BSOD - various error codes, various causes


  1. Posts : 7
    windows 7 32 bit
       #1

    BSOD - various error codes, various causes (0x000000d1)


    BSOD's started on a clients computer over a week ago and have been happening daily.

    So far I've tried:
    uninstalling/reinstalling antivirus (MSE), turning off Windows Defender
    uninstalled old Norton av using cleanup tool
    updated drivers mobo/vid card/sound drivers
    checked RAM with memtest, hard drives with chkdsk and SMART (fine)

    still can't figure this one out

    The most recent crash happened when I ran a full scan using MSE av

    Computer is a prebuilt HP
    AMD X2 6000+ 3Ghz
    3GB RAM
    Windows 7 32-bit -upgraded from Vista so it's not a clean install

    TIA!

    TIA!
    Last edited by pcnerdgeek; 13 Sep 2011 at 16:58.
      My Computer


  2. Posts : 7
    windows 7 32 bit
    Thread Starter
       #2

    having the same problem still -- same code so I wont repost the zip files Tried flashing bios (worked fine) Ran av in safe mode (fine) Halp?
      My Computer


  3. Posts : 24,479
    Windows 7 Ultimate X64 SP1
       #3

    Hi and wlcome to Seven forums. You will need to follow this tutorial and post the requested logs.
    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  4. Posts : 7
    windows 7 32 bit
    Thread Starter
       #4

    thanks for the reply Britton. I did that in my OP, and I have now attached the req'd files again in 2 separate zip files

    :)
      My Computer


  5. Posts : 7
    windows 7 32 bit
    Thread Starter
       #5

    still having the same problems. Attached an updated file

    thanks
    Last edited by pcnerdgeek; 14 Sep 2011 at 20:06.
      My Computer


  6. Posts : 968
    Windows 7 Ultimate x64
       #6

    Hi pcnerdgeek,

    Make sure Windows Defender is completely disabled in services cause that is what the minidump is saying, but it's strange since you say you already did that. My suggestion is to enable Driver Verifier following this guide and letting your computer bsod a couple more times while it's enabled. Guide= Driver Verifier - Enable and Disable after the computer bsods at least twice disable driver verifier by opening the program again and deleting the settings either in normal mode or safe mode if you can't in normal mode. Then upload the latest dump files from the driver verifier bsods



    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Administrator\Downloads\pcneedgeek\Windows_NT6_BSOD_jcgriff2\091111-25802-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*F:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17640.x86fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0x8304f000 PsLoadedModuleList = 0x831984f0
    Debug session time: Sun Sep 11 18:35:56.070 2011 (UTC - 6:00)
    System Uptime: 0 days 0:25:52.896
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {f89, ff, 0, 86cc27e0}
    
    Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+2cf )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000f89, memory referenced
    Arg2: 000000ff, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 86cc27e0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 831b8848
    Unable to read MiSystemVaType memory at 83197e40
     00000f89 
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    +3830653834643634
    86cc27e0 8bec            mov     ebp,esp
    
    ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.
    
    BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  MsMpEng.exe
    
    TRAP_FRAME:  a6f3dcc0 -- (.trap 0xffffffffa6f3dcc0)
    ErrCode = 00000000
    eax=0000067d ebx=6ae10100 ecx=00000930 edx=0000067d esi=00001000 edi=03ba00d8
    eip=86cc27e0 esp=a6f3dd34 ebp=01a8eec4 iopl=0         nv up di ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=003b  gs=0000             efl=00010082
    86cc27e0 8bec            mov     ebp,esp
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 86cc27e0 to 830905db
    
    STACK_TEXT:  
    a6f3dcc0 86cc27e0 badb0d00 0000067d c0023848 nt!KiTrap0E+0x2cf
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    a6f3dd34 75b6a048 badb0d00 00000000 00000000 0x86cc27e0
    a6f3dd38 badb0d00 00000000 00000000 00000000 0x75b6a048
    a6f3dd3c 00000000 00000000 00000000 00000000 0xbadb0d00
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTrap0E+2cf
    830905db 833d64371b8300  cmp     dword ptr [nt!KiFreezeFlag (831b3764)],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiTrap0E+2cf
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02a389
    
    FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiTrap0E+2cf
    
    BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiTrap0E+2cf
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000f89, memory referenced
    Arg2: 000000ff, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 86cc27e0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 831b8848
    Unable to read MiSystemVaType memory at 83197e40
     00000f89 
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    +3830653834643634
    86cc27e0 8bec            mov     ebp,esp
    
    ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.
    
    BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  MsMpEng.exe
    
    TRAP_FRAME:  a6f3dcc0 -- (.trap 0xffffffffa6f3dcc0)
    ErrCode = 00000000
    eax=0000067d ebx=6ae10100 ecx=00000930 edx=0000067d esi=00001000 edi=03ba00d8
    eip=86cc27e0 esp=a6f3dd34 ebp=01a8eec4 iopl=0         nv up di ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=003b  gs=0000             efl=00010082
    86cc27e0 8bec            mov     ebp,esp
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 86cc27e0 to 830905db
    
    STACK_TEXT:  
    a6f3dcc0 86cc27e0 badb0d00 0000067d c0023848 nt!KiTrap0E+0x2cf
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    a6f3dd34 75b6a048 badb0d00 00000000 00000000 0x86cc27e0
    a6f3dd38 badb0d00 00000000 00000000 00000000 0x75b6a048
    a6f3dd3c 00000000 00000000 00000000 00000000 0xbadb0d00
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTrap0E+2cf
    830905db 833d64371b8300  cmp     dword ptr [nt!KiFreezeFlag (831b3764)],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiTrap0E+2cf
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02a389
    
    FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiTrap0E+2cf
    
    BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiTrap0E+2cf
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmvm nt
    start    end        module name
    8304f000 83461000   nt         (pdb symbols)          f:\symcache\ntkrpamp.pdb\DF9F0ACF97D44026815CB5CE47A20FA92\ntkrpamp.pdb
        Loaded symbol image file: ntkrpamp.exe
        Mapped memory image file: f:\symcache\ntkrnlpa.exe\4E02A389412000\ntkrnlpa.exe
        Image path: ntkrpamp.exe
        Image name: ntkrpamp.exe
        Timestamp:        Wed Jun 22 20:23:05 2011 (4E02A389)
        CheckSum:         003D3310
        ImageSize:        00412000
        File version:     6.1.7601.17640
        Product version:  6.1.7601.17640
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        1.0 App
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrpamp.exe
        OriginalFilename: ntkrpamp.exe
        ProductVersion:   6.1.7601.17640
        FileVersion:      6.1.7601.17640 (win7sp1_gdr.110622-1506)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
    1: kd> lmtsmn
    start    end        module name
    90995000 909c2000   1394ohci 1394ohci.sys Sat Nov 20 03:01:11 2010 (4CE79C67)
    8ae3f000 8ae87000   ACPI     ACPI.sys     Sat Nov 20 01:37:52 2010 (4CE788E0)
    9068f000 906e9000   afd      afd.sys      Sun Apr 24 20:18:00 2011 (4DB4D9D8)
    92d85000 92d97000   AgileVpn AgileVpn.sys Mon Jul 13 17:55:00 2009 (4A5BC954)
    90868000 9087a000   amdk8    amdk8.sys    Mon Jul 13 17:11:03 2009 (4A5BBF07)
    837c3000 837cc000   amdxata  amdxata.sys  Fri Mar 19 10:19:01 2010 (4BA3A3F5)
    aa294000 aa29d000   asyncmac asyncmac.sys Mon Jul 13 17:54:46 2009 (4A5BC946)
    8af64000 8af6d000   atapi    atapi.sys    Mon Jul 13 17:11:15 2009 (4A5BBF13)
    8af6d000 8af90000   ataport  ataport.SYS  Sat Nov 20 01:38:00 2010 (4CE788E8)
