Event 41, Kernel-Power

Page 1 of 8 123 ... LastLast

  1. Posts : 41
    Microsoft Windows 7 Home Premium 64-bit 7601 Multiprocessor Free Service Pack 1
       #1

    Event 41, Kernel-Power


    Hi,

    I Build this PC in April 2012, so its about 8 months old. It did run perfectly without any serious errors until now. Now i experience the system hanging, so i can't move the mouse anymore, and pushing the "Caps Lock" or the "Scroll Lock" on the Keyboard don't turn on the respective lights on it, so i guess it's a hard hang.

    In the Event Viewer i see a "Event 41, Kernel-Power" critical event, and i had this event so far 10 times. The first time it happened at 12/5/2012, and there it has some bug-check parameters. All later events; 12/22/2012, 12/23/2012(twice that day), 12/25/2012(also twice), 12/26/2012, 12/27/2012, 12/29/2012, 12/30/2012; don't show any Bug-check parameters at all, only a zero value.

    As far as i could investigate, it's probably a hardware error, but i not rule out that a software error could be the culprit. The only Hardware change this PC got apart from its building in April was a External Hard drive i bought towards end of November, a Western Digital My Book. But it's got it's own power source and it's not always running, so it can not be that my PSU is to weak.

    I run the SF_Diagnostic_Tool with "grab all", and put the zip to this thread, so i save myself to list up what's in my PC . I hope someone can tell me, where to start with the repairs, those freezes annoy me. One more thing, it seems to mostly happen, when i am AFK and let the PC do something like download a big file, or big file movement (to and from the external HD). When i come back, i hear a weird noise coming from the PC, probably from the Ventilators not turning at correct speeds.

    Thank You all in advance!
      My Computer


  2. Posts : 851
    Windows 8 Professional x64
       #2

    STOP 0x0000000A: IRQL_NOT_LESS_OR_EQUAL (go to top of page)

    Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility

    Run this

    Driver Verifier - Enable and Disable

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff800032e3194}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800032e3194, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034fd100
    GetUlongFromAddress: unable to read from fffff800034fd1c0
     0000000000000000 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c64
    fffff800`032e3194 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    IRP_ADDRESS:  ffffffffffffff88
    
    TRAP_FRAME:  fffff880043b85a0 -- (.trap 0xfffff880043b85a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880043b7818 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032e3194 rsp=fffff880043b8730 rbp=0000000000000000
     r8=0000000000004740  r9=0000000000000080 r10=0000000000000002
    r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!IopCompleteRequest+0xc64:
    fffff800`032e3194 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032cd769 to fffff800032ce1c0
    
    STACK_TEXT:  
    fffff880`043b8458 fffff800`032cd769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`043b8460 fffff800`032cc3e0 : 00000000`00000100 fffff880`043b8858 fffffa80`091a0d58 fffffa80`07da5860 : nt!KiBugCheckDispatch+0x69
    fffff880`043b85a0 fffff800`032e3194 : 00000000`00000001 00000000`00000000 fffff880`20206f49 fffff880`043b8a18 : nt!KiPageFault+0x260
    fffff880`043b8730 fffff800`032c0c17 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000000 : nt!IopCompleteRequest+0xc64
    fffff880`043b8800 fffff800`03277a95 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
    fffff880`043b8880 fffff800`0351996a : fffffa80`091bc480 fffffa80`0919e060 fffff880`043b8a10 fffff880`043b8a08 : nt!KiCheckForKernelApcDelivery+0x25
    fffff880`043b88b0 fffff800`035e342e : fffffa80`00000004 fffffa80`0919e060 fffff880`043b8a10 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a53a
    fffff880`043b89a0 fffff800`032cd453 : 00000000`00000030 fffffa80`08a50060 00000000`0025f498 00000000`0025f701 : nt!NtMapViewOfSection+0x2bd
    fffff880`043b8a70 00000000`7786159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0025f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7786159a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`032cc3e0 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f76721c
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800032e3194, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000000 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c64
    fffff800`032e3194 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    IRP_ADDRESS:  ffffffffffffff88
    
    TRAP_FRAME:  fffff880043b85a0 -- (.trap 0xfffff880043b85a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880043b7818 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032e3194 rsp=fffff880043b8730 rbp=0000000000000000
     r8=0000000000004740  r9=0000000000000080 r10=0000000000000002
    r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!IopCompleteRequest+0xc64:
    fffff800`032e3194 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032cd769 to fffff800032ce1c0
    
    STACK_TEXT:  
    fffff880`043b8458 fffff800`032cd769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`043b8460 fffff800`032cc3e0 : 00000000`00000100 fffff880`043b8858 fffffa80`091a0d58 fffffa80`07da5860 : nt!KiBugCheckDispatch+0x69
    fffff880`043b85a0 fffff800`032e3194 : 00000000`00000001 00000000`00000000 fffff880`20206f49 fffff880`043b8a18 : nt!KiPageFault+0x260
    fffff880`043b8730 fffff800`032c0c17 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000000 : nt!IopCompleteRequest+0xc64
    fffff880`043b8800 fffff800`03277a95 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
    fffff880`043b8880 fffff800`0351996a : fffffa80`091bc480 fffffa80`0919e060 fffff880`043b8a10 fffff880`043b8a08 : nt!KiCheckForKernelApcDelivery+0x25
    fffff880`043b88b0 fffff800`035e342e : fffffa80`00000004 fffffa80`0919e060 fffff880`043b8a10 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a53a
    fffff880`043b89a0 fffff800`032cd453 : 00000000`00000030 fffffa80`08a50060 00000000`0025f498 00000000`0025f701 : nt!NtMapViewOfSection+0x2bd
    fffff880`043b8a70 00000000`7786159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0025f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7786159a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`032cc3e0 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f76721c
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800032e3194, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000000 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+c64
    fffff800`032e3194 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  csrss.exe
    
