Random BSODs

Page 1 of 2 12 LastLast

  1. Posts : 10
    Windows 7 64-bit
       #1

    Random BSODs


    For awhile now I've been getting BSODs from things from Ntkrnlmp.exe to netr28ux.sys to random stops with nothing to point fingers at. (Oh, and some hardware stops as well.)
    I have found and eliminated/updated most of the 3rd party drivers from the system causing some of the crashes but not really getting at the core problem.
    I'm leaving the last 3 crashes, I got 12 others just chillin' on my HD.

    Halp
      My Computer


  2. Posts : 1,598
    Microsoft Window 7 Professional 32 bit
       #2

    Hi and welcome to SF

    please remove any virtual CD program such as Deamon tool or Alcohol 120%, eventhough they are not pointed as the causes in those minidump files, however, they are well-known for causing BSODs.
    Code:
    sptd     sptd.sys     Mon Oct 12 03:55:14 2009 (4AD24632)
    After that, please use this tool to un-install sptd.sys, which is component of many virtual CD program
    DuplexSecure - Downloads

    Also, please update these drivers:
    Code:
    SiRemFil SiRemFil.sys Thu Jun 21 02:42:10 2007 (46798312)
    SiWinAcc SiWinAcc.sys Fri Jun 15 07:02:02 2007 (4671D6FA)
    They are Silicon Image drivers

    Hope it's help

    BUGCHECK
    Code:
    BugCheck A, {7a0000000048, 2, 1, fffff80002c81237}
    Probably caused by : ntkrnlmp.exe ( nt!ExTryAcquireSpinLockExclusiveAtDpcLevel+2f )
    Followup: MachineOwner
    ---------
    BugCheck 50, {ffffe0a0009bad40, 0, fffff8800144f39d, 7}
     
    Could not read faulting driver name
    Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+bd )
    Followup: MachineOwner
    ---------
    BugCheck D1, {0, 2, 0, fffff88002e5ceba}
    Probably caused by : hardware ( afd!AfdFastConnectionReceive+8a )
    Followup: MachineOwner
    ---------
    Regard

    Tuan
      My Computer


  3. Posts : 13,354
    Windows 7 Professional x64
       #3

    Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads

    Update this:
    Code:
    SiWinAcc.sys   Silicon Image driver - comes with package for the SIxxxx drivers   Silicon Image - Support
    Test your hard drive: http://www.carrona.org/hddiag.html

    Open a command prompt and enter chdsk /r.

    Code:
    
    BugCheck A, {7a0000000048, 2, 1, fffff80002c81237}
    Probably caused by : ntkrnlmp.exe ( nt!ExTryAcquireSpinLockExclusiveAtDpcLevel+2f )
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
    BugCheck 50, {ffffe0a0009bad40, 0, fffff8800144f39d, 7}
    Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+bd )
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
    BugCheck D1, {0, 2, 0, fffff88002e5ceba}
    Probably caused by : hardware ( afd!AfdFastConnectionReceive+8a )
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии
    
      My Computer


  4. Posts : 10
    Windows 7 64-bit
    Thread Starter
       #4

    ttran said:
    please update these drivers:
    Code:
    SiRemFil SiRemFil.sys Thu Jun 21 02:42:10 2007 (46798312)
    SiWinAcc SiWinAcc.sys Fri Jun 15 07:02:02 2007 (4671D6FA)
    They are Silicon Image drivers



    Tuan
    Found updated drivers (The most recent I could find for both of them are 2008.) But totally unsure how to apply the sys file...

    Removed the sptd file.
      My Computer


  5. Posts : 1,598
    Microsoft Window 7 Professional 32 bit
       #5

    Ok, you good, let's wait until next BSODs ok?
    ~Tuan
      My Computer


  6. Posts : 10
    Windows 7 64-bit
    Thread Starter
       #6

    Another BSOD, not sure if I was able to install SiRemFil.sys & SiWinAcc.sys but heres the dump. I can tell the system's health is much better, it took me more than 11 hours to BSOD than 15 mins. lol Thanks for the help guys.
      My Computer


  7. Posts : 10
    Windows 7 64-bit
    Thread Starter
       #7

    Second quick BSOD nwifi.sys crash
      My Computer


  8. Posts : 28,845
    Win 8 Release candidate 8400
       #8

    vteckickedinyo said:
    Second quick BSOD nwifi.sys crash

    This one was indeed caused by nwifi.sys as you suggested. I would download a fresh copy of the driver and re-install it



