, fffff8800188b7a0}

Unable to load image \??\C:\Windows\system32\drivers\PktIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PktIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for PktIcpt.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800188b7a0, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035050e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`0188b7a0 488b01          mov     rax,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031af520 -- (.trap 0xfffff880031af520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800d10e0a0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800d10e0a1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800188b7a0 rsp=fffff880031af6b0 rbp=0000000000000000
 r8=fffffa800d10e0a0  r9=00000000000000d0 r10=fffff80003448b80
r11=fffffa80092f9c60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`0188b7a0 488b01          mov     rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032ccca9 to fffff800032cd740

STACK_TEXT:  
fffff880`031af3d8 fffff800`032ccca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031af3e0 fffff800`032cb920 : fffffa80`0bc2f388 fffffa80`092f9a70 00000000`00000000 fffffa80`07b31f50 : nt!KiBugCheckDispatch+0x69
fffff880`031af520 fffff880`0188b7a0 : fffffa80`092f9a70 fffff880`0a383b37 00000000`206c644d fffffa80`06f33970 : nt!KiPageFault+0x260
fffff880`031af6b0 fffff880`0163e6a6 : fffffa80`092f9a70 00000000`07bcc000 00000000`00000000 fffffa80`07bcc000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`031af700 fffff880`0163c35d : 00000000`00000000 fffffa80`102cc1a0 00000000`00000000 fffff880`0196d9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031af730 fffff880`0185fe26 : fffffa80`07bcc000 fffffa80`102cc200 00000000`00000011 fffffa80`092f9a70 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`031af7b0 fffff880`0185eb21 : 00000000`faffffef fffffa80`07bcc000 fffff880`0196d9a0 00000000`0d10e001 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`031af890 fffff880`01936542 : fffffa80`07100630 00000000`00000000 fffffa80`0d10e001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`031afa90 fffff880`016ceafa : fffffa80`10f2f002 fffffa80`10f2f0b0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`031afad0 fffff880`0a38058d : fffffa80`0acab490 fffffa80`0d10e0a0 fffffa80`092f9b00 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`031afb80 fffffa80`0acab490 : fffffa80`0d10e0a0 fffffa80`092f9b00 00000000`00000000 fffffa80`0d100002 : PktIcpt+0x258d
fffff880`031afb88 fffffa80`0d10e0a0 : fffffa80`092f9b00 00000000`00000000 fffffa80`0d100002 00000000`00000001 : 0xfffffa80`0acab490
fffff880`031afb90 fffffa80`092f9b00 : 00000000`00000000 fffffa80`0d100002 00000000`00000001 fffff880`0000000b : 0xfffffa80`0d10e0a0
fffff880`031afb98 00000000`00000000 : fffffa80`0d100002 00000000`00000001 fffff880`0000000b fffff880`00000000 : 0xfffffa80`092f9b00


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioDereferenceNetBufferList+86
fffff880`0163e6a6 4885ff          test    rdi,rdi

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-36176-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`0349fe50
Debug session time: Sat May  7 18:38:42.242 2011 (UTC - 4:00)
System Uptime: 2 days 21:38:44.553
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {0, 2, 0, fffff8800188b7a0}

Unable to load image \??\C:\Windows\system32\drivers\PktIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PktIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for PktIcpt.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800188b7a0, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350a0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`0188b7a0 488b01          mov     rax,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880031bd520 -- (.trap 0xfffff880031bd520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800f00a200 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800f00a201 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800188b7a0 rsp=fffff880031bd6b0 rbp=0000000000000000
 r8=fffffa800f00a200  r9=00000000000000d0 r10=fffff8000344db80
r11=fffffa80085751c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`0188b7a0 488b01          mov     rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800032d1ca9 to fffff800032d2740