    IRP_ADDRESS:  ffffffffffffff88
    
    TRAP_FRAME:  fffff880043b85a0 -- (.trap 0xfffff880043b85a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880043b7818 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800032e3194 rsp=fffff880043b8730 rbp=0000000000000000
     r8=0000000000004740  r9=0000000000000080 r10=0000000000000002
    r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!IopCompleteRequest+0xc64:
    fffff800`032e3194 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032cd769 to fffff800032ce1c0
    
    STACK_TEXT:  
    fffff880`043b8458 fffff800`032cd769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`043b8460 fffff800`032cc3e0 : 00000000`00000100 fffff880`043b8858 fffffa80`091a0d58 fffffa80`07da5860 : nt!KiBugCheckDispatch+0x69
    fffff880`043b85a0 fffff800`032e3194 : 00000000`00000001 00000000`00000000 fffff880`20206f49 fffff880`043b8a18 : nt!KiPageFault+0x260
    fffff880`043b8730 fffff800`032c0c17 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000000 : nt!IopCompleteRequest+0xc64
    fffff880`043b8800 fffff800`03277a95 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
    fffff880`043b8880 fffff800`0351996a : fffffa80`091bc480 fffffa80`0919e060 fffff880`043b8a10 fffff880`043b8a08 : nt!KiCheckForKernelApcDelivery+0x25
    fffff880`043b88b0 fffff800`035e342e : fffffa80`00000004 fffffa80`0919e060 fffff880`043b8a10 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a53a
    fffff880`043b89a0 fffff800`032cd453 : 00000000`00000030 fffffa80`08a50060 00000000`0025f498 00000000`0025f701 : nt!NtMapViewOfSection+0x2bd
    fffff880`043b8a70 00000000`7786159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0025f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7786159a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`032cc3e0 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f76721c
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 41
    Microsoft Windows 7 Home Premium 64-bit 7601 Multiprocessor Free Service Pack 1
    Thread Starter
       #3

    Hi Bagavan,
    The code you posted, is that the Bug Check for my system? I tried to do a Local Debugging of my Kernel using the Windows Debugging Tool before, but it just told me that "The ststem does not support local kernel debugging" ... shesh.
    Which program did you use?

    I will try your suggestion tomorrow asap, for now i need to go to sleep.
      My Computer


  4. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #4

    Norton is the largest issue here.
    Code:
    fffff880`043b83b8  fffff880`016269f0Unable to load image \??\C:\Windows\system32\Drivers\SYMEVENT64x86.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for SYMEVENT64x86.SYS
    *** ERROR: Module load completed but symbols could not be loaded for SYMEVENT64x86.SYS
     SYMEVENT64x86+0x269f0
    Description here: Driver Reference Table - SYMEVENT64x86.SYS

    Code:
    fffff880`043b8358  fffff880`04dc52e0Unable to load image \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\BASHDefs\20121130.005\BHDrvx64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for BHDrvx64.sys
    *** ERROR: Module load completed but symbols could not be loaded for BHDrvx64.sys
     BHDrvx64+0x1372e0
    Description here: Driver Reference Table - BHDrvx64.sys

    Code:
    fffff880`043b8028  fffff880`03ebeab8Unable to load image \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for EraserUtilRebootDrv.sys
    *** ERROR: Module load completed but symbols could not be loaded for EraserUtilRebootDrv.sys
     EraserUtilRebootDrv+0x2ab8
    Description here: Driver Reference Table - EraserUtilRebootDrv.sys

    Uninstall Norton and all Symentec products using Norton Removal tool.

    Use Microsoft Security Essentials as your antivirus with windows inbuilt firewall, and free MBAM as the on demand scanner.

    Download and install those, and then run full system scans with both of them, one by one.

    Daemon Tools, Alcohol 120% and Power Archiver Pro uses SCSI Pass Through Direct (SPTD), which is a well known BSOD causer. Uninstall Alcohol 120% at first. Then download SPTD standalone installer from Disk-Tools.com, and execute the downloaded file as guided below :

    • Double click to open it.
    • Click this button only:
    • If it is grayed out, as in the picture, there is no more SPTD in your system, and you just close the window.

    Free up the startup.

    1. Click on the Start button
    2. Type “msconfig (without quotes), click the resulting link. It will open the System Configuration window.
    3. Select the “Startup” tab.
    4. Deselect all items other than the antivirus.
    5. Apply > OK
    6. Accept the restart.

    Let us know the results.
      My Computer


  5. Posts : 41
    Microsoft Windows 7 Home Premium 64-bit 7601 Multiprocessor Free Service Pack 1
    Thread Starter
       #5

    For now, i activated the Driver Verifier as Bagavan suggested.

    I checked the links Arc posted, and took a look in my "Programs and Features". The weird thing is, that i remember to have installed Alcohol 120% and it's there, also it's in the Start Menu but it's not in Programs and Features. So for now i first deinstall Alcohol 120%, and ged rid of the SCSI Pass Through Direct (SPTD).

