BSOD's (different ones) help!

Joined
Apr 21, 2011
Messages
8
Reaction score
0
I've been having random BSOD's lately. They are completely random and am not sure. This is the first time I saw a Memory Management issue, so I'm not quite sure. Here are my dumps. I have run memtest86+ on my memory for a whole night and saw nothing. Ran it for each stick as well for 2 hours each. I recently upgraded my components and never had BSOD's before. Updates include an i3, 8gigs DDR3-1600 RAM, 1156 ASUS Mobo, and a Crucial C300 64GB SSD. And I am also on Windows 7 64bit Ultimate. Any help would be appreciated. Thanks!

Also, someone suggestsed me update my ASCAPI.sys from 2005 version and update my video drivers after clearing everything after the first 3 minidumps, but I got another BSOD which is the 4th minidump. I have also run memtest86+ and chckdsk and no errors.

My PC components are:
Asus P55D-E LX
i3-540
eVGA GeForce GT240
Crucial C300 64GB
WD Green 500GB
WD Blue 640GB
G.Skillz Ripjaws DDR3-1600 8GB (4x2)
 

Attachments

yodap

No longer shovelling
Joined
Mar 30, 2009
Messages
1,430
Reaction score
340
Did you clean install windows after the upgrades?
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Hardware, RAM, or might be even SSD:



042111-8954-01.dmp
BugCheck 124, {0, fffffa8007148028, b2000000, 20001}
Probably caused by : hardware

041811-7971-01.dmp
BugCheck 1A, {41284, 4484001, 0, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )


Attach:

- a screenshot of CPU-Z memory tab
- a screenshot of CPU-Z CPU tab
- RAMMon HTML report.zip


Uninstall Avast

http://www.avast.com/uninstall-utility

http://www.microsoft.com/en-us/security_essentials/default.aspx




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041811-7971-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0301e000 PsLoadedModuleList = 0xfffff800`03263e90
Debug session time: Mon Apr 18 21:30:34.286 2011 (UTC - 4:00)
System Uptime: 0 days 9:24:32.223
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41284, 4484001, 0, fffff70001080000}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 0000000004484001
Arg3: 0000000000000000
Arg4: fffff70001080000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41284

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  mocha.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800030f5767 to fffff8000309e640

STACK_TEXT:  
fffff880`08d167e8 fffff800`030f5767 : 00000000`0000001a 00000000`00041284 00000000`04484001 00000000`00000000 : nt!KeBugCheckEx
fffff880`08d167f0 fffff800`030d06f0 : fffff700`01080000 85600000`23946867 fffffa80`07c06000 fffff880`08d169a0 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`08d16830 fffff800`030d1fd9 : fffff880`00000000 00000000`044affff 00000000`00000000 fffffa80`07c06c40 : nt!MiDeleteVirtualAddresses+0x4e8
fffff880`08d169f0 fffff800`033b5731 : fffffa80`0a1e4f80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`08d16b10 fffff800`033b5b33 : fffffa80`00000000 00000000`04470000 fffffa80`00000001 fffff960`0025e101 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08d16bd0 fffff800`0309d8d3 : 00000000`00000001 00000000`044a8000 fffffa80`09c8e060 00000000`00202040 : nt!NtUnmapViewOfSection+0x5f
fffff880`08d16c20 00000000`777415ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00259368 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777415ba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4ac3
fffff800`030f5767 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4ac3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3

BUCKET_ID:  X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041811-7737-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0305a000 PsLoadedModuleList = 0xfffff800`0329fe90
Debug session time: Mon Apr 18 04:53:27.039 2011 (UTC - 4:00)
System Uptime: 0 days 17:49:44.350
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff88001221d78, 2, 0, fffff800030e4264}

Probably caused by : ataport.SYS ( ataport!GenPnpRefPdoExtensionWithTag+30 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff88001221d78, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e4264, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b0e8
 fffff88001221d78 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeAcquireSpinLockRaiseToDpc+34
fffff800`030e4264 0fba2518d4170010 bt      dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03261684)],10h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff800046be280 -- (.trap 0xfffff800046be280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa80066a0238
rdx=0000000000000103 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e4264 rsp=fffff800046be410 rbp=fffffa80066a0238
 r8=fffff880010ab830  r9=0000000000000000 r10=0000000000000006
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeAcquireSpinLockRaiseToDpc+0x34:
fffff800`030e4264 0fba2518d4170010 bt      dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03261684)],10h ds:0206:fffff800`03261684=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d9be9 to fffff800030da640

