1. Replace AVG with MSE:
AVG Worldwide - Download tools
http://www.microsoft.com/security_essentials/
2. Update:
ElRawDsk.sys Sat Jul 26 20:59:09 2008
RawDisk EldoS Corporation
speedfan.sys Sun Sep 24 16:26:48 2006
Speedfan
k57nd60a.sys Thu Aug 06 14:44:32 2009
Broadcom NetLink (TM) Gigabit Ethernet
RTKVHD64.sys Tue Aug 18 12:29:10 2009
Realtek High Definition Audio
athrx.sys Sat Oct 24 04:49:44 2009
Atheros CB42/CB43/MB42/MB43 Wireless LAN
HECIx64.sys Thu Sep 17 22:54:16 2009
Intel Management Engine
3. If crashes persist, attach the latest .dmp's and also do the memory test:
RAM - Test with Memtest86+
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101010-20139-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03265000 PsLoadedModuleList = 0xfffff800`034a2e50
Debug session time: Sun Oct 10 13:09:12.319 2010 (GMT-5)
System Uptime: 0 days 1:49:06.880
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff800032d36d0}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800032d36d0
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: war3.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008b6bed0 -- (.trap 0xfffff88008b6bed0)
Unable to read trap frame at fffff880`08b6bed0
LAST_CONTROL_TRANSFER: from fffff800032d4ca9 to fffff800032d5740
STACK_TEXT:
fffff880`02f6ace8 fffff800`032d4ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02f6acf0 fffff800`032d3172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f6ae30 fffff800`032d36d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`08b6bed0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`032d3172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101110-23696-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0324e000 PsLoadedModuleList = 0xfffff800`0348be50
Debug session time: Tue Oct 12 03:06:18.145 2010 (GMT-5)
System Uptime: 0 days 0:19:44.706
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800032ffa93, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiGetProtoPteAddressExtended+17 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800032ffa93, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiGetProtoPteAddressExtended+17
fffff800`032ffa93 4d8b4808 mov r9,qword ptr [r8+8]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034f60e0
ffffffffffffffff
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: war3.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88007834828 -- (.exr 0xfffff88007834828)
ExceptionAddress: fffff800032ffa93 (nt!MiGetProtoPteAddressExtended+0x0000000000000017)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880078348d0 -- (.trap 0xfffff880078348d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007304290
rdx=000000000001140f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032ffa93 rsp=fffff88007834a60 rbp=fffff88007834b40
r8=41d98b48c9334500 r9=ab4217058b4820ec r10=fffffa8007304290
r11=ff04000a00000017 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiGetProtoPteAddressExtended+0x17:
fffff800`032ffa93 4d8b4808 mov r9,qword ptr [r8+8] ds:dc30:41d98b48`c9334508=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032f8a39 to fffff800032be740
STACK_TEXT:
fffff880`07834058 fffff800`032f8a39 : 00000000`0000001e ffffffff`c0000005 fffff800`032ffa93 00000000`00000000 : nt!KeBugCheckEx
fffff880`07834060 fffff800`032bdd82 : fffff880`07834828 fffffa80`07304290 fffff880`078348d0 fffff880`07834bb8 : nt!KiDispatchException+0x1b9
fffff880`078346f0 fffff800`032bc68a : 3e80fffc`3f007ffe 3ebf0004`3f007ffe 45680000`c5f00000 c5f00000`44a00000 : nt!KiExceptionDispatch+0xc2
fffff880`078348d0 fffff800`032ffa93 : fffff900`000000a6 fffff960`001b9893 fffff900`c073dc30 fffff800`033fcdd0 : nt!KiGeneralProtectionFault+0x10a
fffff880`07834a60 fffff800`032db291 : fffffa80`07304290 fffffa80`06fffb60 00000000`1140ffc0 00000000`00000000 : nt!MiGetProtoPteAddressExtended+0x17
fffff880`07834a90 fffff800`032d9094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000000a6 : nt!MiCheckVirtualAddress+0x231
fffff880`07834ac0 fffff800`032bc82e : 00000000`00000000 00000000`1140ffc0 00000000`00000001 fffffa80`073e01b0 : nt!MmAccessFault+0xc94
fffff880`07834c20 00000000`6f531056 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0018f97c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6f531056
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiGetProtoPteAddressExtended+17
fffff800`032ffa93 4d8b4808 mov r9,qword ptr [r8+8]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiGetProtoPteAddressExtended+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_nt!MiGetProtoPteAddressExtended+17
BUCKET_ID: X64_0x1E_nt!MiGetProtoPteAddressExtended+17
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101210-22791-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03219000 PsLoadedModuleList = 0xfffff800`03456e50
Debug session time: Tue Oct 12 09:30:01.979 2010 (GMT-5)
System Uptime: 0 days 1:30:39.540
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80003286e7f}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80003286e7f
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: war3.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003288ca9 to fffff80003289740
STACK_TEXT:
fffff800`00ba4d28 fffff800`03288ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`03287172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`03286e7f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`077fefe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0xbf
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`03287172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
0: kd> lmtn
start end module name