    Arc, is Norton overall a bad product that has a high chance to cause BSOD's or is it just that on some Hardware Combinations it cause BSOD's? I will later today, delete it, as i not have the time to do so right now.
      My Computer


  6. Posts : 41
    Microsoft Windows 7 Home Premium 64-bit 7601 Multiprocessor Free Service Pack 1
    Thread Starter
       #6

    Just a small update, as i didn't had the time to do it earlier.

    After Deinstalling the Alcohol 120% through the deinstaller in the Startup menu(since there was nothing in "Program and Features") i ran the SCSI Pass Through Direct (SPTD) remover and after restarting I remembered that i still had Power ISO installed. I tried to run the "Virtual Drive" on it, and promptly got a blue screen (yes, this time a nice blue screen, maybe thanks to the Driver Verifier). I suppose t needs that SCSI Pass Through Direct (SPTD) as well as Alcohol 120% and Demon Tools.

    It could be that it is that driver that gave me problems, since i have like 14139 errors i see in my Event Viewer about "CD rom" 1 and 2. It could be that this where the emulated drives i had before on this machine. The BSOD that happened when i tried to run the emulated drive using the Power ISO is logged as 11th Kernel-Power event.

    Anyway, i deinstalled Power ISO, as well as Alcohol 120%, i killed the SCSI Pass Through Direct (SPTD) using the deinstaller Arc posted, and now i wait for a "normal" BSOD as the 11th one was challenged from me. I hope my real problem was that SCSI Pass Through Direct (SPTD). If not, i will deinstall the Norton as Arc suggested.

    Thanks Bravan and Arc for now, lets see if have this problem again.
      My Computer


  7. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #7

    Better you take care of Norton, too, as well as SPTD.

    All those failures are not to be neglected.
      My Computer


  8. Posts : 41
    Microsoft Windows 7 Home Premium 64-bit 7601 Multiprocessor Free Service Pack 1
    Thread Starter
       #8

    Another Update. It is 10:15pm here, at 10:10pm i had another stop, the 12th and I can't tell if there was a bluescreen as i was 2 hours afk and my monitor was out.

    I now as a next step get rid of Norton. Seems pretty obvious, as i think that 10 of the 12 errors where when the system was idle, so Norton surely was "at it" again.
      My Computer


  9. Posts : 41
    Microsoft Windows 7 Home Premium 64-bit 7601 Multiprocessor Free Service Pack 1
    Thread Starter
       #9

    I deinstalled all SPTD software as well as STD. I deinstalled all norton products. I installed Microsoft Security Essentials and the Free Mbam scanner, but yesterday i only came to Quick Scans, so today i wanted to do a Full System Scan using Microsoft Security Essentials and i wanted to go out and let it run.

    I just happen to not go right away, so i took a look at the PC, and it was frozen. This time no "special sound", it was just frozen. So i did restart, in the Event Manager i just see Event 41, Kernel-Power #13 and thats it. So i did the whole SF Diagnostic Tool "Grab All" again, and attached it to this reply, its Morgud2.
      My Computer


  10. Posts : 2,573
    Win7 Ultimate X64
       #10

    Im not sure there is a new dump file there latest one was generated 31/12/12 at 21.15 and is verifier enabled states 0xC4 and blames SCDEmu.sys which is part of POWERiso and driver list still contains sptd.sys driver
    Code:
    Loading Dump File [C:\Users\Paul\Desktop\Morgud2\Morgud2\123112-47970-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    Symbol search path is: SRV*C:\Program Files\Windows Kits\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
    Machine Name:
    Kernel base = 0xfffff800`03267000 PsLoadedModuleList = 0xfffff800`034ab670
    Debug session time: Mon Dec 31 21:15:29.142 2012 (UTC + 0:00)
    System Uptime: 0 days 0:29:29.344
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    Use !analyze -v to get detailed debugging information.
    BugCheck C4, {f6, 358, fffffa800b9beb30, fffff88003f2b0f1}
    *** WARNING: Unable to verify timestamp for SCDEmu.SYS
    *** ERROR: Module load completed but symbols could not be loaded for SCDEmu.SYS
    Probably caused by : SCDEmu.SYS ( SCDEmu+20f1 )
    Followup: MachineOwner
    ---------
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
    A device driver attempting to corrupt the system has been caught.  This is
    because the driver was specified in the registry as being suspect (by the
    administrator) and the kernel has enabled substantial checking of this driver.
    If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
    be among the most commonly seen crashes.
    Arguments:
    Arg1: 00000000000000f6, Referencing user handle as KernelMode.
    Arg2: 0000000000000358, Handle value being referenced.
    Arg3: fffffa800b9beb30, Address of the current process.
    Arg4: fffff88003f2b0f1, Address inside the driver that is performing the incorrect reference.
    Debugging Details:
    ------------------
    