STACK_TEXT:  
fffff800`046be138 fffff800`030d9be9 : 00000000`0000000a fffff880`01221d78 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`046be140 fffff800`030d8860 : 00000000`0000000e fffffa80`07551030 fffffa80`07551030 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`046be280 fffff800`030e4264 : fffff800`0305a000 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
fffff800`046be410 fffff880`010a4958 : fffffa80`066a0238 00000000`00000002 00000000`00000103 fffffa80`066a01a0 : nt!KeAcquireSpinLockRaiseToDpc+0x34
fffff800`046be460 fffff880`010af535 : fffff880`010ab830 00000000`00000002 fffff880`010ab830 fffff800`0324f080 : ataport!GenPnpRefPdoExtensionWithTag+0x30
fffff800`046be4b0 fffff880`010af880 : fffff800`0324f080 fffff800`0325acc0 00000000`00000000 00000000`00000000 : ataport!RefPdoExtensionWithTag+0x1d
fffff800`046be4e0 fffff880`010ab94a : fffff800`046be630 fffffa80`066a01a0 fffff800`00000003 fffff800`046be618 : ataport!RefNextPdoExtensionWithTag+0x30
fffff800`046be510 fffff800`030e6062 : fffff800`046be630 00000000`00000103 00000000`00000000 00000000`00000004 : ataport!IdePortTickHandler+0x11a
fffff800`046be570 fffff800`030e5f06 : fffffa80`06845460 00000000`003ec7b3 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`046be5e0 fffff800`030e5dee : 00000095`70daa2c1 fffff800`046bec58 00000000`003ec7b3 fffff800`032508e8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`046bec30 fffff800`030e5bd7 : 00000035`ed79a7c4 00000035`003ec7b3 00000035`ed79a70e 00000000`000000b2 : nt!KiTimerExpiration+0x1be
fffff800`046becd0 fffff800`030d236a : fffff800`0324ce80 fffff800`0325acc0 00000000`00000000 fffff880`0140aa00 : nt!KiRetireDpcList+0x277
fffff800`046bed80 00000000`00000000 : fffff800`046bf000 fffff800`046b9000 fffff800`046bed40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!GenPnpRefPdoExtensionWithTag+30
fffff880`010a4958 448bcf          mov     r9d,edi

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  ataport!GenPnpRefPdoExtensionWithTag+30

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79293

FAILURE_BUCKET_ID:  X64_0xA_ataport!GenPnpRefPdoExtensionWithTag+30

BUCKET_ID:  X64_0xA_ataport!GenPnpRefPdoExtensionWithTag+30

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-7940-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0300e000 PsLoadedModuleList = 0xfffff800`03253e90
Debug session time: Tue Apr 19 23:08:41.190 2011 (UTC - 4:00)
System Uptime: 1 days 1:37:11.501
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff800006d103a, 2, 0, fffff8000309469f}

Probably caused by : tcpip.sys ( tcpip!TcpPartitionGetNextExpirationTick+6f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800006d103a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000309469f, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bf0e8
 fffff800006d103a 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+f
fffff800`0309469f 0fba25dd0f180010 bt      dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03215684)],10h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff800046b7260 -- (.trap 0xfffff800046b7260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000131 rbx=0000000000000000 rcx=fffff800046b7440
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000309469f rsp=fffff800046b73f0 rbp=00000000008cbbd4
 r8=fffff800046b7440  r9=0000000000000000 r10=fffffa8006f64840
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+0xf:
fffff800`0309469f 0fba25dd0f180010 bt      dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03215684)],10h ds:ed30:fffff800`03215684=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000308dbe9 to fffff8000308e640

STACK_TEXT:  
fffff800`046b7118 fffff800`0308dbe9 : 00000000`0000000a fffff800`006d103a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`046b7120 fffff800`0308c860 : 00000000`00000000 00000000`00000000 00000001`00000001 00000000`008cbd05 : nt!KiBugCheckDispatch+0x69
fffff800`046b7260 fffff800`0309469f : fffffa80`06e24d40 00000000`00000000 00000000`00000000 00000000`008cbbd4 : nt!KiPageFault+0x260
fffff800`046b73f0 fffff880`0174ae6f : 00000000`008cbbd4 00000000`00000000 00000000`008cbd05 00000000`00000000 : nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+0xf
fffff800`046b7420 fffff880`0174a8ec : 00000000`00000014 00000000`00000004 fffffa80`06e36a60 fffffa80`008cbbd4 : tcpip!TcpPartitionGetNextExpirationTick+0x6f
fffff800`046b7470 fffff800`0309a062 : fffff800`03200e80 00000000`00000000 fffff800`046b7600 00000000`00000001 : tcpip!TcpPeriodicTimeoutHandler+0x86b
fffff800`046b7570 fffff800`03099f06 : fffffa80`06e36b30 00000000`005a36ad 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`046b75e0 fffff800`03099dee : 000000d6`be423a6a fffff800`046b7c58 00000000`005a36ad fffff800`03204828 : nt!KiProcessExpiredTimerList+0xc6
fffff800`046b7c30 fffff800`03099bd7 : 0000004d`7e2182c1 0000004d`005a36ad 0000004d`7e218266 00000000`000000ad : nt!KiTimerExpiration+0x1be
fffff800`046b7cd0 fffff800`0308636a : fffff800`03200e80 fffff800`0320ecc0 00000000`00000000 fffff880`01438a00 : nt!KiRetireDpcList+0x277
fffff800`046b7d80 00000000`00000000 : fffff800`046b8000 fffff800`046b2000 fffff800`046b7d40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!TcpPartitionGetNextExpirationTick+6f
fffff880`0174ae6f 488b6c2458      mov     rbp,qword ptr [rsp+58h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  tcpip!TcpPartitionGetNextExpirationTick+6f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79420

