One of your dumps directly blames AdAware for the crash. Uninstall AdAware completely. You have Malwarebytes installed, which is a better program anyway.
You also have some outdated drivers. Two are quite obsolete. They are XP drivers. Update or eliminate these drivers
mdmxsdk.sys Mon Jun 19 17:26:59 2006 - Conexant Modem Diagnostic Interface x86 Driver.
Conexant: Support. This is an XP driver. Update this driver or uninstall the diagnostic software.
nvraid.sys Wed May 20 02:43:36 2009 - nVidia nForce RAID Driver.
Drivers - Download NVIDIA Drivers. Update this driver.
nvstor32.sys Mon Jun 22 18:19:03 2009 - nVidia Storage Driver (nForce chipset driver).
Drivers - Download NVIDIA Drivers. Update this driver.
PS2.sys Mon Dec 12 20:26:59 2005 - HP Multimedia Keyboard Driver.
HP® - Holiday Deals on Laptops, Desktops, Printers, Servers and more. This is an XP driver. Update this driver. If you cannot update the driver, purchase another keyboard and rename this driver to disable it.
XAudio32.sys Wed Apr 29 14:20:55 2009 - Conexant SoftK56 Modem Audio Device Driver.
Conexant: Support. Update this driver.
Using Windows Explorer, navigate to C:\Windows\System32\Drivers, locate the driver files to be renamed, and rename them from .sys to .old. Reboot and the drivers will not load. This will break whatever software or hardware these drivers are associated with.
How to find drivers -
- I have listed links to most of the drivers in the code box above. Please use the links there to see what info I've found about those drivers.
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e17000 PsLoadedModuleList = 0x82f5f810
Debug session time: Fri Dec 3 00:08:32.067 2010 (GMT-5)
System Uptime: 0 days 3:34:50.956
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, 82eb0973}
*** WARNING: Unable to verify timestamp for Lbd.sys
*** ERROR: Module load completed but symbols could not be loaded for Lbd.sys
Probably caused by : tdx.sys ( tdx!TdxConnectConnection+3f7 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000008, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82eb0973, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82f7f718
Unable to read MiSystemVaType memory at 82f5f160
00000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlpPopulateContext+34
82eb0973 8b7908 mov edi,dword ptr [ecx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: 8fc1578c -- (.trap 0xffffffff8fc1578c)
ErrCode = 00000000
eax=865c4ef0 ebx=a8c717a3 ecx=00000000 edx=86099300 esi=8fc15850 edi=00100090
eip=82eb0973 esp=8fc15800 ebp=8fc15808 iopl=0 nv up ei pl nz na po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010203
nt!RtlpPopulateContext+0x34:
82eb0973 8b7908 mov edi,dword ptr [ecx+8] ds:0023:00000008=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82eb0973 to 82e5d82b
STACK_TEXT:
8fc1578c 82eb0973 badb0d00 86099300 00000002 nt!KiTrap0E+0x2cf
8fc15808 82eae522 a8c717a3 86179df8 85f5efb8 nt!RtlpPopulateContext+0x34
8fc15824 8c477966 865bc694 a8c717a3 8fc15850 nt!RtlLookupEntryHashTable+0x1e
8fc15898 8c485d1e 86179df8 00000000 00000000 tcpip!TcpInsertTcb+0x1be