    BUGCHECK_STR:  0xc4_f6
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    PROCESS_NAME:  PowerISO.exe
    CURRENT_IRQL:  0
    LAST_CONTROL_TRANSFER:  from fffff8000376c3dc to fffff800032e5fc0
    STACK_TEXT:  
    fffff880`0adf5218 fffff800`0376c3dc : 00000000`000000c4 00000000`000000f6 00000000`00000358 fffffa80`0b9beb30 : nt!KeBugCheckEx
    fffff880`0adf5220 fffff800`03781ae4 : 00000000`00000358 fffffa80`0b9beb30 00000000`00000004 fffff880`0adf53b0 : nt!VerifierBugCheckIfAppropriate+0x3c
    fffff880`0adf5260 fffff800`03539000 : 00000000`00000000 fffff880`0adf5488 fffff880`0adf5600 00000000`00000000 : nt!VfCheckUserHandle+0x1b4
    fffff880`0adf5340 fffff800`03597fc5 : fffff800`032e5200 fffff880`00000008 fffffa80`076378f0 fffff8a0`0d7f9f00 : nt! ?? ::NNGAKEGL::`string'+0x212de
    fffff880`0adf5410 fffff800`032e5253 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtEnumerateKey+0xe5
    fffff880`0adf5550 fffff800`032e1810 : fffff800`0377250b fffffa80`08fa67d0 00000000`00000002 fffff880`0adf5848 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`0adf5758 fffff800`0377250b : fffffa80`08fa67d0 00000000`00000002 fffff880`0adf5848 fffff800`032e1810 : nt!KiServiceLinkage
    fffff880`0adf5760 fffff880`03f2b0f1 : 00000000`00000000 00000000`00000002 fffffa80`08fa67d0 00000000`00000000 : nt!VfZwEnumerateKey+0x6b
    fffff880`0adf57b0 00000000`00000000 : 00000000`00000002 fffffa80`08fa67d0 00000000`00000000 00000000`00000000 : SCDEmu+0x20f1
    