fffff800`00bad000 fffff800`00bb7000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`03219000 fffff800`037f5000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`037f5000 fffff800`0383e000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c1a000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00c1a000 fffff880`00c23000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00c23000 fffff880`00c4d000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00c4d000 fffff880`00c58000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00c72000 fffff880`00cb6000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00cb6000 fffff880`00cca000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cca000 fffff880`00d28000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d28000 fffff880`00de8000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00e00000 fffff880`00e15000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e71000 fffff880`00e78000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e78000 fffff880`00e88000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00e8b000 fffff880`00f2f000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f2f000 fffff880`00f3e000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f3e000 fffff880`00f95000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f95000 fffff880`00f9e000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f9e000 fffff880`00fa8000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fa8000 fffff880`00fdb000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fdb000 fffff880`00fe8000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00fe8000 fffff880`00ffd000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`0103a000 fffff880`01074000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01074000 fffff880`010c0000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`010c0000 fffff880`010d4000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010d4000 fffff880`01132000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01132000 fffff880`011a5000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`011a5000 fffff880`011f1000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`0121b000 fffff880`01231000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01239000 fffff880`013dc000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013dc000 fffff880`013f6000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`014d5000 fffff880`014dd000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`014dd000 fffff880`014e4000 speedfan speedfan.sys Sun Sep 24 16:26:48 2006 (45168798)
fffff880`014e4000 fffff880`014ed000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`014f4000 fffff880`015e6000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`015e6000 fffff880`015f8000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`01809000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01809000 fffff880`01812000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01812000 fffff880`0181b000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0181b000 fffff880`01826000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01826000 fffff880`01837000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01837000 fffff880`01855000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`01855000 fffff880`01862000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01862000 fffff880`018c3000 avgtdia avgtdia.sys Tue Sep 07 03:52:11 2010 (4C858CBB)
fffff880`018c3000 fffff880`018e1000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`018f5000 fffff880`01925000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01925000 fffff880`0192f000 avgrkx64 avgrkx64.sys Tue Sep 07 03:49:37 2010 (4C858C21)
fffff880`0192f000 fffff880`01939000 AVGIDSEH AVGIDSEH.Sys Tue Sep 14 01:46:38 2010 (4C8EA9CE)
fffff880`01939000 fffff880`01956000 cdfs cdfs.sys Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`01956000 fffff880`01969000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`0196f000 fffff880`01999000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`01999000 fffff880`019a8000 avgmfx64 avgmfx64.sys Tue Sep 07 03:49:14 2010 (4C858C0A)
fffff880`019a8000 fffff880`019b1000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`019b1000 fffff880`019b8000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`019b8000 fffff880`019c6000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`019c6000 fffff880`019eb000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`019eb000 fffff880`019fb000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02800000 fffff880`028a6000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`028b5000 fffff880`028d8000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`028d8000 fffff880`028f9000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`028f9000 fffff880`0290e000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0290e000 fffff880`02961000 nwifi nwifi.sys Tue Jul 14 03:07:23 2009 (4A5BCC3B)
fffff880`02961000 fffff880`02974000 ndisuio ndisuio.sys Tue Jul 14 03:09:25 2009 (4A5BCCB5)
fffff880`02974000 fffff880`0298c000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0298c000 fffff880`029b9000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`029b9000 fffff880`029ed000 AVGIDSDriver AVGIDSDriver.Sys Wed Aug 04 01:24:45 2010 (4C58972D)
fffff880`02c00000 fffff880`02c0c000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02c0c000 fffff880`02c1a000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`02c1c000 fffff880`02c61000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02c61000 fffff880`02ceb000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02ceb000 fffff880`02cf4000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02cf4000 fffff880`02d1a000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02d1a000 fffff880`02d30000 vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
fffff880`02d30000 fffff880`02d3f000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d3f000 fffff880`02d5a000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02d5a000 fffff880`02d6e000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`02d6e000 fffff880`02dbf000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`02dbf000 fffff880`02dcb000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`02dcb000 fffff880`02dd6000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`02dd6000 fffff880`02de0000 ElRawDsk ElRawDsk.sys Sat Jul 26 20:59:09 2008 (488B65ED)