    82640000 8268d000   ATMFD    ATMFD.DLL    unavailable (00000000)
    911d2000 911d5000   BdaSup   BdaSup.SYS   Mon Jul 13 17:51:23 2009 (4A5BC87B)
    8b1ec000 8b1f3000   Beep     Beep.SYS     Mon Jul 13 17:45:00 2009 (4A5BC6FC)
    90839000 90847000   blbdrive blbdrive.sys Mon Jul 13 17:23:04 2009 (4A5BC1D8)
    8364f000 83657000   BOOTVID  BOOTVID.dll  Mon Jul 13 19:04:34 2009 (4A5BD9A2)
    97f56000 97f6f000   bowser   bowser.sys   Tue Feb 22 21:47:32 2011 (4D649164)
    82620000 8263e000   cdd      cdd.dll      unavailable (00000000)
    82310000 82326000   cdfs     cdfs.sys     Mon Jul 13 17:11:14 2009 (4A5BBF12)
    83611000 83630000   cdrom    cdrom.sys    Sat Nov 20 01:38:09 2010 (4CE788F1)
    83699000 83744000   CI       CI.dll       Sat Nov 20 05:05:17 2010 (4CE7B97D)
    8b384000 8b3a9000   CLASSPNP CLASSPNP.SYS Mon Jul 13 17:11:20 2009 (4A5BBF18)
    83657000 83699000   CLFS     CLFS.SYS     Mon Jul 13 17:11:10 2009 (4A5BBF0E)
    8b178000 8b1d5000   cng      cng.sys      Mon Jul 13 17:32:55 2009 (4A5BC427)
    92d78000 92d85000   CompositeBus CompositeBus.sys Sat Nov 20 02:50:21 2010 (4CE799DD)
    82326000 82333000   crashdmp crashdmp.sys Mon Jul 13 17:45:50 2009 (4A5BC72E)
    907e5000 907fd000   dfsc     dfsc.sys     Sat Nov 20 01:42:32 2010 (4CE789F8)
    907d9000 907e5000   discache discache.sys Mon Jul 13 17:24:04 2009 (4A5BC214)
    8b408000 8b419000   disk     disk.sys     Mon Jul 13 17:11:28 2009 (4A5BBF20)
    822ed000 82306000   drmk     drmk.sys     Mon Jul 13 18:36:05 2009 (4A5BD2F5)
    82333000 8233d000   dump_diskdump dump_diskdump.sys Fri Apr 22 11:35:13 2011 (4DB1BC51)
    82374000 82385000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 17:12:47 2009 (4A5BBF6F)
    8233d000 82374000   dump_nvstor32 dump_nvstor32.sys Tue Aug 04 18:27:05 2009 (4A78D1D9)
    82306000 82310000   Dxapi    Dxapi.sys    Mon Jul 13 17:25:25 2009 (4A5BC265)
    92c88000 92d3f000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 02:08:14 2010 (4CE78FFE)
    92d3f000 92d78000   dxgmms1  dxgmms1.sys  Wed Feb 02 20:45:05 2011 (4D4A24C1)
    83600000 83611000   fileinfo fileinfo.sys Mon Jul 13 17:21:51 2009 (4A5BC18F)
    837cc000 83800000   fltmgr   fltmgr.sys   Mon Jul 13 17:11:13 2009 (4A5BBF11)
    8b1e3000 8b1ec000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 17:11:14 2009 (4A5BBF12)
    8b352000 8b384000   fvevol   fvevol.sys   Sat Nov 20 01:40:22 2010 (4CE78976)
    8b573000 8b5a4000   fwpkclnt fwpkclnt.sys Sat Nov 20 01:39:08 2010 (4CE7892C)
    9106b000 91070280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 06:16:53 2009 (4A1151B5)
    83018000 8304f000   hal      halmacpi.dll Sat Nov 20 01:37:38 2010 (4CE788D2)
    91071000 911d1700   HCW85BDA HCW85BDA.sys Tue Jul 14 14:44:20 2009 (4A5CEE24)
    90fda000 90ff9000   HDAudBus HDAudBus.sys Sat Nov 20 02:59:28 2010 (4CE79C00)
    90f18000 90fcd000   HSX_CNXT HSX_CNXT.sys Fri Feb 13 13:57:25 2009 (4995DEB5)
    90e16000 90f18000   HSX_DP   HSX_DP.sys   Fri Feb 13 13:56:27 2009 (4995DE7B)
