SP1 bork

Joined
Apr 12, 2011
Messages
5
Reaction score
0
Got borked with the SP1 update. Got it stable by undoing a lot of stuff, but I still get an occassional boot error. Figure a clean install, with immediate updates applied, followed by current drivers will stop issue, but just in case.............whats the dump saying please?
 

Attachments

  • Dump5.zip
    1.1 MB · Views: 512
Joined
Sep 22, 2010
Messages
613
Reaction score
102
IRQL_NOT_LESS_OR_EQUAL (a)
Pool Corruption
nt!ExDeferredFreePool
LOCK_ADDRESS: fffff80001ec1400 -- (!locks fffff80001ec1400)
PciDevice_QueryCapabilities




1. Disable Driver Verifier



2. Update:

Intel Matrix Storage
iaStorV.sys Wed Apr 08 12:57:17 2009
http://www.intel.com/p/en_US/support/detect/

Speedfan
speedfan.sys Sun Sep 24 09:26:48 2006

nVidia
nvlddmkm.sys Fri May 21 19:35:15 2010





3. http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html






CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031311-15078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`01c4d000 PsLoadedModuleList = 0xfffff800`01e8ae50
Debug session time: Sun Mar 13 11:02:05.468 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:03.968
Loading Kernel Symbols
...............................................................
.................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80001cdd436}

Probably caused by : pci.sys ( pci!PciDevice_QueryCapabilities+dc )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001cdd436, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001ef50e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+c73
fffff800`01cdd436 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

IRP_ADDRESS:  ffffffffffffff88

TRAP_FRAME:  fffff880023a5fb0 -- (.trap 0xfffff880023a5fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0034ef630 rbx=0000000000000000 rcx=fffff880023a6190
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001ffeffc rsp=fffff880023a6140 rbp=fffff880023a63c0
 r8=fffff8a000003000  r9=00000000000001f0 r10=fffffa8005544420
r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt! ?? ::NNGAKEGL::`string'+0x2b705:
fffff800`01ffeffc 488d4c2468      lea     rcx,[rsp+68h]
Resetting default scope

LOCK_ADDRESS:  fffff80001ec1400 -- (!locks fffff80001ec1400)

Resource @ nt!PiEngineLock (0xfffff80001ec1400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff80001ec1400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80001cbcca9 to fffff80001cbd740

STACK_TEXT:  
fffff880`023a59f8 fffff800`01cbcca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`023a5a00 fffff800`01cbb920 : 00000000`00000010 fffff980`03e0eee0 fffff880`023a5b60 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`023a5b40 fffff800`01cdd436 : 00600000`01ffe121 fffff800`01cede60 00000000`00000010 00000000`00000202 : nt!KiPageFault+0x260
fffff880`023a5cd0 fffff800`01c9a0b7 : 00000000`00000000 fffff880`023a5ee0 00000000`00000000 fffff880`00000000 : nt!IopCompleteRequest+0xc73
fffff880`023a5da0 fffff800`01c9a477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`023a5e20 fffff800`01cbb7bf : 00000000`00000008 00000000`00000000 00000000`00000000 00001f80`010877c0 : nt!KiApcInterrupt+0xd7
fffff880`023a5fb0 fffff800`01ffeffc : fffffa80`05588000 00000000`00000001 fffffa80`05544420 00001f80`01080000 : nt!KiPageFault+0xff
fffff880`023a6140 fffff800`01cbc993 : fffffa80`05588040 fffff880`023a64f8 fffffa80`00000001 fffff980`01590e90 : nt! ?? ::NNGAKEGL::`string'+0x2b705
fffff880`023a62d0 fffff800`01cb8f30 : fffff800`01f2d8bf ffffffff`800001f0 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`023a64d8 fffff800`01f2d8bf : ffffffff`800001f0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`023a64e0 fffff800`01f2de4b : fffffa80`05536060 fffff800`01fc3300 00000000`00000000 00000000`00000000 : nt!IopGetRegistryValue+0xab
fffff880`023a6540 fffff800`01f2dd78 : fffff880`023a6a30 00000000`00000004 fffffa80`06df1d90 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0x9f
fffff880`023a66a0 fffff880`00e1dac4 : 00000000`00000010 fffff880`023a6a30 00000000`00000010 00000000`00010293 : nt!IoGetDeviceProperty+0xbc
fffff880`023a6780 fffff880`00e049d5 : fffff980`017e6ea0 fffff800`021512a7 00000000`00000004 fffff980`017e6ea0 : pci!PciDevice_QueryCapabilities+0xdc
fffff880`023a67c0 fffff800`02164c16 : fffff980`017e6ea0 00000000`00000002 fffffa80`07142a20 fffff800`0216037e : pci!PciDispatchPnpPower+0xd9
fffff880`023a6800 fffff800`0216752a : fffff980`017e6f70 fffffa80`07142a20 fffffa80`09117200 fffffa80`08f2eda0 : nt!IovCallDriver+0x566
fffff880`023a6860 fffff800`02164c16 : fffff980`017e6ea0 00000000`00000002 fffffa80`09117200 fffffa80`08f2ee70 : nt!ViFilterDispatchPnp+0x13a
fffff880`023a6890 fffff800`01f28a09 : fffffa80`09117200 00000000`c00000bb fffff880`023a6990 fffffa80`08f2ee70 : nt!IovCallDriver+0x566
fffff880`023a68f0 fffff800`0207d207 : fffff880`023a6a30 fffffa80`071416e0 00000000`00000040 00000000`00000004 : nt!IopSynchronousCall+0xc5
fffff880`023a6960 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpIrpQueryCapabilities+0x87