STACK_TEXT:  
fffff880`031bd3d8 fffff800`032d1ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bd3e0 fffff800`032d0920 : fffffa80`06a383a8 fffffa80`08574030 00000000`00000000 fffffa80`07b25fd0 : nt!KiBugCheckDispatch+0x69
fffff880`031bd520 fffff880`0188b7a0 : fffffa80`08574030 fffff880`074eeb37 00000000`206c644d fffffa80`0de80b90 : nt!KiPageFault+0x260
fffff880`031bd6b0 fffff880`016046a6 : fffffa80`08574030 00000000`07bac000 00000000`00000000 fffffa80`07bac000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`031bd700 fffff880`0160235d : 00000000`00000000 fffffa80`06d00030 00000000`00000000 fffff880`0196d9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031bd730 fffff880`0185fe26 : fffffa80`07bac000 fffffa80`06d00100 00000000`00000011 fffffa80`08574030 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`031bd7b0 fffff880`0185eb21 : 00000000`faffffef fffffa80`07bac000 fffff880`0196d9a0 00000000`0f00a201 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`031bd890 fffff880`01936542 : fffffa80`084c3470 00000000`00000000 fffffa80`0f00a201 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`031bda90 fffff880`01694afa : fffffa80`0c396602 fffffa80`0c396640 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`031bdad0 fffff880`074eb58d : fffffa80`09bf2130 fffffa80`0f00a200 fffffa80`08574100 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`031bdb80 fffffa80`09bf2130 : fffffa80`0f00a200 fffffa80`08574100 00000000`00000000 fffffa80`0f000002 : PktIcpt+0x258d
fffff880`031bdb88 fffffa80`0f00a200 : fffffa80`08574100 00000000`00000000 fffffa80`0f000002 00000000`00000001 : 0xfffffa80`09bf2130
fffff880`031bdb90 fffffa80`08574100 : 00000000`00000000 fffffa80`0f000002 00000000`00000001 fffff880`0000000b : 0xfffffa80`0f00a200
fffff880`031bdb98 00000000`00000000 : fffffa80`0f000002 00000000`00000001 fffff880`0000000b fffff880`00000000 : 0xfffffa80`08574100


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioDereferenceNetBufferList+86
fffff880`016046a6 4885ff          test    rdi,rdi