    90915000 90961000   HSXHWBS2 HSXHWBS2.sys Fri Feb 13 13:58:27 2009 (4995DEF3)
    97ed1000 97f56000   HTTP     HTTP.sys     Sat Nov 20 01:40:17 2010 (4CE78971)
    8b400000 8b408000   hwpolicy hwpolicy.sys Sat Nov 20 01:37:35 2010 (4CE788CF)
    9087a000 90892000   i8042prt i8042prt.sys Mon Jul 13 17:11:23 2009 (4A5BBF1B)
    908a4000 908b1000   kbdclass kbdclass.sys Mon Jul 13 17:11:15 2009 (4A5BBF13)
    80bb5000 80bbd000   kdcom    kdcom.dll    Mon Jul 13 19:08:58 2009 (4A5BDAAA)
    90961000 90995000   ks       ks.sys       Sat Nov 20 02:50:17 2010 (4CE799D9)
    8b165000 8b178000   ksecdd   ksecdd.sys   Sat Nov 20 01:38:54 2010 (4CE7891E)
    8b300000 8b325000   ksecpkg  ksecpkg.sys  Mon Jul 13 17:34:00 2009 (4A5BC468)
    97e58000 97e68000   lltdio   lltdio.sys   Mon Jul 13 17:53:18 2009 (4A5BC8EE)
    823d9000 823f4000   luafv    luafv.sys    Mon Jul 13 17:15:44 2009 (4A5BC020)
    83633000 8363e000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 17:13:13 2009 (4A5BBF89)
    8201a000 8201d180   mdmxsdk  mdmxsdk.sys  Mon Jun 19 15:26:59 2006 (449716A3)
    90fcd000 90fda000   modem    modem.sys    Mon Jul 13 17:55:24 2009 (4A5BC96C)
    82385000 82390000   monitor  monitor.sys  Mon Jul 13 17:25:58 2009 (4A5BC286)
    90892000 9089f000   mouclass mouclass.sys Mon Jul 13 17:11:15 2009 (4A5BBF13)
    8af4e000 8af64000   mountmgr mountmgr.sys Sat Nov 20 01:38:09 2010 (4CE788F1)
    9cdcf000 9cdf5800   MpFilter MpFilter.sys Wed Apr 06 12:25:55 2011 (4D9CB033)
    aa2b6000 aa2bb900   MpKsld895d757 MpKsld895d757.sys Tue Mar 30 20:06:14 2010 (4BB2AE16)
    aa29d000 aa2a6200   MpNWMon  MpNWMon.sys  Wed Apr 06 12:25:54 2011 (4D9CB032)
    97f6f000 97f81000   mpsdrv   mpsdrv.sys   Mon Jul 13 17:52:52 2009 (4A5BC8D4)
    97f81000 97fa4000   mrxsmb   mrxsmb.sys   Tue Apr 26 20:17:20 2011 (4DB77CB0)
    97fa4000 97fdf000   mrxsmb10 mrxsmb10.sys Fri Jul 08 20:29:57 2011 (4E17BD25)
    97fdf000 97ffa000   mrxsmb20 mrxsmb20.sys Tue Apr 26 20:17:26 2011 (4DB77CB6)
    90653000 9065e000   Msfs     Msfs.SYS     Mon Jul 13 17:11:26 2009 (4A5BBF1E)
    8ae90000 8ae98000   msisadrv msisadrv.sys Mon Jul 13 17:11:09 2009 (4A5BBF0D)
    8b13a000 8b165000   msrpc    msrpc.sys    Mon Jul 13 17:11:59 2009 (4A5BBF3F)
    907cf000 907d9000   mssmbios mssmbios.sys Mon Jul 13 17:19:25 2009 (4A5BC0FD)
    8b5eb000 8b5fb000   mup      mup.sys      Mon Jul 13 17:14:14 2009 (4A5BBFC6)
    8b20b000 8b2c2000   ndis     ndis.sys     Sat Nov 20 01:39:19 2010 (4CE78937)
    92daf000 92dba000   ndistapi ndistapi.sys Mon Jul 13 17:54:24 2009 (4A5BC930)
    97eae000 97ebe000   ndisuio  ndisuio.sys  Sat Nov 20 03:06:36 2010 (4CE79DAC)
    92dba000 92ddc000   ndiswan  ndiswan.sys  Sat Nov 20 03:07:48 2010 (4CE79DF4)
    97e47000 97e58000   NDProxy  NDProxy.SYS  Sat Nov 20 03:07:39 2010 (4CE79DEB)
    90752000 90760000   netbios  netbios.sys  Mon Jul 13 17:53:54 2009 (4A5BC912)
    906e9000 9071b000   netbt    netbt.sys    Sat Nov 20 01:39:22 2010 (4CE7893A)