STACK_COMMAND:  kb

FOLLOWUP_IP: 
pci!PciDevice_QueryCapabilities+dc
fffff880`00e1dac4 488b8790000000  mov     rax,qword ptr [rdi+90h]

SYMBOL_STACK_INDEX:  d

SYMBOL_NAME:  pci!PciDevice_QueryCapabilities+dc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: pci

IMAGE_NAME:  pci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc117

FAILURE_BUCKET_ID:  X64_0xA_VRF_pci!PciDevice_QueryCapabilities+dc

BUCKET_ID:  X64_0xA_VRF_pci!PciDevice_QueryCapabilities+dc

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031311-10296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`01c5a000 PsLoadedModuleList = 0xfffff800`01e97e50
Debug session time: Sun Mar 13 17:38:13.562 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:04.078
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80001cea2b3}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+d3d )

Followup: Pool_corruption
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001cea2b3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001f020e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`01cea2b3 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff88002392050 -- (.trap 0xfffff88002392050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002391d10 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001cea2b3 rsp=fffff880023921e0 rbp=fffff88002392330
 r8=fffff880023922e8  r9=fffff880023922e0 r10=0000000000000002
r11=fffff80001ce97d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!IopCompleteRequest+0xae3:
fffff800`01cea2b3 488b09          mov     rcx,qword ptr [rcx] ds:ed10:00000000`00000000=????????????????
Resetting default scope

LOCK_ADDRESS:  fffff80001ece400 -- (!locks fffff80001ece400)

Resource @ nt!PiEngineLock (0xfffff80001ece400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff80001ece400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80001cc9ca9 to fffff80001cca740

STACK_TEXT:  
fffff880`02391f08 fffff800`01cc9ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02391f10 fffff800`01cc8920 : 00000000`00000040 fffff980`040daee0 fffff8a0`03500df0 00000000`00000040 : nt!KiBugCheckDispatch+0x69
fffff880`02392050 fffff800`01cea2b3 : 00000000`00000000 0000007f`fffffff8 fffff880`02392380 fffff800`01ce6d26 : nt!KiPageFault+0x260
fffff880`023921e0 fffff800`01ca70b7 : 00000000`00000001 00000000`00000000 fffff8a0`00535d00 fffff800`00000000 : nt!IopCompleteRequest+0xae3
fffff880`023922b0 fffff800`01ca7477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02392330 fffff800`01d6fd31 : fffff980`015a2fa0 00000000`00000060 fffff880`02392708 fffff980`015a2fa0 : nt!KiApcInterrupt+0xd7
fffff880`023924c0 fffff800`02165624 : 00000000`00000060 ffffffff`800001d4 fffff980`015a2f00 fffff980`015a2fa0 : nt!VfAvlUnlockShared+0x41
fffff880`023924f0 fffff800`01dc10df : 00000000`00000060 fffff980`015a2fa0 fffff800`01f9b6f0 00000000`000007ff : nt!VfCheckForLookaside+0x94
fffff880`02392530 fffff800`01dfd1c1 : 00000000`00000060 00000000`00000000 00000000`0000001c fffff8a0`03500e00 : nt!ExpCheckForLookaside+0x1f
fffff880`02392560 fffff800`02075b7b : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000100 : nt!ExDeferredFreePool+0xd3d
fffff880`02392610 fffff800`020ac611 : fffff880`02392708 00000000`00000002 00000000`00000001 fffff980`015a2fa0 : nt!PipGetRegistrySecurityWithFallback+0x12b
fffff880`023926b0 fffff800`020b67d3 : fffffa80`08fafe00 fffffa80`08f75480 fffff8a0`03427260 fffffa80`07122750 : nt!PipChangeDeviceObjectFromRegistryProperties+0x161
fffff880`023927a0 fffff800`020b7c92 : fffffa80`07115750 fffffa80`07122750 00000000`00000002 fffffa80`07122a20 : nt!PipCallDriverAddDevice+0x733
fffff880`02392950 fffff800`020b812c : fffffa80`08f0b000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02392bc0 fffff800`01dcc3a2 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02392c10 fffff800`01cd7961 : fffff800`01dcc0a0 fffff800`01fc4901 fffffa80`05507000 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02392cb0 fffff800`01f6d7c6 : 00000000`00000000 fffffa80`05507040 00000000`00000080 fffffa80`054c3890 : nt!ExpWorkerThread+0x111
fffff880`02392d40 fffff800`01ca8c26 : fffff880`022a4180 fffffa80`05507040 fffff880`022af0c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02392d80 00000000`00000000 : fffff880`02393000 fffff880`0238d000 fffff880`02391f90 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+d3d
fffff800`01dfd1c1 8b05792b0700    mov     eax,dword ptr [nt!ExpPoolFlags (fffff800`01e6fd40)]

