Still pointing to network adapter drivers. Did you uninstall and install a fresh copy?
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Jonathan\Desktop\062410-51558-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.20655.amd64fre.win7_ldr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02c07000 PsLoadedModuleList = 0xfffff800`02e3fe50
Debug session time: Thu Jun 24 10:34:49.679 2010 (UTC - 4:00)
System Uptime: 0 days 0:04:40.489
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff88001f8966c}
Unable to load image \SystemRoot\system32\DRIVERS\netr28ux.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netr28ux.sys
*** ERROR: Module load completed but symbols could not be loaded for netr28ux.sys
Probably caused by : netr28ux.sys ( netr28ux+8b66c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001f8966c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaa0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
netr28ux+8b66c
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff88005315800 -- (.trap 0xfffff88005315800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
r8=fffff88005315aa0 r9=0000000000000000 r10=fffffa800626af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
netr28ux+0x8b66c:
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c6ee69 to fffff80002c6f900
STACK_TEXT:
fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000
STACK_COMMAND: kb
FOLLOWUP_IP:
netr28ux+8b66c
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netr28ux+8b66c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28ux
IMAGE_NAME: netr28ux.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a799052
FAILURE_BUCKET_ID: X64_0xD1_netr28ux+8b66c
BUCKET_ID: X64_0xD1_netr28ux+8b66c
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001f8966c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
netr28ux+8b66c
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff88005315800 -- (.trap 0xfffff88005315800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
r8=fffff88005315aa0 r9=0000000000000000 r10=fffffa800626af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
netr28ux+0x8b66c:
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c6ee69 to fffff80002c6f900
STACK_TEXT:
fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000
STACK_COMMAND: kb
FOLLOWUP_IP:
netr28ux+8b66c
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netr28ux+8b66c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28ux
IMAGE_NAME: netr28ux.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a799052
FAILURE_BUCKET_ID: X64_0xD1_netr28ux+8b66c
BUCKET_ID: X64_0xD1_netr28ux+8b66c
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001f8966c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
netr28ux+8b66c
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff88005315800 -- (.trap 0xfffff88005315800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
r8=fffff88005315aa0 r9=0000000000000000 r10=fffffa800626af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
netr28ux+0x8b66c:
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c6ee69 to fffff80002c6f900
STACK_TEXT:
fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000