FAILURE_BUCKET_ID:  X64_0xA_tcpip!TcpPartitionGetNextExpirationTick+6f

BUCKET_ID:  X64_0xA_tcpip!TcpPartitionGetNextExpirationTick+6f

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042111-8954-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0304d000 PsLoadedModuleList = 0xfffff800`03292e90
Debug session time: Wed Apr 20 23:21:38.089 2011 (UTC - 4:00)
System Uptime: 0 days 13:05:58.026
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 124, {0, fffffa8007148028, b2000000, 20001}

Probably caused by : hardware

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa8007148028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000b2000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000020001, Low order 32-bits of the MCi_STATUS value.

Debugging Details:
------------------


BUGCHECK_STR:  0x124_GenuineIntel

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  f

STACK_TEXT:  
fffff880`031dda58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  X64_0x124_GenuineIntel_PROCESSOR_MAE

BUCKET_ID:  X64_0x124_GenuineIntel_PROCESSOR_MAE

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00edc000 fffff880`00f33000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`06ef2000 fffff880`06f3a000   afcdp    afcdp.sys    Thu Nov 18 11:20:02 2010 (4CE55232)
fffff880`02f71000 fffff880`02ffa000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`0ffbe000 fffff880`0ffd4000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01128000 fffff880`01133000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`044e0000 fffff880`044e8000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`02a97000 fffff880`02aa0000   aswFsBlk aswFsBlk.SYS Wed Feb 23 09:54:56 2011 (4D651FC0)
fffff880`02a5d000 fffff880`02a97000   aswMonFlt aswMonFlt.sys Wed Feb 23 09:55:04 2011 (4D651FC8)
fffff880`02e00000 fffff880`02e0a000   aswRdr   aswRdr.SYS   Wed Feb 23 09:55:11 2011 (4D651FCF)
fffff880`02e28000 fffff880`02ea8000   aswSnx   aswSnx.SYS   Wed Feb 23 09:56:59 2011 (4D65203B)
fffff880`0438a000 fffff880`043d5000   aswSP    aswSP.SYS    Wed Feb 23 09:57:02 2011 (4D65203E)
fffff880`02f61000 fffff880`02f71000   aswTdi   aswTdi.SYS   Wed Feb 23 09:55:51 2011 (4D651FF7)
fffff880`06e00000 fffff880`06e0b000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`010ea000 fffff880`010f3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`010f3000 fffff880`0111d000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff960`00990000 fffff960`009f1000   ATMFD    ATMFD.DLL    Sat Feb 19 04:00:32 2011 (4D5F86B0)
fffff880`02eb1000 fffff880`02eb8000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04379000 fffff880`0438a000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`064fb000 fffff880`06519000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`007a0000 fffff960`007c7000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`04c5c000 fffff880`04c86000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00ccd000 fffff880`00d8d000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`0142b000 fffff880`0145b000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c6f000 fffff880`00ccd000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`045ea000 fffff880`045fa000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`04c93000 fffff880`04ca1000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`042d8000 fffff880`0435b000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`0435b000 fffff880`04379000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`04172000 fffff880`04181000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01be5000 fffff880`01bfb000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d94000 fffff880`04db6000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04dd3000 fffff880`04de6000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04dc8000 fffff880`04dd3000   dump_msahci dump_msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`04dbc000 fffff880`04dc8000   dump_pciidex dump_pciidex.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04de6000 fffff880`04df2000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044f6000 fffff880`045ea000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04400000 fffff880`04446000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`04167000 fffff880`04172000   ElbyCDIO ElbyCDIO.sys Thu Dec 17 17:25:16 2009 (4B2AAFCC)
fffff880`02b94000 fffff880`02bca000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`0117f000 fffff880`01193000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01133000 fffff880`0117f000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`013e3000 fffff880`013ed000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`019b8000 fffff880`019f2000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01822000 fffff880`0186c000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`04c86000 fffff880`04c93000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03004000 fffff800`0304d000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04446000 fffff880`0446a000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`04c00000 fffff880`04c5c000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`0145b000 fffff880`01474000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`041f3000 fffff880`041fb080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04df2000 fffff880`04e00000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06432000 fffff880`064fb000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01a92000 fffff880`01a9b000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04200000 fffff880`04216000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`042a6000 fffff880`042b5000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`019f2000 fffff880`01a00000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bd3000 fffff800`00bdd000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`041b0000 fffff880`041f3000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013b7000 fffff880`013d2000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04db6000 fffff880`04dbb200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02ac1000 fffff880`02ad8000   LEqdUsb  LEqdUsb.Sys  Tue Aug 24 13:21:23 2010 (4C73FF93)
fffff880`02ae5000 fffff880`02aed000   LHidEqd  LHidEqd.Sys  Tue Aug 24 13:21:26 2010 (4C73FF96)
fffff880`01474000 fffff880`01489000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`02b01000 fffff880`02b16000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02aed000 fffff880`02b01000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`01072000 fffff880`01095000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c0c000 fffff880`00c5b000   mcupdate mcupdate.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`06fec000 fffff880`06ffa000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`042b5000 fffff880`042c4000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02ad8000 fffff880`02ae5000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fc7000 fffff880`00fe1000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`06519000 fffff880`06531000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06531000 fffff880`0655e000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`0655e000 fffff880`065ab000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`065ab000 fffff880`065cf000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0111d000 fffff880`01128000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`02f16000 fffff880`02f21000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f3c000 fffff880`00f46000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01193000 fffff880`011f1000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`0415c000 fffff880`04167000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01a80000 fffff880`01a92000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014a0000 fffff880`01593000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`0f273000 fffff880`0f27f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02b69000 fffff880`02b7c000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`04216000 fffff880`04245000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`04d15000 fffff880`04d2a000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`040a4000 fffff880`040b3000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0401a000 fffff880`0405f000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01593000 fffff880`015f3000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0f200000 fffff880`0f273000   netr6164 netr6164.sys Wed Apr 07 08:07:21 2010 (4BBC7579)