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferList+86

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

BUCKET_ID:  X64_0xD1_NETIO!NetioDereferenceNetBufferList+86

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`040fd000 fffff880`0413b000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f45000 fffff880`00f9c000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cf5000 fffff880`02d7f000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0417f000 fffff880`04195000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01131000 fffff880`0113c000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`074fc000 fffff880`07507000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00e86000 fffff880`00e8f000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00930000 fffff960`00991000   ATMFD    ATMFD.DLL    unavailable (00000000)
fffff880`014cf000 fffff880`014d6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03eb2000 fffff880`03ec3000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0693f000 fffff880`0695d000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff880`04625000 fffff880`0468c000   btath_a2dp btath_a2dp.sys Thu Sep 16 07:34:42 2010 (4C9200D2)
fffff880`04081000 fffff880`0408c000   btath_bus btath_bus.sys Thu Jun 24 02:17:43 2010 (4C22F887)
fffff880`047de000 fffff880`047ed000   btath_flt btath_flt.sys Thu Jun 24 02:17:38 2010 (4C22F882)
fffff880`0468c000 fffff880`046ef000   btath_hcrp btath_hcrp.sys Tue Jun 29 05:30:43 2010 (4C29BD43)
fffff880`047ed000 fffff880`04800000   btath_lwflt btath_lwflt.sys Mon Sep 13 04:26:54 2010 (4C8DE04E)
fffff880`04600000 fffff880`04624e00   btath_rcp btath_rcp.sys Thu Jun 24 02:17:21 2010 (4C22F871)
fffff880`05200000 fffff880`05247000   btfilter btfilter.sys Fri Oct 22 02:40:47 2010 (4CC131EF)
fffff880`047ae000 fffff880`047be000   BthEnum  BthEnum.sys  Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff880`0759f000 fffff880`075b6000   bthmodem bthmodem.sys Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff880`047be000 fffff880`047de000   bthpan   bthpan.sys   Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`046f6000 fffff880`04782000   bthport  bthport.sys  Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05247000 fffff880`0525f000   BTHUSB   BTHUSB.sys   Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff960`00690000 fffff960`006b7000   cdd      cdd.dll      unavailable (00000000)
fffff880`07507000 fffff880`07524000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`0121a000 fffff880`01244000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfe000 fffff880`00dbe000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0145e000 fffff880`0148e000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ca0000 fffff880`00cfe000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014e8000 fffff880`0155b000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0416f000 fffff880`0417f000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`067e9000 fffff880`067f7000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e11000 fffff880`03e94000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03e94000 fffff880`03eb2000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`00de9000 fffff880`00df8000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01448000 fffff880`0145e000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05381000 fffff880`053a3000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06400000 fffff880`0640c000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06417000 fffff880`0642a000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0640c000 fffff880`06417000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`067dd000 fffff880`067e9000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0fe00000 fffff880`0fef4000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`10ba0000 fffff880`10be6000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`01188000 fffff880`0119c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0113c000 fffff880`01188000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0156c000 fffff880`01576000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0140e000 fffff880`01448000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`01400000 fffff880`0140e000   GDBehave GDBehave.sys Wed Nov 04 10:15:33 2009 (4AF19A95)
fffff880`0105e000 fffff880`0106e000   gdwfpcd64 gdwfpcd64.sys Mon Jul 06 21:07:21 2009 (4A529FC9)
fffff880`0413b000 fffff880`04144000   GEARAspiWDM GEARAspiWDM.sys Fri Feb 01 09:06:03 2008 (47A3274B)
fffff800`03219000 fffff800`03262000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03ee9000 fffff880`03f0d000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`10be6000 fffff880`10bf7000   HECIx64  HECIx64.sys  Tue Oct 19 19:33:43 2010 (4CBE2AD7)
fffff880`0672a000 fffff880`06743000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`06743000 fffff880`0674b080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0671c000 fffff880`0672a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`074c2000 fffff880`074d1000   HookCentre HookCentre.sys Fri Jun 19 06:27:04 2009 (4A3B67F8)
fffff880`06877000 fffff880`0693f000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017f2000 fffff880`017fb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04159000 fffff880`0416f000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04061000 fffff880`04070000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06477000 fffff880`06485000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9f000 fffff800`00ba9000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`03fa4000 fffff880`03fe7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`053a3000 fffff880`053a8200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`06767000 fffff880`06774d80   ladfDHP2amd64 ladfDHP2amd64.sys Fri Sep 24 13:06:44 2010 (4C9CDAA4)
fffff880`06775000 fffff880`067cfc00   ladfSBVMamd64 ladfSBVMamd64.sys Fri Sep 24 15:13:10 2010 (4C9CF846)
fffff880`0408c000 fffff880`0408fd80   LGBusEnum LGBusEnum.sys Tue Jul 14 18:34:45 2009 (4A5D0805)
fffff880`0525f000 fffff880`05274000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`053a9000 fffff880`053cc000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c48000 fffff880`00c8c000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`074d1000 fffff880`074e9000   MiniIcpt MiniIcpt.sys Tue Sep 15 06:42:07 2009 (4AAF6F7F)
fffff880`075b6000 fffff880`075c5000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`0642a000 fffff880`06438000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04070000 fffff880`0407f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`067d0000 fffff880`067dd000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dbe000 fffff880`00dd8000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0695d000 fffff880`06975000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06975000 fffff880`069a2000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`069a2000 fffff880`069f0000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`06800000 fffff880`06823000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`00fef000 fffff880`00ffa000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`011e6000 fffff880`011f1000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fa5000 fffff880`00faf000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`011f1000 fffff880`011fc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017e0000 fffff880`017f2000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0106e000 fffff880`010fa000   mv91xx   mv91xx.sys   Fri Aug 27 05:49:22 2010 (4C778A22)