STACK_COMMAND: kb
FOLLOWUP_IP:
netr28ux+8b66c
fffff880`01f8966c 8b08 mov ecx,dword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netr28ux+8b66c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28ux
IMAGE_NAME: netr28ux.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a799052
FAILURE_BUCKET_ID: X64_0xD1_netr28ux+8b66c
BUCKET_ID: X64_0xD1_netr28ux+8b66c
Followup: MachineOwner
---------
2: kd> lmsmn
start end module name
fffff880`03f3a000 fffff880`03f78000 1394ohci 1394ohci.sys
fffff880`00f83000 fffff880`00fda000 ACPI ACPI.sys
fffff880`02cea000 fffff880`02d74000 afd afd.sys
fffff880`03fc1000 fffff880`03fd7000 AgileVpn AgileVpn.sys
fffff880`03791000 fffff880`037a6000 amdppm amdppm.sys
fffff880`010c2000 fffff880`010cd000 amdxata amdxata.sys
fffff880`0108f000 fffff880`01098000 atapi atapi.sys
fffff880`01098000 fffff880`010c2000 ataport ataport.SYS
fffff880`00e51000 fffff880`00e5d000 BATTC BATTC.SYS
fffff880`01809000 fffff880`01810000 Beep Beep.SYS
fffff880`0375a000 fffff880`0376b000 blbdrive blbdrive.sys
fffff880`06750000 fffff880`0676e000 bowser bowser.sys
fffff960`006d0000 fffff960`006f7000 cdd cdd.dll
fffff880`019cf000 fffff880`019f9000 cdrom cdrom.sys
fffff880`00d08000 fffff880`00dc8000 CI CI.dll
fffff880`0105f000 fffff880`0108f000 CLASSPNP CLASSPNP.SYS
fffff880`00caa000 fffff880`00d08000 CLFS CLFS.SYS
fffff880`01464000 fffff880`014d7000 cng cng.sys
fffff880`00e48000 fffff880`00e51000 compbatt compbatt.sys
fffff880`03fb1000 fffff880`03fc1000 CompositeBus CompositeBus.sys
fffff880`06671000 fffff880`0667a000 cpuz133_x64 cpuz133_x64.sys
fffff880`01e0e000 fffff880`01e1c000 crashdmp crashdmp.sys
fffff880`036b9000 fffff880`0373c000 csc csc.sys
fffff880`0373c000 fffff880`0375a000 dfsc dfsc.sys
fffff880`036aa000 fffff880`036b9000 discache discache.sys
fffff880`01983000 fffff880`01999000 disk disk.sys
fffff880`04389000 fffff880`043ab000 drmk drmk.sys
fffff880`01e28000 fffff880`01e31000 dump_atapi dump_atapi.sys
fffff880`01e1c000 fffff880`01e28000 dump_dumpata dump_dumpata.sys
fffff880`01e31000 fffff880`01e44000 dump_dumpfve dump_dumpfve.sys
fffff880`043e1000 fffff880`043ed000 Dxapi Dxapi.sys
fffff880`14aa6000 fffff880`14b9a000 dxgkrnl dxgkrnl.sys
fffff880`14b9a000 fffff880`14be0000 dxgmms1 dxgmms1.sys
fffff880`036a1000 fffff880`036aa000 EIO64 EIO64.sys
fffff880`011a5000 fffff880`011b9000 fileinfo fileinfo.sys
fffff880`01159000 fffff880`011a5000 fltmgr fltmgr.sys
fffff880`014e8000 fffff880`014f2000 Fs_Rec Fs_Rec.sys
fffff880`01949000 fffff880`01983000 fvevol fvevol.sys
fffff880`01835000 fffff880`0187f000 fwpkclnt fwpkclnt.sys
fffff800`031de000 fffff800`03227000 hal hal.dll
fffff880`03f16000 fffff880`03f3a000 HDAudBus HDAudBus.sys
fffff880`042f0000 fffff880`0434c000 HdAudio HdAudio.sys
fffff880`043bf000 fffff880`043d8000 HIDCLASS HIDCLASS.SYS
fffff880`043d8000 fffff880`043e0080 HIDPARSE HIDPARSE.SYS
fffff880`043b1000 fffff880`043bf000 hidusb hidusb.sys
fffff880`06688000 fffff880`06750000 HTTP HTTP.sys
fffff880`01940000 fffff880`01949000 hwpolicy hwpolicy.sys
fffff880`03f84000 fffff880`03fa2000 i8042prt i8042prt.sys
fffff880`00ddf000 fffff880`00dff000 jraid jraid.sys
fffff880`03fa2000 fffff880`03fb1000 kbdclass kbdclass.sys