fffff880`02f21000 fffff880`02f32000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04150000 fffff880`0415c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0304d000 fffff800`03637000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01214000 fffff880`013b7000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`02ea8000 fffff880`02eb1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04cfd000 fffff880`04d15000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`0ff27000 fffff880`0ff57000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`0ff25000 fffff880`0ff26180   nvBridge nvBridge.kmd Thu Apr 07 23:14:49 2011 (4D9E7DA9)
fffff880`04d2a000 fffff880`04d57000   nvhda64v nvhda64v.sys Thu Mar 03 10:59:02 2011 (4D6FBAC6)
fffff880`0f280000 fffff880`0ff24300   nvlddmkm nvlddmkm.sys Thu Apr 07 23:22:12 2011 (4D9E7F64)
fffff880`02b16000 fffff880`02b69000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`04068000 fffff880`0408e000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00f86000 fffff880`00f9b000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f46000 fffff880`00f79000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fb0000 fffff880`00fb7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fb7000 fffff880`00fc7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d2000 fffff880`013e3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06ae0000 fffff880`06b86000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04d57000 fffff880`04d94000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5b000 fffff880`00c6f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0ffd4000 fffff880`0fff8000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`04245000 fffff880`04260000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04260000 fffff880`04281000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04281000 fffff880`0429b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`040ff000 fffff880`04150000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`0429b000 fffff880`042a6000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02efb000 fffff880`02f04000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`06f3a000 fffff880`06f68000   rdpdr    rdpdr.sys    Sat Nov 20 06:06:41 2010 (4CE7ABC1)
fffff880`02f04000 fffff880`02f0d000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02f0d000 fffff880`02f16000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`06f82000 fffff880`06fbb000   RDPWD    RDPWD.SYS    Sat Nov 20 06:04:37 2010 (4CE7AB45)
fffff880`01a46000 fffff880`01a80000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`02b7c000 fffff880`02b94000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0ff57000 fffff880`0ffbe000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`04181000 fffff880`041b0000   SCSIPORT SCSIPORT.SYS Sat Nov 20 05:34:01 2010 (4CE7A419)
fffff880`06b86000 fffff880`06b91000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`044e8000 fffff880`044f4000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`040b3000 fffff880`040d0000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01a00000 fffff880`01a46000   snapman  snapman.sys  Thu Nov 11 06:05:10 2010 (4CDBCDE6)
fffff880`01bdd000 fffff880`01be5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06e5a000 fffff880`06ef2000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`06a00000 fffff880`06a6a000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`06b91000 fffff880`06bc2000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`045fa000 fffff880`045fb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0161e000 fffff880`01822000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`06bc2000 fffff880`06bd4000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`02f54000 fffff880`02f61000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01aa6000 fffff880`01bdd000   tdrpm273 tdrpm273.sys Tue Aug 10 05:54:18 2010 (4C6121CA)
fffff880`06f68000 fffff880`06f73000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`02f32000 fffff880`02f54000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`040eb000 fffff880`040ff000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff880`0186c000 fffff880`0195c000   timntr   timntr.sys   Wed Jun 02 08:56:47 2010 (4C06550F)
fffff960`00480000 fffff960`0048a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`06f73000 fffff880`06f82000   tssecsrv tssecsrv.sys Sat Nov 20 06:04:09 2010 (4CE7AB29)
fffff880`043d5000 fffff880`043fb000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04000000 fffff880`04012000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`01600000 fffff880`0161d000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`044d1000 fffff880`044d2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0446a000 fffff880`0447b000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04ca3000 fffff880`04cfd000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`0447b000 fffff880`044d1000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`042c4000 fffff880`042d3000   VClone   VClone.sys   Sun Aug 09 17:25:45 2009 (4A7F3ED9)
fffff880`00f79000 fffff880`00f86000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02eb8000 fffff880`02ec6000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02ec6000 fffff880`02eeb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0109a000 fffff880`010d6000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`0195c000 fffff880`0196c000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00f9b000 fffff880`00fb0000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00d8d000 fffff880`00de9000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`0196c000 fffff880`019b8000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`044d3000 fffff880`044e0000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`0408e000 fffff880`040a4000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`040d0000 fffff880`040eb000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`02eeb000 fffff880`02efb000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e29000 fffff880`00ecd000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ecd000 fffff880`00edc000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0405f000 fffff880`04068000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003f2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`010d6000 fffff880`010ea000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`00f33000 fffff880`00f3c000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02aa0000 fffff880`02ac1000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`06fbb000 fffff880`06fec000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`02e0a000 fffff880`02e25000   USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0001B000
fffff880`06a6a000 fffff880`06adb000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019f2000 fffff880`01a00000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01600000 fffff880`0160c000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01a9b000 fffff880`01aa6000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`0145b000 fffff880`0146e000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`0146e000 fffff880`01498000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 
Last edited:
Joined
Sep 22, 2010
Messages
613
Reaction score
102
1. 4 identical sticks, a good idea to set them to the manufacturer's rates. Enable XMP and set it 1600 9 9 9 24, not sure about the voltage.