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    SCDEmu+20f1
    fffff880`03f2b0f1 3d1a000080      cmp     eax,8000001Ah
    SYMBOL_STACK_INDEX:  8
    SYMBOL_NAME:  SCDEmu+20f1
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: SCDEmu
    IMAGE_NAME:  SCDEmu.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP:  50c44ff1
    FAILURE_BUCKET_ID:  X64_0xc4_f6_VRF_SCDEmu+20f1
    BUCKET_ID:  X64_0xc4_f6_VRF_SCDEmu+20f1
    Followup: MachineOwner
    ---------
    0: kd> lmvm
              ^ Non-empty string required in 'lmvm'
    0: kd> lmntsm
    start             end                 module name
    fffff880`011a0000 fffff880`011f7000   ACPI     ACPI.sys     Sat Nov 20 09:19:16 2010 (4CE79294)
    fffff880`04765000 fffff880`047ee000   afd      afd.sys      Wed Dec 28 03:59:20 2011 (4EFA9418)
    fffff880`02e6a000 fffff880`02e80000   AgileVpn AgileVpn.sys Tue Jul 14 01:10:24 2009 (4A5BCCF0)
    fffff880`04de4000 fffff880`04df8000   amdiox64 amdiox64.sys Thu Feb 18 15:17:53 2010 (4B7D5A21)
    fffff880`02e26000 fffff880`02e3b000   amdppm   amdppm.sys   Tue Jul 14 00:19:25 2009 (4A5BC0FD)
    fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Fri Mar 19 16:18:18 2010 (4BA3A3CA)
    fffff880`08872000 fffff880`088a3000   AODDriver2 AODDriver2.sys Wed Jun 15 09:38:35 2011 (4DF86F8B)
    fffff880`097c6000 fffff880`097d1000   asyncmac asyncmac.sys Tue Jul 14 01:10:13 2009 (4A5BCCE5)
    fffff880`00ff1000 fffff880`00ffa000   atapi    atapi.sys    Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Sat Nov 20 09:19:15 2010 (4CE79293)
    fffff880`01880000 fffff880`01888000   AtiPcie64 AtiPcie64.sys Wed Mar 10 14:33:45 2010 (4B97ADC9)
    fffff960`00840000 fffff960`008a1000   ATMFD    ATMFD.DLL    Sun Dec 16 14:45:03 2012 (50CDDE6F)
    fffff880`046b5000 fffff880`046bc000   Beep     Beep.SYS     Tue Jul 14 01:00:13 2009 (4A5BCA8D)
    fffff880`02e8b000 fffff880`02fe1000   BHDrvx64 BHDrvx64.sys Fri Oct 19 05:40:41 2012 (5080D9C9)
    fffff880`04d65000 fffff880`04d76000   blbdrive blbdrive.sys Tue Jul 14 00:35:59 2009 (4A5BC4DF)
    fffff880`08977000 fffff880`08995000   bowser   bowser.sys   Wed Feb 23 04:55:04 2011 (4D649328)
    fffff880`00d96000 fffff880`00dc4000   ccSetx64 ccSetx64.sys Thu Jun 07 04:00:55 2012 (4FD01967)
    fffff960`00740000 fffff960`00767000   cdd      cdd.dll      Sat Nov 20 12:55:34 2010 (4CE7C546)
    fffff880`05fb3000 fffff880`05fd0000   cdfs     cdfs.sys     Tue Jul 14 00:19:46 2009 (4A5BC112)
    fffff880`018be000 fffff880`018e8000   cdrom    cdrom.sys    Sat Nov 20 09:19:20 2010 (4CE79298)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Sat Nov 20 13:12:36 2010 (4CE7C944)
    fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Sat Nov 20 09:19:23 2010 (4CE7929B)
    fffff880`00cec000 fffff880`00d4a000   CLFS     CLFS.SYS     Tue Jul 14 00:19:57 2009 (4A5BC11D)
    fffff880`01614000 fffff880`01686000   cng      cng.sys      Sat Jun 02 04:25:51 2012 (4FC987BF)
    fffff880`13fe7000 fffff880`13ff7000   CompositeBus CompositeBus.sys Sat Nov 20 10:33:17 2010 (4CE7A3ED)
    fffff880`05fde000 fffff880`05fec000   crashdmp crashdmp.sys Tue Jul 14 01:01:01 2009 (4A5BCABD)
    fffff880`04d47000 fffff880`04d65000   dfsc     dfsc.sys     Sat Nov 20 09:26:31 2010 (4CE79447)
    fffff880`04d38000 fffff880`04d47000   discache discache.sys Tue Jul 14 00:37:18 2009 (4A5BC52E)
    fffff880`0183a000 fffff880`01850000   disk     disk.sys     Tue Jul 14 00:19:57 2009 (4A5BC11D)
    fffff880`05f04000 fffff880`05f26000   drmk     drmk.sys     Tue Jul 14 02:01:25 2009 (4A5BD8E5)
    fffff880`05e00000 fffff880`05e09000   dump_atapi dump_atapi.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`05fec000 fffff880`05ff8000   dump_dumpata dump_dumpata.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`05e09000 fffff880`05e1c000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
    fffff880`05fa7000 fffff880`05fb3000   Dxapi    Dxapi.sys    Tue Jul 14 00:38:28 2009 (4A5BC574)
    fffff880`04a30000 fffff880`04b24000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 09:50:50 2010 (4CE799FA)
    fffff880`04b24000 fffff880`04b6a000   dxgmms1  dxgmms1.sys  Sat Nov 20 09:49:53 2010 (4CE799C1)
    fffff880`04c98000 fffff880`04d12000   eeCtrl64 eeCtrl64.sys Wed Aug 01 00:36:51 2012 (50186C13)
    fffff880`0468a000 fffff880`046ac000   ENG64    ENG64.SYS    Wed Sep 05 23:33:39 2012 (5047D343)