fffff800`00bb3000 fffff800`00bbd000 kdcom kdcom.dll
fffff880`037af000 fffff880`037f2000 ks ks.sys
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys
fffff880`0121a000 fffff880`01245000 ksecpkg ksecpkg.sys
fffff880`043ab000 fffff880`043b0200 ksthunk ksthunk.sys
fffff880`01e88000 fffff880`01e9d000 lltdio lltdio.sys
fffff880`01e44000 fffff880`01e67000 luafv luafv.sys
fffff880`00c89000 fffff880`00c96000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll
fffff880`01e00000 fffff880`01e0e000 monitor monitor.sys
fffff880`03e9c000 fffff880`03eab000 mouclass mouclass.sys
fffff880`043ed000 fffff880`043fa000 mouhid mouhid.sys
fffff880`00c2f000 fffff880`00c49000 mountmgr mountmgr.sys
fffff880`0676e000 fffff880`06786000 mpsdrv mpsdrv.sys
fffff880`06786000 fffff880`067ae000 mrxdav mrxdav.sys
fffff880`067ae000 fffff880`067db000 mrxsmb mrxsmb.sys
fffff880`06600000 fffff880`0664e000 mrxsmb10 mrxsmb10.sys
fffff880`0664e000 fffff880`06671000 mrxsmb20 mrxsmb20.sys
fffff880`013e8000 fffff880`013f3000 Msfs Msfs.SYS
fffff880`00fe3000 fffff880`00fed000 msisadrv msisadrv.sys
fffff880`01000000 fffff880`0105e000 msrpc msrpc.sys
fffff880`03696000 fffff880`036a1000 mssmbios mssmbios.sys
fffff880`01925000 fffff880`01937000 mup mup.sys
fffff880`014f2000 fffff880`015e4000 ndis ndis.sys
fffff880`03e00000 fffff880`03e0c000 ndistapi ndistapi.sys
fffff880`04200000 fffff880`04213000 ndisuio ndisuio.sys
fffff880`03e0c000 fffff880`03e3b000 ndiswan ndiswan.sys
fffff880`042db000 fffff880`042f0000 NDProxy NDProxy.SYS
fffff880`02c16000 fffff880`02c25000 netbios netbios.sys
fffff880`02d74000 fffff880`02db9000 netbt netbt.sys
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS
fffff880`01efe000 fffff880`01ff8000 netr28ux netr28ux.sys
fffff880`00c72000 fffff880`00c83000 Npfs Npfs.SYS
fffff880`0368a000 fffff880`03696000 nsiproxy nsiproxy.sys
fffff800`02c07000 fffff800`031de000 nt ntkrnlmp.exe
fffff880`01245000 fffff880`013e8000 Ntfs Ntfs.sys
fffff880`01800000 fffff880`01809000 Null Null.SYS
fffff880`14aa4000 fffff880`14aa5180 nvBridge nvBridge.kmd
fffff880`13e36000 fffff880`14aa3c80 nvlddmkm nvlddmkm.sys
fffff880`00c49000 fffff880`00c72000 nvraid nvraid.sys
fffff880`01e9d000 fffff880`01ef0000 nwifi nwifi.sys
fffff880`02dc2000 fffff880`02de8000 pacer pacer.sys
fffff880`00e33000 fffff880`00e48000 partmgr partmgr.sys
fffff880`06e9c000 fffff880`06ea3000 pbfilter pbfilter.sys
fffff880`00e00000 fffff880`00e33000 pci pci.sys
fffff880`00dc8000 fffff880`00dcf000 pciide pciide.sys
fffff880`00dcf000 fffff880`00ddf000 PCIIDEX PCIIDEX.SYS
fffff880`014d7000 fffff880`014e8000 pcw pcw.sys
fffff880`06aad000 fffff880`06b53000 peauth peauth.sys
fffff880`0434c000 fffff880`04389000 portcls portcls.sys
fffff880`00c96000 fffff880`00caa000 PSHED PSHED.dll
fffff880`03fd7000 fffff880`03ffb000 rasl2tp rasl2tp.sys
fffff880`03e3b000 fffff880`03e56000 raspppoe raspppoe.sys
fffff880`03e56000 fffff880`03e77000 raspptp raspptp.sys
fffff880`03e77000 fffff880`03e91000 rassstp rassstp.sys
fffff880`03639000 fffff880`0368a000 rdbss rdbss.sys
fffff880`03e91000 fffff880`03e9c000 rdpbus rdpbus.sys
fffff880`015e4000 fffff880`015ed000 RDPCDD RDPCDD.sys
fffff880`015ed000 fffff880`015f6000 rdpencdd rdpencdd.sys