2. Make sure the CPU freqency throttle (Enhanced Intel SpeedStep) is on. Your CPU should not be running always at 3,07Ghz, should automatically lower the clock when idling.


3. If sill no luck, load setup/fail-safe/optimized bios defaults.


4. Uninstall Avast


Important to set the hardware to its recommended values first of all, then if bsod's still persist test the hardware:


www.memtest.org

http://www.overclock.net/downloads/137251-prime95.html
 
Joined
Apr 21, 2011
Messages
8
Reaction score
0
Someone told me to stop overclocking which is why I turned off XMP. I'll turn it back on and see. I've already uninstalled Avast as well.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
XMP is not quite overclocking. :)

If the RAM maker recommends 1600 9 9 9 24, then it should be set that way.
If the memory datasheet says it can be set both ways 1333 and 1600, you can set it 1333.

Do not overclock the CPU though. Ensure EIST is on.


~~~~~~~

Your bug is MEMORY_MANAGEMENT (1a), again what I suggest:

- set the memory as the manufacturer says, with the right timing and voltage
- enable EIST
- if no luck, load fail-safe defaults in the bios
- if still no luck, memtest it to find errors
 
Joined
Apr 21, 2011
Messages
8
Reaction score
0
Ok I have turned on XMP and EIST and did not overclock the CPU. I also bumped the voltage of the RAM to 1.56V to just give in a little more juice. At default it takes 1.5 to run, but I figure why not just bump it up a bit.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Ok I have turned on XMP and EIST and did not overclock the CPU. I also bumped the voltage of the RAM to 1.56V to just give in a little more juice. At default it takes 1.5 to run, but I figure why not just bump it up a bit.
1. Can you give me a link to where I can read about your memory sticks, such as the RAM maker's description page?

2. Re-attach new CPUZ MEMORY and CPU tabs snips


Your blue screens are definitely hardware related, and that's why it's important to first of all set the hardware right:


042111-8954-01.dmp
BugCheck 124, {0, fffffa8007148028, b2000000, 20001}
Probably caused by : hardware

041811-7971-01.dmp
BugCheck 1A, {41284, 4484001, 0, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )

042411-6879-01.dmp
BugCheck 3B, {c0000005, 0, fffff880053510f0, 0}
Probably caused by : dxgkrnl.sys ( dxgkrnl!DxgkGetDeviceState+22d )

042711-7924-01.dmp
BugCheck 1E, {0, 0, 0, 0}
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
ExceptionCode: c0000005 (Access violation)
Attempt to read from address ffffffffffffffff
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-6879-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`0324ee90
Debug session time: Sun Apr 24 07:05:42.680 2011 (UTC - 4:00)
System Uptime: 0 days 8:48:56.991
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, 0, fffff880053510f0, 0}

Probably caused by : dxgkrnl.sys ( dxgkrnl!DxgkGetDeviceState+22d )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880053510f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+13
00000000`00000000 ??              ???

CONTEXT:  fffff880053510f0 -- (.cxr 0xfffff880053510f0)
rax=fffff88003fa16d0 rbx=0000000000000000 rcx=fffffa80087b0af0
rdx=0000000000000000 rsi=0000000000439fd8 rdi=0000000003a4f960
rip=0000000000000000 rsp=fffff88005351ad8 rbp=fffff88005351ca0
 r8=fffff88005351b10  r9=0000000000000013 r10=0000000000000000
r11=fffff8a001f56000 r12=0000000000000003 r13=fffff8a001f56000
r14=0000000000439fd0 r15=0000000003a4f960
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
00000000`00000000 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff88003ee9a39 to 0000000000000000

STACK_TEXT:  
fffff880`05351ad8 fffff880`03ee9a39 : 00000000`00000001 00000000`00000001 fffffa80`0881e660 fffffa80`0881e660 : 0x0
fffff880`05351ae0 fffff960`001ee6fa : 00000000`00000000 00000000`03a4faf0 00000000`00000000 00000000`000007ec : dxgkrnl!DxgkGetDeviceState+0x22d
fffff880`05351bc0 fffff800`030888d3 : fffffa80`0881e660 fffffa80`08819250 ffffffff`ffff3cb0 fffffa80`08819250 : win32k!NtGdiDdDDIGetDeviceState+0x82
fffff880`05351c20 000007fe`ff7211fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03a4f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`ff7211fa


FOLLOWUP_IP: 
dxgkrnl!DxgkGetDeviceState+22d
fffff880`03ee9a39 488d4c2468      lea     rcx,[rsp+68h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  dxgkrnl!DxgkGetDeviceState+22d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa

STACK_COMMAND:  .cxr 0xfffff880053510f0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_dxgkrnl!DxgkGetDeviceState+22d

BUCKET_ID:  X64_0x3B_dxgkrnl!DxgkGetDeviceState+22d

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042711-7924-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0304c000 PsLoadedModuleList = 0xfffff800`03291e90
Debug session time: Wed Apr 27 22:37:28.950 2011 (UTC - 4:00)
System Uptime: 1 days 0:44:10.886
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3733623431623366
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80004774328 -- (.exr 0xfffff80004774328)
ExceptionAddress: fffff800030d28e2 (nt!KiDeferredReadyThread+0x00000000000001c2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff800047743d0 -- (.trap 0xfffff800047743d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=eaebff7fefaef577 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030d28e2 rsp=fffff80004774560 rbp=0000000000000001