    fffff880`04d12000 fffff880`04d38000   EraserUtilRebootDrv EraserUtilRebootDrv.sys Wed Aug 01 00:36:50 2012 (50186C12)
    fffff880`04487000 fffff880`0468a000   EX64     EX64.SYS     Wed Sep 05 23:31:45 2012 (5047D2D1)
    fffff880`01271000 fffff880`01285000   fileinfo fileinfo.sys Tue Jul 14 00:34:25 2009 (4A5BC481)
    fffff880`00d4a000 fffff880`00d96000   fltmgr   fltmgr.sys   Sat Nov 20 09:19:24 2010 (4CE7929C)
    fffff880`01697000 fffff880`016a1000   Fs_Rec   Fs_Rec.sys   Thu Mar 01 03:41:06 2012 (4F4EEFD2)
    fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Sat Nov 20 09:24:06 2010 (4CE793B6)
    fffff880`01af8000 fffff880`01b42000   fwpkclnt fwpkclnt.sys Wed Aug 22 16:10:49 2012 (5034F679)
    fffff800`0321e000 fffff800`03267000   hal      hal.dll      Sat Nov 20 13:00:25 2010 (4CE7C669)
    fffff880`04b6a000 fffff880`04b8e000   HDAudBus HDAudBus.sys Sat Nov 20 10:43:42 2010 (4CE7A65E)
    fffff880`05f2c000 fffff880`05f45000   HIDCLASS HIDCLASS.SYS Sat Nov 20 10:43:49 2010 (4CE7A665)
    fffff880`0660e000 fffff880`06616080   HIDPARSE HIDPARSE.SYS Tue Jul 14 01:06:17 2009 (4A5BCBF9)
    fffff880`06600000 fffff880`0660e000   hidusb   hidusb.sys   Sat Nov 20 10:43:49 2010 (4CE7A665)
    fffff880`01beb000 fffff880`01bf7000   hotcore3 hotcore3.sys Fri Mar 25 00:41:49 2011 (4D8BE4CD)
    fffff880`088ae000 fffff880`08977000   HTTP     HTTP.sys     Sat Nov 20 09:24:30 2010 (4CE793CE)
    fffff880`01be2000 fffff880`01beb000   hwpolicy hwpolicy.sys Sat Nov 20 09:18:54 2010 (4CE7927E)
    fffff880`03e00000 fffff880`03e82000   IDSvia64 IDSvia64.sys Wed Aug 29 03:48:40 2012 (503D8308)
    fffff880`03d0b000 fffff880`03d3c000   Ironx64  Ironx64.SYS  Tue Nov 15 02:00:53 2011 (4EC1C7D5)
    fffff880`02fed000 fffff880`02ffc000   kbdclass kbdclass.sys Tue Jul 14 00:19:50 2009 (4A5BC116)
    fffff880`05f99000 fffff880`05fa7000   kbdhid   kbdhid.sys   Sat Nov 20 10:33:25 2010 (4CE7A3F5)
    fffff800`00ba0000 fffff800`00baa000   kdcom    kdcom.dll    Sat Feb 05 16:52:49 2011 (4D4D8061)
    fffff880`04c4a000 fffff880`04c8d000   ks       ks.sys       Sat Nov 20 10:33:23 2010 (4CE7A3F3)
    fffff880`015d9000 fffff880`015f4000   ksecdd   ksecdd.sys   Sat Jun 02 03:50:23 2012 (4FC97F6F)
    fffff880`01400000 fffff880`0142a000   ksecpkg  ksecpkg.sys  Sat Jun 02 04:27:11 2012 (4FC9880F)
    fffff880`05f26000 fffff880`05f2b200   ksthunk  ksthunk.sys  Tue Jul 14 01:00:19 2009 (4A5BCA93)
    fffff880`05f62000 fffff880`05f78000   LHidFilt LHidFilt.Sys Fri Sep 02 07:23:09 2011 (4E60764D)
    fffff880`03fd1000 fffff880`03fe6000   lltdio   lltdio.sys   Tue Jul 14 01:08:50 2009 (4A5BCC92)
    fffff880`05f85000 fffff880`05f99000   LMouFilt LMouFilt.Sys Fri Sep 02 07:23:15 2011 (4E607653)
    fffff880`03e94000 fffff880`03eb7000   luafv    luafv.sys    Tue Jul 14 00:26:13 2009 (4A5BC295)
    fffff880`00ccb000 fffff880`00cd8000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:29:09 2009 (4A5BDF65)
    fffff880`05fd0000 fffff880`05fde000   monitor  monitor.sys  Tue Jul 14 00:38:52 2009 (4A5BC58C)
    fffff880`04c3b000 fffff880`04c4a000   mouclass mouclass.sys Tue Jul 14 00:19:50 2009 (4A5BC116)
    fffff880`05f78000 fffff880`05f85000   mouhid   mouhid.sys   Tue Jul 14 01:00:20 2009 (4A5BCA94)
    fffff880`00fd7000 fffff880`00ff1000   mountmgr mountmgr.sys Sat Nov 20 09:19:21 2010 (4CE79299)
    fffff880`08995000 fffff880`089ad000   mpsdrv   mpsdrv.sys   Tue Jul 14 01:08:25 2009 (4A5BCC79)
    fffff880`089ad000 fffff880`089da000   mrxsmb   mrxsmb.sys   Wed Apr 27 03:40:38 2011 (4DB78226)
    fffff880`08800000 fffff880`0884e000   mrxsmb10 mrxsmb10.sys Sat Jul 09 03:46:28 2011 (4E17C104)
    fffff880`0884e000 fffff880`08872000   mrxsmb20 mrxsmb20.sys Wed Apr 27 03:39:37 2011 (4DB781E9)
    fffff880`0471a000 fffff880`04725000   Msfs     Msfs.SYS     Tue Jul 14 00:19:47 2009 (4A5BC113)
    fffff880`01000000 fffff880`0100a000   msisadrv msisadrv.sys Tue Jul 14 00:19:26 2009 (4A5BC0FE)
    fffff880`0139d000 fffff880`013fb000   msrpc    msrpc.sys    Sat Nov 20 09:21:56 2010 (4CE79334)
    fffff880`03fad000 fffff880`03fb8000   mssmbios mssmbios.sys Tue Jul 14 00:31:10 2009 (4A5BC3BE)
    fffff880`01bd0000 fffff880`01be2000   mup      mup.sys      Tue Jul 14 00:23:45 2009 (4A5BC201)
    fffff880`016a1000 fffff880`01793000   ndis     ndis.sys     Wed Aug 22 16:11:46 2012 (5034F6B2)
    fffff880`02fe1000 fffff880`02fed000   ndistapi ndistapi.sys Tue Jul 14 01:10:00 2009 (4A5BCCD8)
