BSOD when exiting programs/games sometimes


  1. Posts : 3
    Windows 7 Professional, 32bit
       #1

    BSOD when exiting programs/games sometimes


    ok, i wrote this in a similar thread started by someone else, but got no answer for the last two days, so i'm making a new thread.

    I'm getting BSODs on windows 7 - for about 10 months now (i'm serious!)

    I've been using Windows 7 Professional 64bit from february till july 2010, and Windows 7 Professional 32bit from july until two weeks ago. BSODs appeared on both versions, when exiting a game but not always (Counter-strike, half-life2 deathmatch, even quake live etc).

    Searched a bit on the net, found similar topics even on this forum, but no real solution.

    so i'm attaching the content from the minidump folder. it's only from my win 7 32bit, i have no files left from my win 7 64bit installation (prior to july).
    i find the issues quite similar to alexseven's description, i've seen BSODs more often when exiting Counter-Strike (maybe because it's my most played game). About 1 of 10 times when pressing quit in the game, would result in a BSOD - saying something about cdd.dll, sometimes win32k.sys, sometimes no file was specified. While the BSOD was on my screen, a buzzing noise could be heared from my speakers (I've disabled the automatic restart, so i can get to read the messages in the BSOD - i even took pictures of them, and could hear the noise untill i would reset my PC manually).
    I got BSODs not only in games, but also when exiting Steam, and sometimes Yahoo messenger (v 10).
    I don't know if it matters, but i use iTunes quite often so it was running most of the time on my computer.

    I was suspecting the video card to be faulty (which i purchased just before i've migrated to windows 7 - thanks to MS Academic Alliance for the free license, btw ). Unfortunately, the video card seems to be working properly, since i'm running windows XP again for about two weeks now, and there's no sign of any BSOD on windows XP (and i'm spending more time in games - mainly Counter-strike - than i was spending in the last weeks or so, on windows 7).

    forgot to mention: during the months spent running windows 7 (either 32 or 64bit version) i've tried several versions of display driver, some from the asus site, others directly from amd/ati site. got BSODs on all, don't remember if there was a differrence in the frequency of BSODs between each driver version.
    Last edited by ezekiel87; 18 Dec 2010 at 01:08. Reason: made it more clear
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    1. Remove Avira and install MSE as the replacement:

    avgntflt.sys Thu Nov 11 10:54:47 2010

    http://www.microsoft.com/security_essentials/



    2. Update :

    AmdLLD.sys Fri Jun 29 15:47:32 2007
    AMD Low Level Device Driver

    atipmdag.sys Fri Dec 11 15:31:46 2009
    ATI video card

    EIO1.sys Wed Aug 08 03:15:17 2007
    ASUS Kernel Mode Driver

    Visit both ASUS and NVIDIA support sites to check for nForce (motherboard) updates:
    nvmf6232.sys Thu Jul 30 19:47:55 2009






    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\110610-20389-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e39000 PsLoadedModuleList = 0x82f81810
    Debug session time: Sat Nov  6 06:23:21.913 2010 (UTC - 5:00)
    System Uptime: 0 days 3:14:42.880
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 82ec3f21, 8ce13a94, 0}
    
    Probably caused by : cdd.dll ( cdd!CGuardMutex::Enter+d )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82ec3f21, The address that the exception occurred at
    Arg3: 8ce13a94, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+1a
    82ec3f21 f00fba3000      lock btr dword ptr [eax],0
    
    TRAP_FRAME:  8ce13a94 -- (.trap 0xffffffff8ce13a94)
    ErrCode = 00000002
    eax=00000000 ebx=8922207e ecx=00000000 edx=00000001 esi=00000000 edi=8560ea38
    eip=82ec3f21 esp=8ce13b08 ebp=8ce13b28 iopl=0         nv up ei ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
    nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x1a:
    82ec3f21 f00fba3000      lock btr dword ptr [eax],0   ds:0023:00000000=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 963572c9 to 82ec3f21
    