    Ken


    Code:
    Built by: 7600.20655.amd64fre.win7_ldr.100226-1909
    Debug session time: Wed Jun 23 23:32:47.434 2010 (GMT-4)
    System Uptime: 0 days 0:11:51.260
    BugCheck 3B, {c0000005, fffff88001e1ffbc, fffff880082f4820, 0}
    Probably caused by : nwifi.sys ( nwifi!Dot11PacketConverterReceivePacket+128 )
    BUGCHECK_STR:  0x3B
    PROCESS_NAME:  firefox.exe
      My Computer


  9. Posts : 10
    Windows 7 64-bit
    Thread Starter
       #9

    2 more BSODs
    Just trying to iron out everything.
      My Computer


  10. Posts : 13,354
    Windows 7 Professional x64
       #10

    Still pointing to network adapter drivers. Did you uninstall and install a fresh copy?

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Jonathan\Desktop\062410-51558-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (3 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.20655.amd64fre.win7_ldr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02c07000 PsLoadedModuleList = 0xfffff800`02e3fe50
    Debug session time: Thu Jun 24 10:34:49.679 2010 (UTC - 4:00)
    System Uptime: 0 days 0:04:40.489
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 0, fffff88001f8966c}
    
    Unable to load image \SystemRoot\system32\DRIVERS\netr28ux.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for netr28ux.sys
    *** ERROR: Module load completed but symbols could not be loaded for netr28ux.sys
    Probably caused by : netr28ux.sys ( netr28ux+8b66c )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001f8966c, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaa0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    netr28ux+8b66c
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  uTorrent.exe
    
    TRAP_FRAME:  fffff88005315800 -- (.trap 0xfffff88005315800)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
     r8=fffff88005315aa0  r9=0000000000000000 r10=fffffa800626af00
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    netr28ux+0x8b66c:
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c6ee69 to fffff80002c6f900
    
    STACK_TEXT:  
    fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
    fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
    fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    netr28ux+8b66c
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  netr28ux+8b66c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: netr28ux
    
    IMAGE_NAME:  netr28ux.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a799052
    
    FAILURE_BUCKET_ID:  X64_0xD1_netr28ux+8b66c
    
    BUCKET_ID:  X64_0xD1_netr28ux+8b66c
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001f8966c, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    netr28ux+8b66c
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  uTorrent.exe
    
    TRAP_FRAME:  fffff88005315800 -- (.trap 0xfffff88005315800)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
     r8=fffff88005315aa0  r9=0000000000000000 r10=fffffa800626af00
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    netr28ux+0x8b66c:
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c6ee69 to fffff80002c6f900
    
    STACK_TEXT:  
    fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
    fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
    fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    netr28ux+8b66c
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  netr28ux+8b66c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: netr28ux
    
    IMAGE_NAME:  netr28ux.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a799052
    
    FAILURE_BUCKET_ID:  X64_0xD1_netr28ux+8b66c
    
    BUCKET_ID:  X64_0xD1_netr28ux+8b66c
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001f8966c, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    netr28ux+8b66c
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  uTorrent.exe
    
    TRAP_FRAME:  fffff88005315800 -- (.trap 0xfffff88005315800)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=000000000003124c
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001f8966c rsp=fffff88005315990 rbp=fffffa8006c8c030
     r8=fffff88005315aa0  r9=0000000000000000 r10=fffffa800626af00
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    netr28ux+0x8b66c:
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax] ds:b060:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c6ee69 to fffff80002c6f900
    
    STACK_TEXT:  
    fffff880`053156b8 fffff800`02c6ee69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`053156c0 fffff800`02c6dae0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`057531a0 : nt!KiBugCheckDispatch+0x69
    fffff880`05315800 fffff880`01f8966c : fffffa80`05e40000 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`05315990 fffffa80`05e40000 : 00000000`00000000 fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 : netr28ux+0x8b66c
    fffff880`05315998 00000000`00000000 : fffffa80`05a1a1e0 00000000`00000001 fffffa80`00000074 fffffa80`05a1a1f0 : 0xfffffa80`05e40000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    netr28ux+8b66c
    fffff880`01f8966c 8b08            mov     ecx,dword ptr [rax]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  netr28ux+8b66c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: netr28ux
    