    fffff880`04d9a000 fffff880`04dc9000   ndiswan  ndiswan.sys  Sat Nov 20 10:52:32 2010 (4CE7A870)
    fffff880`05e80000 fffff880`05e95000   NDProxy  NDProxy.SYS  Sat Nov 20 10:52:20 2010 (4CE7A864)
    fffff880`04474000 fffff880`04483000   netbios  netbios.sys  Tue Jul 14 01:09:26 2009 (4A5BCCB6)
    fffff880`04400000 fffff880`04445000   netbt    netbt.sys    Sat Nov 20 09:23:18 2010 (4CE79386)
    fffff880`01793000 fffff880`017f3000   NETIO    NETIO.SYS    Wed Aug 22 16:11:28 2012 (5034F6A0)
    fffff880`04725000 fffff880`04736000   Npfs     Npfs.SYS     Tue Jul 14 00:19:48 2009 (4A5BC114)
    fffff880`03fa1000 fffff880`03fad000   nsiproxy nsiproxy.sys Tue Jul 14 00:21:02 2009 (4A5BC15E)
    fffff800`03267000 fffff800`0384f000   nt       ntkrnlmp.exe Thu Aug 30 16:11:58 2012 (503F82BE)
    fffff880`01436000 fffff880`015d9000   Ntfs     Ntfs.sys     Fri Aug 31 16:14:14 2012 (5040D4C6)
    fffff880`046ac000 fffff880`046b5000   Null     Null.SYS     Tue Jul 14 00:19:37 2009 (4A5BC109)
    fffff880`05e95000 fffff880`05ec7000   nvhda64v nvhda64v.sys Tue Jul 03 16:25:04 2012 (4FF30ED0)
    fffff880`132f3000 fffff880`13fe7000   nvlddmkm nvlddmkm.sys Tue Oct 02 19:21:13 2012 (506B3099)
    fffff880`0444e000 fffff880`04474000   pacer    pacer.sys    Sat Nov 20 10:52:18 2010 (4CE7A862)
    fffff880`13285000 fffff880`132a2000   parport  parport.sys  Tue Jul 14 01:00:40 2009 (4A5BCAA8)
    fffff880`01017000 fffff880`0102c000   partmgr  partmgr.sys  Sat Mar 17 05:06:09 2012 (4F641BC1)
    fffff880`00f1c000 fffff880`00f4f000   pci      pci.sys      Sat Nov 20 09:19:11 2010 (4CE7928F)
    fffff880`00fc0000 fffff880`00fc7000   pciide   pciide.sys   Tue Jul 14 00:19:49 2009 (4A5BC115)
    fffff880`00fc7000 fffff880`00fd7000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:19:48 2009 (4A5BC114)
    fffff880`01686000 fffff880`01697000   pcw      pcw.sys      Tue Jul 14 00:19:27 2009 (4A5BC0FF)
    fffff880`09082000 fffff880`09128000   peauth   peauth.sys   Tue Jul 14 02:01:19 2009 (4A5BD8DF)
    fffff880`05ec7000 fffff880`05f04000   portcls  portcls.sys  Tue Jul 14 01:06:27 2009 (4A5BCC03)
    fffff880`00cd8000 fffff880`00cec000   PSHED    PSHED.dll    Tue Jul 14 02:32:23 2009 (4A5BE027)
    fffff880`04d76000 fffff880`04d9a000   rasl2tp  rasl2tp.sys  Sat Nov 20 10:52:34 2010 (4CE7A872)
    fffff880`04dc9000 fffff880`04de4000   raspppoe raspppoe.sys Tue Jul 14 01:10:17 2009 (4A5BCCE9)
    fffff880`04c00000 fffff880`04c21000   raspptp  raspptp.sys  Sat Nov 20 10:52:31 2010 (4CE7A86F)
    fffff880`04c21000 fffff880`04c3b000   rassstp  rassstp.sys  Tue Jul 14 01:10:25 2009 (4A5BCCF1)
    fffff880`03f50000 fffff880`03fa1000   rdbss    rdbss.sys    Sat Nov 20 09:27:51 2010 (4CE79497)
    fffff880`046ff000 fffff880`04708000   RDPCDD   RDPCDD.sys   Tue Jul 14 01:16:34 2009 (4A5BCE62)
    fffff880`04708000 fffff880`04711000   rdpencdd rdpencdd.sys Tue Jul 14 01:16:34 2009 (4A5BCE62)
    fffff880`04711000 fffff880`0471a000   rdprefmp rdprefmp.sys Tue Jul 14 01:16:35 2009 (4A5BCE63)
    fffff880`01b96000 fffff880`01bd0000   rdyboost rdyboost.sys Sat Nov 20 09:43:10 2010 (4CE7982E)
    fffff880`03fe6000 fffff880`03ffe000   rspndr   rspndr.sys   Tue Jul 14 01:08:50 2009 (4A5BCC92)
    fffff880`13200000 fffff880`13285000   Rt64win7 Rt64win7.sys Fri Jun 10 07:33:15 2011 (4DF1BAAB)
    fffff880`06621000 fffff880`069ffd80   RTKVHD64 RTKVHD64.sys Tue Jun 19 09:50:56 2012 (4FE03D70)
    fffff880`03f29000 fffff880`03f50000   SCDEmu   SCDEmu.SYS   Sun Dec 09 08:46:41 2012 (50C44FF1)
    fffff880`02e3b000 fffff880`02e6a000   SCSIPORT SCSIPORT.SYS Sat Nov 20 10:34:01 2010 (4CE7A419)
    fffff880`09128000 fffff880`09133000   secdrv   secdrv.SYS   Wed Sep 13 14:18:38 2006 (4508052E)
    fffff880`04a11000 fffff880`04a1d000   serenum  serenum.sys  Tue Jul 14 01:00:33 2009 (4A5BCAA1)
    fffff880`03d89000 fffff880`03da6000   serial   serial.sys   Tue Jul 14 01:00:40 2009 (4A5BCAA8)
    fffff880`01b8e000 fffff880`01b96000   spldr    spldr.sys    Mon May 11 17:56:27 2009 (4A0858BB)
    fffff880`0102d000 fffff880`011a0000   sptd     sptd.sys     Sat Mar 03 16:45:52 2012 (4F524AC0)
    fffff880`03c4c000 fffff880`03d0b000   SRTSP64  SRTSP64.SYS  Mon Jul 02 19:20:28 2012 (4FF1E66C)
    fffff880`03d3c000 fffff880`03d51000   SRTSPX64 SRTSPX64.SYS Mon Jul 02 19:20:37 2012 (4FF1E675)