8fc158f4 8c474d97 86179df8 00000000 86179df8 tcpip!TcpCreateAndConnectTcbRateLimitComplete+0x319
8fc1592c 8c4764db 86179df8 00000000 86179df8 tcpip!TcpCreateAndConnectTcbInspectConnectComplete+0x20d
8fc1595c 8c482524 86179df8 00000000 86179f34 tcpip!TcpContinueCreateAndConnect+0x69b
8fc15974 8c471af2 86179df8 00000000 00000000 tcpip!TcpCreateAndConnectTcbInspectConnectRequestComplete+0xf8
8fc159dc 8c482405 86179f34 86998e68 86b24830 tcpip!TcpCreateAndConnectTcbWorkQueueRoutine+0x4df
8fc15a38 91b0b3c9 86ab3bf0 8fc15a54 8586abf0 tcpip!TcpCreateAndConnectTcb+0x82a
8fc15ab8 91b10317 00998e68 8586abf0 8586ac30 tdx!TdxConnectConnection+0x3f7
8fc15ad4 82e534bc 86ab3ae8 8586abf0 87e18fb8 tdx!TdxTdiDispatchInternalDeviceControl+0x149
8fc15aec 8c06689d 871a31b0 87e18f00 8fc15b14 nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
8fc15afc 82e534bc 87e18f00 8586abf0 861cc6c8 Lbd+0x289d
8fc15b14 91b7f3a7 1e77c956 00012007 91b7ea35 nt!IofCallDriver+0x63
8fc15bec 91b79504 87f517c0 86401880 8fc15c14 afd!AfdConnect+0x972
8fc15bfc 82e534bc 86401880 8586abf0 8586abf0 afd!AfdDispatchDeviceControl+0x3b
8fc15c14 83054f6e 87f517c0 8586abf0 8586accc nt!IofCallDriver+0x63
8fc15c34 83071d5f 86401880 87f517c0 00000000 nt!IopSynchronousServiceTail+0x1f8
8fc15cd0 8307453a 86401880 8586abf0 00000000 nt!IopXxxControlFile+0x6aa
8fc15d04 82e5a44a 00000520 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
8fc15d04 777d64f4 00000520 00000000 00000000 nt!KiFastCallEntry+0x12a
029cfc4c 00000000 00000000 00000000 00000000 0x777d64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
tdx!TdxConnectConnection+3f7
91b0b3c9 6877060000 push 677h
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: tdx!TdxConnectConnection+3f7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tdx
IMAGE_NAME: tdx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf4a
FAILURE_BUCKET_ID: 0xA_tdx!TdxConnectConnection+3f7
BUCKET_ID: 0xA_tdx!TdxConnectConnection+3f7
Followup: MachineOwner
---------
Debug session time: Fri Dec 3 03:40:08.624 2010 (GMT-5)
System Uptime: 0 days 1:50:45.512
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 219c9, 3, 70bae}
Probably caused by : memory_corruption ( nt!MiBadShareCount+24 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 000219c9, page frame number
Arg3: 00000003, current page state
Arg4: 00070bae, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 82f2e6dc to 82f21d10
STACK_TEXT:
a008fa48 82f2e6dc 0000004e 00000099 000219c9 nt!KeBugCheckEx+0x1e
a008fa60 82f042a5 c000f000 c000f000 00000000 nt!MiBadShareCount+0x24
a008fb10 82efeaf2 879198e8 c000eff8 87f65b90 nt!MiDeletePageTableHierarchy+0x224
a008fc10 82eea2e7 01d20000 0211ffff 879198e8 nt!MiDeleteVirtualAddresses+0x3df
a008fc40 8308ddae 8c05cf9b 87f65b90 000000ff nt!MmCleanProcessAddressSpace+0x2cb
a008fcb4 830c21e1 00000000 87ad28d8 00000001 nt!PspExitThread+0x683
a008fccc 82eed133 87ad28d8 a008fcf8 a008fd04 nt!PsExitSpecialApc+0x22
a008fd1c 82e88504 00000001 00000000 a008fd34 nt!KiDeliverApc+0x28b
a008fd1c 774164f4 00000001 00000000 a008fd34 nt!KiServiceExit+0x64
WARNING: Frame IP not in any known module. Following frames may be wrong.