    8b2c2000 8b300000   NETIO    NETIO.SYS    Sat Nov 20 01:40:03 2010 (4CE78963)
    aa2a7000 aa2b5680   NisDrvWFP NisDrvWFP.sys Wed Apr 06 12:26:30 2011 (4D9CB056)
    9065e000 9066c000   Npfs     Npfs.SYS     Mon Jul 13 17:11:31 2009 (4A5BBF23)
    907c5000 907cf000   nsiproxy nsiproxy.sys Mon Jul 13 17:12:08 2009 (4A5BBF48)
    8304f000 83461000   nt       ntkrpamp.exe Wed Jun 22 20:23:05 2011 (4E02A389)
    8b00b000 8b13a000   Ntfs     Ntfs.sys     Thu Mar 10 20:21:11 2011 (4D799527)
    8b200000 8b207000   Null     Null.SYS     Mon Jul 13 17:11:12 2009 (4A5BBF10)
    92c86000 92c87040   nvBridge nvBridge.kmd Fri Jul 09 15:10:11 2010 (4C379033)
    92208000 92c85dc0   nvlddmkm nvlddmkm.sys Fri Jul 09 15:15:14 2010 (4C379162)
    91026000 9106a880   nvmf6232 nvmf6232.sys Thu Jul 30 17:47:55 2009 (4A72312B)
    8af90000 8afb5000   nvstor   nvstor.sys   Fri Mar 19 14:51:52 2010 (4BA3E3E8)
    8ae00000 8ae37000   nvstor32 nvstor32.sys Tue Aug 04 18:27:05 2009 (4A78D1D9)
    97e68000 97eae000   nwifi    nwifi.sys    Mon Jul 13 17:51:59 2009 (4A5BC89F)
    90722000 90741000   pacer    pacer.sys    Mon Jul 13 17:53:58 2009 (4A5BC916)
    8aecd000 8aede000   partmgr  partmgr.sys  Sat Nov 20 01:38:14 2010 (4CE788F6)
    8ae98000 8aec2000   pci      pci.sys      Sat Nov 20 01:37:57 2010 (4CE788E5)
    8af39000 8af40000   pciide   pciide.sys   Mon Jul 13 17:11:19 2009 (4A5BBF17)
    8af40000 8af4e000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 17:11:15 2009 (4A5BBF13)
    8b1d5000 8b1e3000   pcw      pcw.sys      Mon Jul 13 17:11:10 2009 (4A5BBF0E)
    9cc35000 9cccc000   peauth   peauth.sys   Mon Jul 13 18:35:44 2009 (4A5BD2E0)
    822be000 822ed000   portcls  portcls.sys  Mon Jul 13 17:51:00 2009 (4A5BC864)
    9089f000 908a3a80   PS2      PS2.sys      Mon Dec 12 18:26:59 2005 (439E2363)
    8363e000 8364f000   PSHED    PSHED.dll    Mon Jul 13 19:09:36 2009 (4A5BDAD0)
    92d97000 92daf000   rasl2tp  rasl2tp.sys  Mon Jul 13 17:54:33 2009 (4A5BC939)
    92ddc000 92df4000   raspppoe raspppoe.sys Mon Jul 13 17:54:53 2009 (4A5BC94D)
    911d5000 911ec000   raspptp  raspptp.sys  Mon Jul 13 17:54:47 2009 (4A5BC947)
    91000000 91017000   rassstp  rassstp.sys  Mon Jul 13 17:54:57 2009 (4A5BC951)
    90784000 907c5000   rdbss    rdbss.sys    Sat Nov 20 01:42:44 2010 (4CE78A04)
    9063b000 90643000   RDPCDD   RDPCDD.sys   Sat Nov 20 03:22:19 2010 (4CE7A15B)
    90643000 9064b000   rdpencdd rdpencdd.sys Mon Jul 13 18:01:39 2009 (4A5BCAE3)
    9064b000 90653000   rdprefmp rdprefmp.sys Mon Jul 13 18:01:41 2009 (4A5BCAE5)
    8b325000 8b352000   rdyboost rdyboost.sys Sat Nov 20 02:00:07 2010 (4CE78E17)
    97ebe000 97ed1000   rspndr   rspndr.sys   Mon Jul 13 17:53:20 2009 (4A5BC8F0)
    82021000 822bd7c0   RTKVHDA  RTKVHDA.sys  Tue Aug 04 03:48:13 2009 (4A7803DD)
    9cccc000 9ccd6000   secdrv   secdrv.SYS   Wed Sep 13 07:18:32 2006 (45080528)
    8b5e3000 8b5eb000   spldr    spldr.sys    Mon May 11 10:13:47 2009 (4A084EBB)
    9cd5c000 9cdae000   srv      srv.sys      Thu Apr 28 20:46:30 2011 (4DBA2686)