    STACK_TEXT:  
    8ce13b0c 963572c9 ffa0d018 9635a8d4 ffa0d018 nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x1a
    8ce13b14 9635a8d4 ffa0d018 00000000 00000000 cdd!CGuardMutex::Enter+0xd
    8ce13b28 9635b7c7 0043bfef ffa0d018 fe7105d0 cdd!CddBitmap::RemoveFromCddBitmapList+0x28
    8ce13b5c 96351753 ffa0d018 8ce13bfc 9618d50c cdd!CddBitmapHw::Release+0x7d
    8ce13b68 9618d50c ffa0d018 00000002 8ce13c20 cdd!DrvDeleteDeviceBitmapEx+0x39
    8ce13bfc 9618e920 00000001 00000000 fb051d03 win32k!SURFACE::bDeleteSurface+0x235
    8ce13c10 96190e1d 00000001 00000001 fe7105d0 win32k!SURFREF::bDeleteSurface+0x14
    8ce13c24 961905bd 00000f34 00000001 00000f34 win32k!vCleanupSurfaces+0x43
    8ce13c44 9618c25a ffa85ba8 00000000 00000000 win32k!NtGdiCloseProcess+0xc5
    8ce13c64 9618eb3f ffa85ba8 00000000 86b203c8 win32k!GdiProcessCallout+0x151
    8ce13c80 83081b98 84fb8110 00000000 ad1bd2d7 win32k!W32pProcessCallout+0x5d
    8ce13cfc 8309adc7 00000000 ffffffff 0017f918 nt!PspExitThread+0x46d
    8ce13d24 82e7c44a ffffffff 00000000 0017f924 nt!NtTerminateProcess+0x1fa
    8ce13d24 776d64f4 ffffffff 00000000 0017f924 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0017f924 00000000 00000000 00000000 00000000 0x776d64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    cdd!CGuardMutex::Enter+d
    963572c9 c7460401000000  mov     dword ptr [esi+4],1
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  cdd!CGuardMutex::Enter+d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: cdd
    
    IMAGE_NAME:  cdd.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bd992
    
    FAILURE_BUCKET_ID:  0x8E_cdd!CGuardMutex::Enter+d
    
    BUCKET_ID:  0x8E_cdd!CGuardMutex::Enter+d
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\112610-16988-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e05000 PsLoadedModuleList = 0x82f4d810
    Debug session time: Fri Nov 26 14:46:57.801 2010 (UTC - 5:00)
    System Uptime: 0 days 2:02:32.768
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 961bbf11, 9a0c3b98, 0}
    
    Probably caused by : win32k.sys ( win32k!HmgLockEx+67 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 961bbf11, The address that the exception occurred at
    Arg3: 9a0c3b98, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    win32k!HmgLockEx+67
    961bbf11 0fb74f08        movzx   ecx,word ptr [edi+8]
    
    TRAP_FRAME:  9a0c3b98 -- (.trap 0xffffffff9a0c3b98)
    ErrCode = 00000000
    eax=84f6ac10 ebx=00000000 ecx=ffbbf000 edx=00000950 esi=ff800000 edi=00000000
    eip=961bbf11 esp=9a0c3c0c ebp=9a0c3c30 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    win32k!HmgLockEx+0x67:
    961bbf11 0fb74f08        movzx   ecx,word ptr [edi+8]     ds:0023:00000008=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 961bd68f to 961bbf11
    
    STACK_TEXT:  
    9a0c3c30 961bd68f 00000000 96171966 fe7aa8e8 win32k!HmgLockEx+0x67
    9a0c3c38 96171966 fe7aa8e8 9a0c3c70 9616cd17 win32k!HmgLock+0x7
    9a0c3c44 9616cd17 00000000 00000000 fe7aa8e8 win32k!GreReferenceObject+0x16
    9a0c3c54 9616cda6 4d120ede 00000001 00000000 win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x27
    9a0c3c70 961bf730 4d120ede 4d120ede fe7aa8e8 win32k!SFMLOGICALSURFACE::DeInitialize+0x21
    9a0c3c88 9616d313 fe7aa8e8 00000001 00000000 win32k!bhLSurfDestroyLogicalSurfaceObject+0x31
    9a0c3cac 96171d88 ffb8b748 00000000 0c3c4c8e win32k!GreSfmCloseCompositorRef+0x8b
    9a0c3d1c 82e4844a 4d120ede 00000008 00000000 win32k!NtGdiHLSurfSetInformation+0x110
    9a0c3d1c 775c64f4 4d120ede 00000008 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    02e7f6e0 00000000 00000000 00000000 00000000 0x775c64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!HmgLockEx+67
    961bbf11 0fb74f08        movzx   ecx,word ptr [edi+8]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!HmgLockEx+67
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dbbb5
    
    FAILURE_BUCKET_ID:  0x8E_win32k!HmgLockEx+67
    
    BUCKET_ID:  0x8E_win32k!HmgLockEx+67
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\120210-19531-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82e4f000 PsLoadedModuleList = 0x82f97810
    Debug session time: Thu Dec  2 13:35:29.010 2010 (UTC - 5:00)
    System Uptime: 0 days 1:07:12.977
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 961dbf11, 9b71bb98, 0}
    