fffff880`02de0000 fffff880`02def000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`02def000 fffff880`02e00000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03a00000 fffff880`03a22000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`03a22000 fffff880`03a7e000 HdAudio HdAudio.sys Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`03a7e000 fffff880`03a97000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`03a97000 fffff880`03ab2000 USBSTOR USBSTOR.SYS Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`03ab2000 fffff880`03abf000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`03abf000 fffff880`03acb000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`03acb000 fffff880`03ad9000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`03adb000 fffff880`03b2a000 avgldx64 avgldx64.sys Tue Sep 07 03:49:29 2010 (4C858C19)
fffff880`03b2a000 fffff880`03b50000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03b50000 fffff880`03b66000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03b66000 fffff880`03bc0000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`03bc0000 fffff880`03bfd000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`03c00000 fffff880`03c11000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`03c11000 fffff880`03c67000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`03c67000 fffff880`03c82000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`03c82000 fffff880`03c90000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`03c90000 fffff880`03d84000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`03d84000 fffff880`03dca000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`03dca000 fffff880`03dee000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`03dee000 fffff880`03dff000 HECIx64 HECIx64.sys Thu Sep 17 22:54:16 2009 (4AB293E8)
fffff880`03e00000 fffff880`03e24000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03e24000 fffff880`03e30000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`03e30000 fffff880`03e31480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`03e32000 fffff880`03e37200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`03e39000 fffff880`03fb6000 athrx athrx.sys Sat Oct 24 04:49:44 2009 (4AE25D38)
fffff880`03fb6000 fffff880`03fc3000 vwifibus vwifibus.sys Tue Jul 14 03:07:21 2009 (4A5BCC39)
fffff880`03fc3000 fffff880`03fd0000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`03fd0000 fffff880`03fe0000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`03fe0000 fffff880`03ff6000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`03ff6000 fffff880`03fff000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04a00000 fffff880`04a0e000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`04a0e000 fffff880`04a16080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04a17000 fffff880`04a18f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04a1c000 fffff880`04bfe900 RTKVHD64 RTKVHD64.sys Tue Aug 18 12:29:10 2009 (4A8A7466)
fffff880`04e27000 fffff880`04eef000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`04eef000 fffff880`04f0d000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`04f0d000 fffff880`04f25000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`04f25000 fffff880`04f52000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`04f52000 fffff880`04fa0000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`04fa0000 fffff880`04fc3000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`04fc3000 fffff880`04fcf000 AVGIDSFilter AVGIDSFilter.Sys Wed Aug 04 01:23:21 2010 (4C5896D9)
fffff880`04fcf000 fffff880`04fda000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`04fda000 fffff880`04fec000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0540c000 fffff880`05474000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`05474000 fffff880`0550a000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`0550a000 fffff880`0553b000 WUDFRd WUDFRd.sys Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff880`0553b000 fffff880`05571000 fastfat fastfat.SYS Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`0fe00000 fffff880`0fe0f000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0fe0f000 fffff880`0fe52000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`0fe52000 fffff880`0fe64000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`0fe64000 fffff880`0fe79000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0fe79000 fffff880`0fe9c000 nvhda64v nvhda64v.sys Tue Jun 22 01:07:25 2010 (4C1FE29D)
fffff880`0fea2000 fffff880`10b33e00 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`10b34000 fffff880`10b35180 nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`10b36000 fffff880`10b87000 k57nd60a k57nd60a.sys Thu Aug 06 14:44:32 2009 (4A7AC220)
fffff880`10b87000 fffff880`10bb6000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`10bb6000 fffff880`10bd7000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`10bd7000 fffff880`10bf1000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`10bf1000 fffff880`10c00000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff960`000d0000 fffff960`003df000 win32k win32k.sys Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`005a0000 fffff960`005aa000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00760000 fffff960`00787000 cdd cdd.dll Wed May 19 22:48:26 2010 (4BF4408A)
Unloaded modules:
fffff880`05571000 fffff880`055e2000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01939000 fffff880`01947000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01947000 fffff880`01953000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01953000 fffff880`0195c000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0195c000 fffff880`0196f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000