    fffff880`096bd000 fffff880`09755000   srv      srv.sys      Fri Apr 29 04:06:06 2011 (4DBA2B1E)
    fffff880`09176000 fffff880`091df000   srv2     srv2.sys     Fri Apr 29 04:05:46 2011 (4DBA2B0A)
    fffff880`09133000 fffff880`09164000   srvnet   srvnet.sys   Fri Apr 29 04:05:35 2011 (4DBA2AFF)
    fffff880`04a26000 fffff880`04a27480   swenum   swenum.sys   Tue Jul 14 01:00:18 2009 (4A5BCA92)
    fffff880`01200000 fffff880`01271000   SYMDS64  SYMDS64.SYS  Mon May 16 23:15:03 2011 (4DD1A1E7)
    fffff880`01285000 fffff880`0139d000   SYMEFA64 SYMEFA64.SYS Sat May 19 02:29:56 2012 (4FB6F794)
    fffff880`03d51000 fffff880`03d89000   SYMEVENT64x86 SYMEVENT64x86.SYS Tue Nov 22 18:30:48 2011 (4ECBEA58)
    fffff880`03ebd000 fffff880`03f29000   SYMNETS  SYMNETS.SYS  Sat Nov 12 21:11:53 2011 (4EBEE119)
    fffff880`018f7000 fffff880`01af8000   tcpip    tcpip.sys    Wed Oct 03 16:09:34 2012 (506C552E)
    fffff880`09164000 fffff880`09176000   tcpipreg tcpipreg.sys Wed Oct 03 17:07:26 2012 (506C62BE)
    fffff880`04758000 fffff880`04765000   TDI      TDI.SYS      Sat Nov 20 09:22:06 2010 (4CE7933E)
    fffff880`04736000 fffff880`04758000   tdx      tdx.sys      Sat Nov 20 09:21:54 2010 (4CE79332)
    fffff880`03dc1000 fffff880`03dd5000   termdd   termdd.sys   Sat Nov 20 11:03:40 2010 (4CE7AB0C)
    fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`02e00000 fffff880`02e26000   tunnel   tunnel.sys   Sat Nov 20 10:51:50 2010 (4CE7A846)
    fffff880`03e82000 fffff880`03e94000   umbus    umbus.sys    Sat Nov 20 10:44:37 2010 (4CE7A695)
    fffff880`05f45000 fffff880`05f62000   usbccgp  usbccgp.sys  Fri Mar 25 03:29:14 2011 (4D8C0C0A)
    fffff880`06617000 fffff880`06618f00   USBD     USBD.SYS     Fri Mar 25 03:28:59 2011 (4D8C0BFB)
    fffff880`04a00000 fffff880`04a11000   usbehci  usbehci.sys  Fri Mar 25 03:29:04 2011 (4D8C0C00)
    fffff880`04bef000 fffff880`04bfd000   usbfilter usbfilter.sys Mon Nov 29 09:50:21 2010 (4CF3775D)
    fffff880`05e26000 fffff880`05e80000   usbhub   usbhub.sys   Fri Mar 25 03:29:25 2011 (4D8C0C15)
    fffff880`04b8e000 fffff880`04b99000   usbohci  usbohci.sys  Fri Mar 25 03:29:03 2011 (4D8C0BFF)
    fffff880`04b99000 fffff880`04bef000   USBPORT  USBPORT.SYS  Fri Mar 25 03:29:12 2011 (4D8C0C08)
    fffff880`0100a000 fffff880`01017000   vdrvroot vdrvroot.sys Tue Jul 14 01:01:31 2009 (4A5BCADB)
    fffff880`046bc000 fffff880`046ca000   vga      vga.sys      Tue Jul 14 00:38:47 2009 (4A5BC587)
    fffff880`046ca000 fffff880`046ef000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:38:51 2009 (4A5BC58B)
    fffff880`00f4f000 fffff880`00f64000   volmgr   volmgr.sys   Sat Nov 20 09:19:28 2010 (4CE792A0)
    fffff880`00f64000 fffff880`00fc0000   volmgrx  volmgrx.sys  Sat Nov 20 09:20:43 2010 (4CE792EB)
    fffff880`01b42000 fffff880`01b8e000   volsnap  volsnap.sys  Sat Nov 20 09:20:08 2010 (4CE792C8)
    fffff880`03da6000 fffff880`03dc1000   wanarp   wanarp.sys   Sat Nov 20 10:52:36 2010 (4CE7A874)
    fffff880`046ef000 fffff880`046ff000   watchdog watchdog.sys Tue Jul 14 00:37:35 2009 (4A5BC53F)
    fffff880`00e4a000 fffff880`00f0c000   Wdf01000 Wdf01000.sys Thu Jul 26 03:25:13 2012 (5010AA89)
    fffff880`00f0c000 fffff880`00f1c000   WDFLDR   WDFLDR.SYS   Thu Jul 26 03:29:04 2012 (5010AB70)
    fffff880`04445000 fffff880`0444e000   wfplwf   wfplwf.sys   Tue Jul 14 01:09:26 2009 (4A5BCCB6)
    fffff960`00000000 fffff960`00316000   win32k   win32k.sys   Thu Nov 22 03:26:12 2012 (50AD9B54)
    fffff880`04a1d000 fffff880`04a26000   wmiacpi  wmiacpi.sys  Tue Jul 14 00:31:02 2009 (4A5BC3B6)
    fffff880`011f7000 fffff880`01200000   WMILIB   WMILIB.SYS   Tue Jul 14 00:19:51 2009 (4A5BC117)
    fffff880`03fb8000 fffff880`03fd1000   WudfPf   WudfPf.sys   Thu Jul 26 03:26:45 2012 (5010AAE5)
    Unloaded modules:
    fffff880`132a2000 fffff880`132ee000   acmwggk7.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0004C000
    fffff880`09755000 fffff880`097c6000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`01888000 fffff880`01896000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01896000 fffff880`018a2000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`018a2000 fffff880`018ab000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`018ab000 fffff880`018be000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
      My Computer


 
Page 1 of 8 123 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:43.
Find Us