    Probably caused by : win32k.sys ( win32k!HmgLockEx+67 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 961dbf11, The address that the exception occurred at
    Arg3: 9b71bb98, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    win32k!HmgLockEx+67
    961dbf11 0fb74f08        movzx   ecx,word ptr [edi+8]
    
    TRAP_FRAME:  9b71bb98 -- (.trap 0xffffffff9b71bb98)
    ErrCode = 00000000
    eax=84fd1d48 ebx=00000000 ecx=ffbbf000 edx=00000a08 esi=ff800000 edi=00000000
    eip=961dbf11 esp=9b71bc0c ebp=9b71bc30 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    win32k!HmgLockEx+0x67:
    961dbf11 0fb74f08        movzx   ecx,word ptr [edi+8]     ds:0023:00000008=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 961dd68f to 961dbf11
    
    STACK_TEXT:  
    9b71bc30 961dd68f 00000000 96191966 fdebc370 win32k!HmgLockEx+0x67
    9b71bc38 96191966 fdebc370 9b71bc70 9618cd17 win32k!HmgLock+0x7
    9b71bc44 9618cd17 00000000 00000000 fdebc370 win32k!GreReferenceObject+0x16
    9b71bc54 9618cda6 aa121666 00000001 00000000 win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x27
    9b71bc70 961df730 aa121666 aa121666 fdebc370 win32k!SFMLOGICALSURFACE::DeInitialize+0x21
    9b71bc88 9618d313 fdebc370 00000001 00000000 win32k!bhLSurfDestroyLogicalSurfaceObject+0x31
    9b71bcac 96191d88 ffb8b748 00000000 0d43cc84 win32k!GreSfmCloseCompositorRef+0x8b
    9b71bd1c 82e9244a aa121666 00000008 00000000 win32k!NtGdiHLSurfSetInformation+0x110
    9b71bd1c 76f764f4 aa121666 00000008 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0163f708 00000000 00000000 00000000 00000000 0x76f764f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!HmgLockEx+67
    961dbf11 0fb74f08        movzx   ecx,word ptr [edi+8]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!HmgLockEx+67
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dbbb5
    
    FAILURE_BUCKET_ID:  0x8E_win32k!HmgLockEx+67
    
    BUCKET_ID:  0x8E_win32k!HmgLockEx+67
    
    Followup: MachineOwner
    ---------


    Drivers:

    Code:
    start    end        module name
    88f37000 88f7f000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    8d63d000 8d697000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    8eb4d000 8eb5f000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8e108000 8e11a000   amdk8    amdk8.sys    Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8f38c000 8f39b000   AmdLLD   AmdLLD.sys   Fri Jun 29 15:47:32 2007 (468561D4)
    890ef000 890f8000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    991f6000 991ff000   asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
    88ff2000 88ffb000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    89029000 8904c000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    95b53000 95b71000   AtiHdmi  AtiHdmi.sys  Wed Nov 18 18:25:03 2009 (4B04824F)
    8e000000 8e024000   atikmpag atikmpag.sys Fri Dec 11 14:50:53 2009 (4B22A29D)
    8ee17000 8f358000   atipmdag atipmdag.sys Fri Dec 11 15:31:46 2009 (4B22AC32)
    8eb07000 8eb40000   au0uoekx au0uoekx.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
    8ee00000 8ee15000   avgntflt avgntflt.sys Thu Nov 11 10:54:47 2010 (4CDC11C7)
    8e0c4000 8e0e7000   avipbb   avipbb.sys   Thu May 27 10:11:26 2010 (4BFE7D8E)
    897a8000 897af000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8e0b6000 8e0c4000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    88c1e000 88c26000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    970bc000 970d5000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    963b0000 963ce000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
    89782000 897a1000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    88c68000 88d13000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    896fe000 89723000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    88c26000 88c68000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    89399000 893f6000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    8eb40000 8eb4d000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    95b7b000 95b88000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8e03a000 8e09e000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    8e09e000 8e0b6000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    8d795000 8d7a1000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    896ed000 896fe000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    95b3a000 95b53000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    95bc9000 95bda000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    95b92000 95bc9000   dump_nvstor32 dump_nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
    95b88000 95b92000   dump_storport dump_storport.sys Mon Jul 12 23:24:27 2010 (4C3BDC6B)
    95b71000 95b7b000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    8ea17000 8eace000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    8eace000 8eb07000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    97167000 9716a180   EIO1     EIO1.sys     Wed Aug 08 03:15:17 2007 (46B96D85)
    8e11a000 8e125000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
    8912c000 8913d000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8ebf4000 8ebfe000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
    890f8000 8912c000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8920e000 89217000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    896bb000 896ed000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    895b0000 895e1000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    8e1ef000 8e1f4280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
    82e18000 82e4f000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8e1d0000 8e1ef000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    95be5000 95bf8000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    95bf8000 95bfe480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    95bda000 95be5000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    97037000 970bc000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    896b3000 896bb000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    8e147000 8e15f000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    8e15f000 8e16c000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    80ba1000 80ba9000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8f358000 8f38c000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
    89386000 89399000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    89442000 89467000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    8e024000 8e034000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    8d600000 8d61b000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    88c02000 88c0d000   mcupdate mcupdate.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
    9580d000 95818000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8ea00000 8ea0d000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    95802000 9580d000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    88ddd000 88df3000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    970d5000 970e7000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    970e7000 9710a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    9710a000 97145000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    97145000 97160000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    89608000 89613000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    88f7f000 88f87000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8935b000 89386000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    8d78b000 8d795000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    896a3000 896b3000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8913d000 891f4000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    8eb77000 8eb82000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    8eb82000 8eba4000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    8f3ed000 8f3fe000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    8d6ef000 8d6fd000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    8d697000 8d6c9000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    89404000 89442000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    89613000 89621000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    8d781000 8d78b000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    82e4f000 8325f000   nt       ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
    8922c000 8935b000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    897a1000 897a8000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    8d7a1000 8d7e5880   nvmf6232 nvmf6232.sys Thu Jul 30 19:47:55 2009 (4A72312B)
    8904c000 89071000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
    890b8000 890ef000   nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
    8d6d0000 8d6ef000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    8e12f000 8e147000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
    88fbc000 88fcd000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    97160000 97167000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
    88f92000 88fbc000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    88fdd000 88fe4000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
    88fe4000 88ff2000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    89200000 8920e000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9901d000 990b4000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    95b0b000 95b3a000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    88c0d000 88c1e000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8eb5f000 8eb77000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    8eba4000 8ebbc000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    8ebbc000 8ebd3000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8ebd3000 8ebea000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8d740000 8d781000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    8ebea000 8ebf4000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    897e9000 897f1000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    897f1000 897f9000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    89600000 89608000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    89676000 896a3000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    8d7e6000 8d7f9000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    9581b000 95b0af80   RTKVHDA  RTKVHDA.sys  Fri Apr 30 04:59:05 2010 (4BDA9BD9)
    88f11000 88f37000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
    990b4000 990be000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    8e125000 8e12f000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    8d6fd000 8d717000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    8966e000 89676000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    88e15000 88f08000   spsc     spsc.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
    9913b000 9918c000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
    990ec000 9913b000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
    990be000 990df000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
    8d73a000 8d73fa00   ssmdrv   ssmdrv.sys   Tue May 05 06:05:18 2009 (4A000F5E)
    89071000 890b8000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
    8ea0d000 8ea0e380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    89467000 895b0000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
    990df000 990ec000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    89621000 8962c000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    89000000 89017000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    8d72a000 8d73a000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    96380000 96389000   TSDDD    TSDDD.dll    Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    8e0e7000 8e108000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    8f39b000 8f3a9000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    95800000 95801700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8e1c1000 8e1d0000   usbehci  usbehci.sys  Fri Oct 23 23:58:55 2009 (4AE27B7F)
    8f3a9000 8f3ed000   usbhub   usbhub.sys   Sat Oct 24 00:00:05 2009 (4AE27BC5)
    8e16c000 8e176000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8e176000 8e1c1000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    88f87000 88f92000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    897af000 897bb000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    897bb000 897dc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    895e1000 895e9380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    88fcd000 88fdd000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    88d92000 88ddd000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    8962f000 8966e000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    8d717000 8d72a000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    897dc000 897e9000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    88d13000 88d84000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    88d84000 88d92000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8d6c9000 8d6d0000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    96120000 9636b000   win32k   win32k.sys   Tue Aug 31 22:34:29 2010 (4C7DBBB5)
    88f08000 88f11000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    8d61b000 8d635000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    9918c000 991f6000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0006A000
    89723000 89730000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    89730000 8973a000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    8973a000 89771000   dump_nvstor3
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00037000
    89771000 89782000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 11:15.
Find Us