fffff880`015f6000 fffff880`015ff000 rdprefmp rdprefmp.sys
fffff880`018e3000 fffff880`0191d000 rdyboost rdyboost.sys
fffff880`04213000 fffff880`0422b000 rspndr rspndr.sys
fffff880`00c00000 fffff880`00c2f000 SCSIPORT SCSIPORT.SYS
fffff880`06b53000 fffff880`06b5e000 secdrv secdrv.SYS
fffff880`03f78000 fffff880`03f84000 serenum serenum.sys
fffff880`02c25000 fffff880`02c42000 serial serial.sys
fffff880`0191d000 fffff880`01925000 SiRemFil SiRemFil.sys
fffff880`011b9000 fffff880`011c3000 SiWinAcc SiWinAcc.sys
fffff880`018db000 fffff880`018e3000 spldr spldr.sys
fffff880`06ea3000 fffff880`06f14000 spsys spsys.sys
fffff880`06e04000 fffff880`06e9c000 srv srv.sys
fffff880`06a00000 fffff880`06a69000 srv2 srv2.sys
fffff880`06b5e000 fffff880`06b8b000 srvnet srvnet.sys
fffff880`010f7000 fffff880`01159000 storport storport.sys
fffff880`03eab000 fffff880`03eac480 swenum swenum.sys
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys
fffff880`06b8b000 fffff880`06b9d000 tcpipreg tcpipreg.sys
fffff880`02cdd000 fffff880`02cea000 TDI TDI.SYS
fffff880`02cbf000 fffff880`02cdd000 tdx tdx.sys
fffff880`03625000 fffff880`03639000 termdd termdd.sys
fffff960`005f0000 fffff960`005fa000 TSDDD TSDDD.dll
fffff880`0376b000 fffff880`03791000 tunnel tunnel.sys
fffff880`14beb000 fffff880`14bfd000 umbus umbus.sys
fffff880`03ead000 fffff880`03eaef00 USBD USBD.SYS
fffff880`03f05000 fffff880`03f16000 usbehci usbehci.sys
fffff880`04281000 fffff880`042db000 usbhub usbhub.sys
fffff880`14be0000 fffff880`14beb000 usbohci usbohci.sys
fffff880`03eaf000 fffff880`03f05000 USBPORT USBPORT.SYS
fffff880`13e1d000 fffff880`13e2c000 usbrpm usbrpm.sys
fffff880`00fed000 fffff880`00ffa000 vdrvroot vdrvroot.sys
fffff880`01810000 fffff880`0181e000 vga vga.sys
fffff880`011cd000 fffff880`011f2000 VIDEOPRT VIDEOPRT.SYS
fffff880`0187f000 fffff880`0188f000 vmstorfl vmstorfl.sys
fffff880`00e5d000 fffff880`00e72000 volmgr volmgr.sys
fffff880`00e72000 fffff880`00ece000 volmgrx volmgrx.sys
fffff880`0188f000 fffff880`018db000 volsnap volsnap.sys
fffff880`04245000 fffff880`04281000 vpchbus vpchbus.sys
fffff880`02de8000 fffff880`02dfc000 vpcnfltr vpcnfltr.sys
fffff880`13e00000 fffff880`13e1d000 vpcusb vpcusb.sys
fffff880`02c5d000 fffff880`02cb3180 vpcvmm vpcvmm.sys
fffff880`010cd000 fffff880`010f7000 vsmraid vsmraid.sys
fffff880`02c00000 fffff880`02c16000 vwififlt vwififlt.sys
fffff880`02c42000 fffff880`02c5d000 wanarp wanarp.sys
fffff880`0181e000 fffff880`0182e000 watchdog watchdog.sys
fffff880`00ed0000 fffff880`00f74000 Wdf01000 Wdf01000.sys
fffff880`00f74000 fffff880`00f83000 WDFLDR WDFLDR.SYS
fffff880`02db9000 fffff880`02dc2000 wfplwf wfplwf.sys
fffff960`000b0000 fffff960`003bf000 win32k win32k.sys
fffff880`037a6000 fffff880`037af000 wmiacpi wmiacpi.sys
fffff880`00fda000 fffff880`00fe3000 WMILIB WMILIB.SYS
fffff880`01e67000 fffff880`01e88000 WudfPf WudfPf.sys
fffff880`011c3000 fffff880`011cd000 xfiltx64 xfiltx64.sys
Unloaded modules:
fffff880`01999000 fffff880`019a7000 crashdmp.sys
fffff880`019a7000 fffff880`019b3000 dump_ataport
fffff880`019b3000 fffff880`019bc000 dump_atapi.s
fffff880`019bc000 fffff880`019cf000 dump_dumpfve
fffff880`01937000 fffff880`01940000 johci.sys