01aef868 00000000 00000000 00000000 00000000 0x774164f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
82f2e6dc cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------
Debug session time: Fri Dec 3 13:10:19.126 2010 (GMT-5)
System Uptime: 0 days 9:28:50.014
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {a423bc98, 1, 8304279d, 0}
Probably caused by : ntkrpamp.exe ( nt!IoRemoveIoCompletion+23 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: a423bc98, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 8304279d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f79718
Unable to read MiSystemVaType memory at 82f59160
a423bc98
FAULTING_IP:
nt!IoRemoveIoCompletion+23
8304279d 894508 mov dword ptr [ebp+8],eax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: lsass.exe
CURRENT_IRQL: 0
TRAP_FRAME: a427bbe4 -- (.trap 0xffffffffa427bbe4)
ErrCode = 00000002
eax=00000001 ebx=a427bce4 ecx=a427bcf0 edx=00000000 esi=87c5f108 edi=a427bcd8
eip=8304279d esp=a427bc58 ebp=a423bc90 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!IoRemoveIoCompletion+0x23:
8304279d 894508 mov dword ptr [ebp+8],eax ss:0010:a423bc98=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82e57638 to 82e96903
STACK_TEXT:
a427bbcc 82e57638 00000001 a423bc98 00000000 nt!MmAccessFault+0x106
a427bbcc 8304279d 00000001 a423bc98 00000000 nt!KiTrap0E+0xdc
a427bc90 82e82d06 87c611b8 a427bcc8 a427bcf0 nt!IoRemoveIoCompletion+0x23
a427bd24 82e5444a 000000cc 0118f9cc 0118fa78 nt!NtWaitForWorkViaWorkerFactory+0x1a1
a427bd24 77f064f4 000000cc 0118f9cc 0118fa78 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0118fa78 00000000 00000000 00000000 00000000 0x77f064f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IoRemoveIoCompletion+23
8304279d 894508 mov dword ptr [ebp+8],eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!IoRemoveIoCompletion+23
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
FAILURE_BUCKET_ID: 0x50_nt!IoRemoveIoCompletion+23
BUCKET_ID: 0x50_nt!IoRemoveIoCompletion+23
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
921c4000 921f0000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8bd93000 8bddb000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
9195d000 919b7000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
92725000 92737000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
90eb1000 90ec3000 amdk8 amdk8.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8bfd4000 8bfdd000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
a139f000 a13a8000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
8bf2a000 8bf33000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8bf33000 8bf56000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
9ae00000 9ae4d000 ATMFD ATMFD.DLL Wed May 26 23:49:36 2010 (4BFDEBD0)
91897000 9189e000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
90e82000 90e90000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8bc1f000 8bc27000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9faa8000 9fac1000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
9b1b0000 9b1ce000 cdd cdd.dll unavailable (00000000)
9184e000 9186d000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8bc69000 8bd14000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8bf05000 8bf2a000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8bc27000 8bc69000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8c23d000 8c29a000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
93be6000 93bf3000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
92f94000 92fa1000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
90e6a000 90e82000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
90e5e000 90e6a000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8c400000 8c411000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
92f03000 92f1c000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
92fa1000 92fab000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:24:27 2010 (4C3BDC6B)
92fe2000 92ff3000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
92fab000 92fe2000 dump_nvstor32 dump_nvstor32.sys Mon Jun 22 18:19:03 2009 (4A400357)
92f7f000 92f89000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
9266e000 92725000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
93bad000 93be6000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8c050000 8c061000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8c01c000 8c050000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8c2a8000 8c2b1000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8c200000 8c232000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55)
8c563000 8c594000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
92668000 9266d280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
83221000 83258000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
90fde000 90ffd000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
92102000 921b7000 HSX_CNXT HSX_CNXT.sys Fri Feb 13 15:57:25 2009 (4995DEB5)
92000000 92102000 HSX_DP HSX_DP.sys Fri Feb 13 15:56:27 2009 (4995DE7B)
90f5e000 90faa000 HSXHWBS2 HSXHWBS2.sys Fri Feb 13 15:58:27 2009 (4995DEF3)
9fa23000 9faa8000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
8c5eb000 8c5f3000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
90ec3000 90edb000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
90eed000 90efa000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80b9d000 80ba5000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
a1332000 a1334180 KernExplorer KernExplorer.sys Mon Oct 25 03:11:19 2010 (4CC52D97)
90faa000 90fde000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0)
8c1ca000 8c1dd000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8c3a6000 8c3cb000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
8c061000 8c06f100 Lbd Lbd.sys Tue May 25 03:45:27 2010 (4BFB8017)
92611000 92621000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
92c00000 92c1b000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
8bc03000 8bc0e000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
9fb64000 9fb67180 mdmxsdk mdmxsdk.sys Mon Jun 19 17:26:59 2006 (449716A3)
921b7000 921c4000 modem modem.sys Mon Jul 13 19:55:24 2009 (4A5BC96C)
92f89000 92f94000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
90edb000 90ee8000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8bed0000 8bee6000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
9186d000 91890000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
a1308000 a1310e00 MpNWMon MpNWMon.sys Sat Mar 20 00:03:24 2010 (4BA4490C)
9fac1000 9fad3000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
9fad3000 9faf6000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