    9cd0c000 9cd5c000   srv2     srv2.sys     Thu Apr 28 20:46:13 2011 (4DBA2675)
    9ccd6000 9ccf7000   srvnet   srvnet.sys   Thu Apr 28 20:46:08 2011 (4DBA2670)
    8afb5000 8affd000   storport storport.sys Thu Mar 10 20:56:00 2011 (4D799D50)
    92df4000 92df5380   swenum   swenum.sys   Mon Jul 13 17:45:08 2009 (4A5BC704)
    8b429000 8b573000   tcpip    tcpip.sys    Mon Jun 20 21:16:03 2011 (4E000CF3)
    9ccf7000 9cd04000   tcpipreg tcpipreg.sys Sat Nov 20 03:07:13 2010 (4CE79DD1)
    90683000 9068f000   TDI      TDI.SYS      Sat Nov 20 01:39:18 2010 (4CE78936)
    9066c000 90683000   tdx      tdx.sys      Sat Nov 20 01:39:17 2010 (4CE78935)
    90773000 90784000   termdd   termdd.sys   Sat Nov 20 03:21:10 2010 (4CE7A116)
    829f0000 829f9000   TSDDD    TSDDD.dll    Mon Jul 13 18:01:40 2009 (4A5BCAE4)
    90847000 90868000   tunnel   tunnel.sys   Sat Nov 20 03:06:40 2010 (4CE79DB0)
    91017000 91025000   umbus    umbus.sys    Sat Nov 20 03:00:23 2010 (4CE79C37)
    823a7000 823a8700   USBD     USBD.SYS     Thu Mar 24 20:57:53 2011 (4D8C04B1)
    90906000 90915000   usbehci  usbehci.sys  Thu Mar 24 20:57:58 2011 (4D8C04B6)
    97e03000 97e47000   usbhub   usbhub.sys   Thu Mar 24 20:58:34 2011 (4D8C04DA)
    908b1000 908bb000   usbohci  usbohci.sys  Thu Mar 24 20:57:58 2011 (4D8C04B6)
    908bb000 90906000   USBPORT  USBPORT.SYS  Thu Mar 24 20:58:05 2011 (4D8C04BD)
    823c2000 823d9000   USBSTOR  USBSTOR.SYS  Thu Mar 10 21:01:12 2011 (4D799E88)
    8aec2000 8aecd000   vdrvroot vdrvroot.sys Mon Jul 13 17:46:19 2009 (4A5BC74B)
    8b1f3000 8b1ff000   vga      vga.sys      Mon Jul 13 17:25:50 2009 (4A5BC27E)
    9060d000 9062e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 17:25:49 2009 (4A5BC27D)
    8aede000 8aeee000   volmgr   volmgr.sys   Sat Nov 20 01:38:06 2010 (4CE788EE)
    8aeee000 8af39000   volmgrx  volmgrx.sys  Mon Jul 13 17:11:41 2009 (4A5BBF2D)
    8b5a4000 8b5e3000   volsnap  volsnap.sys  Sat Nov 20 01:38:13 2010 (4CE788F5)
    90741000 90752000   vwififlt vwififlt.sys Mon Jul 13 17:52:03 2009 (4A5BC8A3)
    90760000 90773000   wanarp   wanarp.sys   Sat Nov 20 03:07:45 2010 (4CE79DF1)
    9062e000 9063b000   watchdog watchdog.sys Mon Jul 13 17:24:10 2009 (4A5BC21A)
    83744000 837b5000   Wdf01000 Wdf01000.sys Mon Jul 13 17:11:36 2009 (4A5BBF28)
    837b5000 837c3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 17:11:25 2009 (4A5BBF1D)
    9071b000 90722000   wfplwf   wfplwf.sys   Mon Jul 13 17:53:51 2009 (4A5BC90F)
    82790000 829de000   win32k   win32k.sys   Fri Jun 10 20:29:02 2011 (4DF2D2EE)
    8ae87000 8ae90000   WMILIB   WMILIB.SYS   Mon Jul 13 17:11:22 2009 (4A5BBF1A)
    82000000 8201a000   WudfPf   WudfPf.sys   Sat Nov 20 02:58:55 2010 (4CE79BDF)
    9cdae000 9cdce480   WUDFRd   WUDFRd.sys   Sat Nov 20 02:59:19 2010 (4CE79BF7)
    9cd04000 9cd0c000   XAudio32 XAudio32.sys Wed Apr 29 12:20:55 2009 (49F89A87)
    Regards

    Seth
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 14:10.
Find Us