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  nt!ExDeferredFreePool+d3d

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+d3d

BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+d3d

Followup: Pool_corruption
---------





DRIVERS

Code:
start             end                 module name
fffff880`00f43000 fffff880`00f9a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c24000 fffff880`02cae000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`013ce000 fffff880`013d9000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`02ff8000 fffff880`02fff000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03394000 fffff880`033a5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02f94000 fffff880`02fbe000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d09000 fffff880`00dc9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01659000 fffff880`01689000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cab000 fffff880`00d09000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`016e6000 fffff880`01759000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`01689000 fffff880`01697000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`032f3000 fffff880`03376000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03376000 fffff880`03394000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02de5000 fffff880`02df4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01643000 fffff880`01659000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02f81000 fffff880`02f94000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02e2d000 fffff880`02f81000   dump_iaStor dump_iaStor.sys Sat Nov 06 03:44:52 2010 (4CD50774)
fffff880`04cbc000 fffff880`04db0000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04db0000 fffff880`04df6000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0124c000 fffff880`01260000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01200000 fffff880`0124c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0176a000 fffff880`01774000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01609000 fffff880`01643000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0182b000 fffff880`01875000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`01c11000 fffff800`01c5a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0127a000 fffff880`013ce000   iaStor   iaStor.sys   Sat Nov 06 03:44:52 2010 (4CD50774)
fffff880`010cf000 fffff880`011ed000   iaStorV  iaStorV.sys  Wed Apr 08 12:57:17 2009 (49DCD76D)
fffff880`033cb000 fffff880`033e1000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff800`01a49000 fffff800`01a53000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`015b5000 fffff880`015cf000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01800000 fffff880`0182b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c53000 fffff880`00c97000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`00dc9000 fffff880`00de3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02fbe000 fffff880`02fef000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`016ce000 fffff880`016d9000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fa3000 fffff880`00fad000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dda000 fffff880`02de5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019ea000 fffff880`019fc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01889000 fffff880`0197b000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02d22000 fffff880`02d31000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cae000 fffff880`02cf3000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0197b000 fffff880`019db000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`015cf000 fffff880`015e0000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dce000 fffff880`02dda000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`01c5a000 fffff800`02237000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01412000 fffff880`015b5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02fef000 fffff880`02ff8000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04cba000 fffff880`04cbb180   nvBridge nvBridge.kmd Fri May 21 19:31:11 2010 (4BF717BF)
fffff880`0404c000 fffff880`04cb9d00   nvlddmkm nvlddmkm.sys Fri May 21 19:35:15 2010 (4BF718B3)
fffff880`02cfc000 fffff880`02d22000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fad000 fffff880`00fe0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01759000 fffff880`0176a000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c97000 fffff880`00cab000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02d7d000 fffff880`02dce000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02e1e000 fffff880`02e27000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`016bc000 fffff880`016c5000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`016c5000 fffff880`016ce000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`017c0000 fffff880`017fa000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02d31000 fffff880`02d4e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`019e3000 fffff880`019ea000   speedfan speedfan.sys Sun Sep 24 09:26:48 2006 (45168798)
fffff880`019db000 fffff880`019e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01a01000 fffff880`01bfe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`016d9000 fffff880`016e6000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`015e0000 fffff880`015fe000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d69000 fffff880`02d7d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`033a5000 fffff880`033cb000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00fe0000 fffff880`00fed000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02e00000 fffff880`02e0e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01697000 fffff880`016bc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01875000 fffff880`01885000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01774000 fffff880`017c0000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d4e000 fffff880`02d69000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02e0e000 fffff880`02e1e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e90000 fffff880`00f34000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f34000 fffff880`00f43000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cf3000 fffff880`02cfc000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00f9a000 fffff880`00fa3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
 
Top