 r8=0000000000000005  r9=0000000000000002 r10=fffff8000304c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiDeferredReadyThread+0x1c2:
fffff800`030d28e2 663b5048        cmp     dx,word ptr [rax+48h] ds:eaebff7f`efaef5bf=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030c3ffe to fffff800030cc610

STACK_TEXT:  
fffff800`04773408 fffff800`030c3ffe : 00000000`00000001 fffff880`0161c624 fffff800`04773b80 fffff800`030f82a0 : nt!KeBugCheck
fffff800`04773410 fffff800`030f7f6d : fffff800`032d3a10 fffff800`0320fc78 fffff800`0304c000 fffff800`04774328 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`04773440 fffff800`030f6d45 : fffff800`032130fc fffff800`047734b8 fffff800`04774328 fffff800`0304c000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`04773470 fffff800`03107dc1 : fffff800`04774328 fffff800`04773b80 fffff800`00000000 fffffa80`0ad637c0 : nt!RtlDispatchException+0x415
fffff800`04773b50 fffff800`030cbcc2 : fffff800`04774328 fffff880`009eb180 fffff800`047743d0 fffff800`0323ee80 : nt!KiDispatchException+0x135
fffff800`047741f0 fffff800`030ca5ca : fffff800`0476f000 fffff800`0324ccc0 fffff800`047743f8 fffffa80`0719a250 : nt!KiExceptionDispatch+0xc2
fffff800`047743d0 fffff800`030d28e2 : ffffffff`fffdb610 fffff800`030d8062 fffff800`00000002 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff800`04774560 fffff800`030d7f97 : fffffa80`0ad63880 fffffa80`0ad638c8 fffffa80`0ad638c8 00000000`00000000 : nt!KiDeferredReadyThread+0x1c2
fffff800`047745e0 fffff800`030d7dee : 000000cf`5676ffd0 fffff800`04774c58 00000000`00571a41 fffff800`03241aa8 : nt!KiProcessExpiredTimerList+0x157
fffff800`04774c30 fffff800`030d7bd7 : 0000004a`d2038cc1 0000004a`00571a41 0000004a`d2038c02 00000000`00000041 : nt!KiTimerExpiration+0x1be
fffff800`04774cd0 fffff800`030c436a : fffff800`0323ee80 fffff800`0324ccc0 00000000`00000000 fffff880`0161ba00 : nt!KiRetireDpcList+0x277
fffff800`04774d80 00000000`00000000 : fffff800`04775000 fffff800`0476f000 fffff800`04774d40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`030c3ffe 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00ecd000 fffff880`00f24000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`06210000 fffff880`06258000   afcdp    afcdp.sys    Thu Nov 18 11:20:02 2010 (4CE55232)
fffff880`03000000 fffff880`03089000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`101bb000 fffff880`101d1000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01166000 fffff880`01171000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`0449a000 fffff880`044a2000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`064dd000 fffff880`064e8000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`01128000 fffff880`01131000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01131000 fffff880`0115b000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff960`00960000 fffff960`009c1000   ATMFD    ATMFD.DLL    Sat Feb 19 04:00:32 2011 (4D5F86B0)
fffff880`01c63000 fffff880`01c6a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042cc000 fffff880`042dd000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03f68000 fffff880`03f86000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`00650000 fffff960`00677000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`00ce2000 fffff880`00da2000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`010a8000 fffff880`010d8000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c84000 fffff880`00ce2000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01491000 fffff880`01503000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`045e9000 fffff880`045f9000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`04da6000 fffff880`04db4000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0422b000 fffff880`042ae000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`042ae000 fffff880`042cc000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`031d6000 fffff880`031e5000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01bdc000 fffff880`01bf2000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d22000 fffff880`04d44000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04dcb000 fffff880`04dde000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04dc0000 fffff880`04dcb000   dump_msahci dump_msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`04db4000 fffff880`04dc0000   dump_pciidex dump_pciidex.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04dde000 fffff880`04dea000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044a3000 fffff880`04597000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`04597000 fffff880`045dd000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01514000 fffff880`0151e000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0184c000 fffff880`01886000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01a92000 fffff880`01adc000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`03003000 fffff800`0304c000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`04400000 fffff880`04424000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`04d4a000 fffff880`04da6000   HdAudio  HdAudio.sys  Sat Nov 20 05:44:23 2010 (4CE7A687)