fffff880`01129000 fffff880`01131000   mvxxmm   mvxxmm.sys   Fri Aug 27 05:49:03 2010 (4C778A0F)
fffff880`016ee000 fffff880`017e0000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`041b9000 fffff880`041c5000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`041c5000 fffff880`041f4000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05302000 fffff880`05317000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c00000 fffff880`02c0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d7f000 fffff880`02dc4000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`00dd8000 fffff880`00de9000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02df3000 fffff880`02dff000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03262000 fffff800`0383f000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01253000 fffff880`013f5000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:25 2011 (4D79996D)
fffff880`014c6000 fffff880`014cf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`052e9000 fffff880`05302000   nusb3hub nusb3hub.sys Thu Sep 30 00:00:03 2010 (4CA40B43)
fffff880`03f74000 fffff880`03fa4000   nusb3xhc nusb3xhc.sys Thu Sep 30 00:00:03 2010 (4CA40B43)
fffff880`10b9e000 fffff880`10b9f180   nvBridge nvBridge.kmd Thu Apr 07 23:14:49 2011 (4D9E7DA9)
fffff880`05317000 fffff880`05344000   nvhda64v nvhda64v.sys Thu Mar 03 10:59:02 2011 (4D6FBAC6)
fffff880`0fef9000 fffff880`10b9d300   nvlddmkm nvlddmkm.sys Thu Apr 07 23:22:12 2011 (4D9E7F64)
fffff880`02dcd000 fffff880`02df3000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00faf000 fffff880`00fe2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00c2a000 fffff880`00c3a000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0155b000 fffff880`0156c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06eb7000 fffff880`06f5d000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`074e9000 fffff880`074fc000   PktIcpt  PktIcpt.sys  Thu Aug 27 08:31:33 2009 (4A967CA5)
fffff880`05344000 fffff880`05381000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c8c000 fffff880`00ca0000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0119c000 fffff880`011a7e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`04195000 fffff880`041b9000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04000000 fffff880`0401b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0401b000 fffff880`0403c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0403c000 fffff880`04056000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c75000 fffff880`02cc6000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04056000 fffff880`04061000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01244000 fffff880`0124d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f5000 fffff880`013fe000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`011dd000 fffff880`011e6000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015c2000 fffff880`015fc000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04782000 fffff880`047ae000   rfcomm   rfcomm.sys   Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05274000 fffff880`0528c000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04098000 fffff880`040fd000   Rt64win7 Rt64win7.sys Mon Oct 25 05:33:07 2010 (4CC54ED3)
fffff880`06495000 fffff880`066fe800   RTKVHD64 RTKVHD64.sys Tue Nov 02 07:25:59 2010 (4CCFF547)
fffff880`02c5b000 fffff880`02c75000   SCDEmu   SCDEmu.SYS   Mon Apr 12 04:52:25 2010 (4BC2DF49)
fffff880`010fa000 fffff880`01129000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`06f5d000 fffff880`06f68000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04144000 fffff880`04150000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02c0f000 fffff880`02c2c000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`016e5000 fffff880`016ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0742d000 fffff880`074c2000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06f95000 fffff880`06ffc000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`06f68000 fffff880`06f95000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`0407f000 fffff880`04080480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06e71000 fffff880`06e83000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02ce8000 fffff880`02cf5000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02cca000 fffff880`02ce8000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c47000 fffff880`02c5b000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03ec3000 fffff880`03ee9000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03fe7000 fffff880`03ff9000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0674c000 fffff880`06766c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`066ff000 fffff880`0671c000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`10bf7000 fffff880`10bf8f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03f0d000 fffff880`03f1e000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0528f000 fffff880`052e9000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03f1e000 fffff880`03f74000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06449000 fffff880`06476100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`00fe2000 fffff880`00fef000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`014d6000 fffff880`014e4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`011a8000 fffff880`011cd000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`016d5000 fffff880`016e5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01576000 fffff880`015c2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c2c000 fffff880`02c47000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`011cd000 fffff880`011dd000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e92000 fffff880`00f36000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f36000 fffff880`00f45000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dc4000 fffff880`02dcd000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00372000   win32k   win32k.sys   unavailable (00000000)
fffff880`04150000 fffff880`04159000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f9c000 fffff880`00fa5000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`053cc000 fffff880`053ed000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`0148e000 fffff880`014bf000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`075c5000 fffff880`075c7000   MSPQM.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`0759d000 fffff880`0759f000   MSPQM.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`07599000 fffff880`0759b000   MSPQM.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`0759b000 fffff880`0759d000   MSPCLOCK.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`07597000 fffff880`07599000   MSPCLOCK.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`07595000 fffff880`07597000   MSPQM.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`07524000 fffff880`07595000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`06e00000 fffff880`06e71000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`06438000 fffff880`06449000   AthDfu.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
fffff880`0148e000 fffff880`0149c000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0149c000 fffff880`014a8000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`014a8000 fffff880`014b3000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`014b3000 fffff880`014c6000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`03fa4000 fffff880`03fd5000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`03fa4000 fffff880`03fd5000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top