9faf6000 9fb31000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
9fb31000 9fb4c000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
918f0000 918fb000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8bde4000 8bdec000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8c19f000 8c1ca000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
90e54000 90e5e000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8c5db000 8c5eb000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8c2b1000 8c368000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
93bf3000 93bfe000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
9274f000 92771000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
92600000 92611000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
919dd000 919eb000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
9192b000 9195d000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
8c368000 8c3a6000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
918fb000 91909000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
90e4a000 90e54000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82e11000 83221000 nt ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
8c070000 8c19f000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
91890000 91897000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
93bab000 93bac040 nvBridge nvBridge.kmd Sat Oct 16 13:04:23 2010 (4CB9DB17)
9320e000 93baa5a0 nvlddmkm nvlddmkm.sys Sat Oct 16 13:07:56 2010 (4CB9DBEC)
92623000 92667880 nvmf6232 nvmf6232.sys Thu Jul 30 19:47:55 2009 (4A72312B)
8bee6000 8bf05000 nvraid nvraid.sys Wed May 20 02:43:36 2009 (4A13A698)
8bf56000 8bf8d000 nvstor32 nvstor32.sys Mon Jun 22 18:19:03 2009 (4A400357)
919be000 919dd000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
8be4f000 8be60000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8be1a000 8be44000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8bebb000 8bec2000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8bec2000 8bed0000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8c29a000 8c2a8000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9fb68000 9fbff000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
92ed4000 92f03000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
90ee8000 90eeca80 PS2 PS2.sys Mon Dec 12 20:26:59 2005 (439E2363)
8bc0e000 8bc1f000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
92737000 9274f000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
92771000 92789000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
92789000 927a0000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
927a0000 927b7000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
90e09000 90e4a000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
918d8000 918e0000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
918e0000 918e8000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
918e8000 918f0000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
a12d7000 a1308000 RDPWD RDPWD.SYS Mon Jul 13 20:01:50 2009 (4A5BCAEE)
8c3cb000 8c3f8000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
91800000 91813000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
92c37000 92ed37c0 RTKVHDA RTKVHDA.sys Tue Aug 04 05:48:13 2009 (4A7803DD)
9fa00000 9fa0a000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
8c5d3000 8c5db000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
a126f000 a12c0000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
a1220000 a126f000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
91813000 91834000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
8bf8d000 8bfd4000 storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
93bfe000 93bff380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8c41a000 8c563000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
9fa0a000 9fa17000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
91920000 9192b000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
a12c0000 a12ca000 tdtcp tdtcp.sys Mon Jul 13 20:01:37 2009 (4A5BCAE1)
91909000 91920000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8c1dd000 8c1ed000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
9b180000 9b189000 TSDDD TSDDD.dll Mon Jul 13 20:01:40 2009 (4A5BCAE4)
a12ca000 a12d7000 tssecsrv tssecsrv.sys Mon Jul 13 20:01:50 2009 (4A5BCAEE)
90e90000 90eb1000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
93200000 9320e000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
92f1c000 92f33000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
92f33000 92f34700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
90f4f000 90f5e000 usbehci usbehci.sys Fri Oct 23 23:58:55 2009 (4AE27B7F)
927b7000 927fb000 usbhub usbhub.sys Sat Oct 24 00:00:05 2009 (4AE27BC5)
90efa000 90f04000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
90f04000 90f4f000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
92f68000 92f7f000 USBSTOR USBSTOR.SYS Mon Jul 13 19:51:19 2009 (4A5BC877)
92f35000 92f58b80 usbvideo usbvideo.sys Wed Mar 03 23:04:40 2010 (4B8F3158)
8be44000 8be4f000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
9189e000 918aa000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
918aa000 918cb000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8be60000 8be70000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8be70000 8bebb000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8c594000 8c5d3000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
919eb000 919fe000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
918cb000 918d8000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8bd14000 8bd85000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8bd85000 8bd93000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
919b7000 919be000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
9af20000 9b16b000 win32k win32k.sys Tue Aug 31 22:34:29 2010 (4C7DBBB5)
8bddb000 8bde4000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
92c1b000 92c35000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
a1311000 a1331480 WUDFRd WUDFRd.sys Mon Jul 13 19:50:44 2009 (4A5BC854)
9fa17000 9fa1f000 XAudio32 XAudio32.sys Wed Apr 29 14:20:55 2009 (49F89A87)
92f59000 92f67b00 xusb21 xusb21.sys Thu Aug 13 18:09:56 2009 (4A848F34)
Unloaded modules:
a1335000 a139f000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9fb4c000 9fb64000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8c5f3000 8c600000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8c232000 8c23c000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
91806000 9183d000 dump_nvstor3
Timestamp: unavailable (00000000)
Checksum: 00000000
9183d000 9184e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000