fffff880`054ae000 fffff880`054c7000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`054c7000 fffff880`054cf080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`054a0000 fffff880`054ae000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`03e9f000 fffff880`03f68000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01c4c000 fffff880`01c55000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04303000 fffff880`04319000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`043aa000 fffff880`043b9000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`054e5000 fffff880`054f3000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00ba1000 fffff800`00bab000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`01597000 fffff880`015da000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`01476000 fffff880`01491000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`0176d000 fffff880`01798000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`04d44000 fffff880`04d49200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`063bc000 fffff880`063d3000   LEqdUsb  LEqdUsb.Sys  Tue Aug 24 13:21:23 2010 (4C73FF93)
fffff880`063e0000 fffff880`063e8000   LHidEqd  LHidEqd.Sys  Tue Aug 24 13:21:26 2010 (4C73FF96)
fffff880`054d0000 fffff880`054e5000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`04200000 fffff880`04215000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`063e8000 fffff880`063fc000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`04c00000 fffff880`04c23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c21000 fffff880`00c70000   mcupdate mcupdate.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`04dea000 fffff880`04df8000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`043b9000 fffff880`043c8000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`063d3000 fffff880`063e0000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00da2000 fffff880`00dbc000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`017ab000 fffff880`017dc000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`06200000 fffff880`06210000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`03f86000 fffff880`03f9e000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03f9e000 fffff880`03fcb000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`05412000 fffff880`0545f000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0545f000 fffff880`05483000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0115b000 fffff880`01166000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`0154c000 fffff880`01557000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f2d000 fffff880`00f37000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01418000 fffff880`01476000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`031cb000 fffff880`031d6000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01c3a000 fffff880`01c4c000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0161a000 fffff880`0170d000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`04319000 fffff880`04325000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03e74000 fffff880`03e87000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`04325000 fffff880`04354000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`04ca3000 fffff880`04cb8000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`03113000 fffff880`03122000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03089000 fffff880`030ce000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`0170d000 fffff880`0176d000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0f467000 fffff880`0f4da000   netr6164 netr6164.sys Wed Apr 07 08:07:21 2010 (4BBC7579)
fffff880`06258000 fffff880`0626d000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`01557000 fffff880`01568000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`031bf000 fffff880`031cb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0304c000 fffff800`03636000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01215000 fffff880`013b8000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
fffff880`017dc000 fffff880`017e5000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04c8b000 fffff880`04ca3000   nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA)
fffff880`1018b000 fffff880`101bb000   nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED)
fffff880`10189000 fffff880`1018a180   nvBridge nvBridge.kmd Thu Apr 07 23:14:49 2011 (4D9E7DA9)
fffff880`04cb8000 fffff880`04ce5000   nvhda64v nvhda64v.sys Thu Mar 03 10:59:02 2011 (4D6FBAC6)
fffff880`0f4e4000 fffff880`10188300   nvlddmkm nvlddmkm.sys Thu Apr 07 23:22:12 2011 (4D9E7F64)
fffff880`00dbc000 fffff880`00de4000   nvraid   nvraid.sys   Fri Mar 19 16:59:20 2010 (4BA3E5A8)
fffff880`01171000 fffff880`0119c000   nvstor   nvstor.sys   Fri Mar 19 16:45:11 2010 (4BA3E257)
fffff880`03e21000 fffff880`03e74000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`030d7000 fffff880`030fd000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00f77000 fffff880`00f8c000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f37000 fffff880`00f6a000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00e00000 fffff880`00e07000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e07000 fffff880`00e17000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01503000 fffff880`01514000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`054f3000 fffff880`05599000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04ce5000 fffff880`04d22000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c70000 fffff880`00c84000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`101d1000 fffff880`101f5000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`04354000 fffff880`0436f000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0436f000 fffff880`04390000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`04390000 fffff880`043aa000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0316e000 fffff880`031bf000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`101f5000 fffff880`10200000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01610000 fffff880`01619000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0626d000 fffff880`0629b000   rdpdr    rdpdr.sys    Sat Nov 20 06:06:41 2010 (4CE7ABC1)
fffff880`017f3000 fffff880`017fc000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01543000 fffff880`0154c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`013b8000 fffff880`013f1000   RDPWD    RDPWD.SYS    Sat Nov 20 06:04:37 2010 (4CE7AB45)
fffff880`01c00000 fffff880`01c3a000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`03e87000 fffff880`03e9f000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0f400000 fffff880`0f467000   Rt64win7 Rt64win7.sys Fri Jan 21 02:34:00 2011 (4D3936E8)
fffff880`05599000 fffff880`055a4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`045dd000 fffff880`045e9000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03122000 fffff880`0313f000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01da9000 fffff880`01def000   snapman  snapman.sys  Thu Nov 11 06:05:10 2010 (4CDBCDE6)
fffff880`01da1000 fffff880`01da9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06324000 fffff880`063bc000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`062ba000 fffff880`06324000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`055a4000 fffff880`055d5000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`0119c000 fffff880`011ff000   storport storport.sys Thu Mar 10 23:30:23 2011 (4D79A55F)
fffff880`045f9000 fffff880`045fa480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0188e000 fffff880`01a92000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`055d5000 fffff880`055e7000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`0158a000 fffff880`01597000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`01c6a000 fffff880`01da1000   tdrpm273 tdrpm273.sys Tue Aug 10 05:54:18 2010 (4C6121CA)
fffff880`0629b000 fffff880`062a6000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`01568000 fffff880`0158a000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`0315a000 fffff880`0316e000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff880`01adc000 fffff880`01bcc000   timntr   timntr.sys   Wed Jun 02 08:56:47 2010 (4C06550F)
fffff960`005b0000 fffff960`005ba000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`062a6000 fffff880`062b5000   tssecsrv tssecsrv.sys Sat Nov 20 06:04:09 2010 (4CE7AB29)
fffff880`042dd000 fffff880`04303000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`043c8000 fffff880`043da000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`05483000 fffff880`054a0000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`0448b000 fffff880`0448cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04424000 fffff880`04435000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04c31000 fffff880`04c8b000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`04435000 fffff880`0448b000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f6a000 fffff880`00f77000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`017e5000 fffff880`017f3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0151e000 fffff880`01543000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`010d8000 fffff880`01114000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01bcc000 fffff880`01bdc000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00f8c000 fffff880`00fa1000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00fa1000 fffff880`00ffd000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01800000 fffff880`0184c000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`0448d000 fffff880`0449a000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`030fd000 fffff880`03113000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0313f000 fffff880`0315a000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01600000 fffff880`01610000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e1a000 fffff880`00ebe000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ebe000 fffff880`00ecd000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`030ce000 fffff880`030d7000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`00362000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`01114000 fffff880`01128000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`00f24000 fffff880`00f2d000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`043da000 fffff880`043fb000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`064e8000 fffff880`06559000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`0646c000 fffff880`064dd000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`01c55000 fffff880`01c63000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01def000 fffff880`01dfb000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01bf2000 fffff880`01bfd000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`01798000 fffff880`017ab000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`017ab000 fffff880`017d5000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top