    IMAGE_NAME:  netr28ux.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a799052
    
    FAILURE_BUCKET_ID:  X64_0xD1_netr28ux+8b66c
    
    BUCKET_ID:  X64_0xD1_netr28ux+8b66c
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmsmn
    start             end                 module name
    fffff880`03f3a000 fffff880`03f78000   1394ohci 1394ohci.sys
    fffff880`00f83000 fffff880`00fda000   ACPI     ACPI.sys    
    fffff880`02cea000 fffff880`02d74000   afd      afd.sys     
    fffff880`03fc1000 fffff880`03fd7000   AgileVpn AgileVpn.sys
    fffff880`03791000 fffff880`037a6000   amdppm   amdppm.sys  
    fffff880`010c2000 fffff880`010cd000   amdxata  amdxata.sys 
    fffff880`0108f000 fffff880`01098000   atapi    atapi.sys   
    fffff880`01098000 fffff880`010c2000   ataport  ataport.SYS 
    fffff880`00e51000 fffff880`00e5d000   BATTC    BATTC.SYS   
    fffff880`01809000 fffff880`01810000   Beep     Beep.SYS    
    fffff880`0375a000 fffff880`0376b000   blbdrive blbdrive.sys
    fffff880`06750000 fffff880`0676e000   bowser   bowser.sys  
    fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll     
    fffff880`019cf000 fffff880`019f9000   cdrom    cdrom.sys   
    fffff880`00d08000 fffff880`00dc8000   CI       CI.dll      
    fffff880`0105f000 fffff880`0108f000   CLASSPNP CLASSPNP.SYS
    fffff880`00caa000 fffff880`00d08000   CLFS     CLFS.SYS    
    fffff880`01464000 fffff880`014d7000   cng      cng.sys     
    fffff880`00e48000 fffff880`00e51000   compbatt compbatt.sys
    fffff880`03fb1000 fffff880`03fc1000   CompositeBus CompositeBus.sys
    fffff880`06671000 fffff880`0667a000   cpuz133_x64 cpuz133_x64.sys
    fffff880`01e0e000 fffff880`01e1c000   crashdmp crashdmp.sys
    fffff880`036b9000 fffff880`0373c000   csc      csc.sys     
    fffff880`0373c000 fffff880`0375a000   dfsc     dfsc.sys    
    fffff880`036aa000 fffff880`036b9000   discache discache.sys
    fffff880`01983000 fffff880`01999000   disk     disk.sys    
    fffff880`04389000 fffff880`043ab000   drmk     drmk.sys    
    fffff880`01e28000 fffff880`01e31000   dump_atapi dump_atapi.sys
    fffff880`01e1c000 fffff880`01e28000   dump_dumpata dump_dumpata.sys
    fffff880`01e31000 fffff880`01e44000   dump_dumpfve dump_dumpfve.sys
    fffff880`043e1000 fffff880`043ed000   Dxapi    Dxapi.sys   
    fffff880`14aa6000 fffff880`14b9a000   dxgkrnl  dxgkrnl.sys 
    fffff880`14b9a000 fffff880`14be0000   dxgmms1  dxgmms1.sys 
    fffff880`036a1000 fffff880`036aa000   EIO64    EIO64.sys   
    fffff880`011a5000 fffff880`011b9000   fileinfo fileinfo.sys
    fffff880`01159000 fffff880`011a5000   fltmgr   fltmgr.sys  
    fffff880`014e8000 fffff880`014f2000   Fs_Rec   Fs_Rec.sys  
    fffff880`01949000 fffff880`01983000   fvevol   fvevol.sys  
    fffff880`01835000 fffff880`0187f000   fwpkclnt fwpkclnt.sys
    fffff800`031de000 fffff800`03227000   hal      hal.dll     
    fffff880`03f16000 fffff880`03f3a000   HDAudBus HDAudBus.sys
    fffff880`042f0000 fffff880`0434c000   HdAudio  HdAudio.sys 
    fffff880`043bf000 fffff880`043d8000   HIDCLASS HIDCLASS.SYS
    fffff880`043d8000 fffff880`043e0080   HIDPARSE HIDPARSE.SYS
    fffff880`043b1000 fffff880`043bf000   hidusb   hidusb.sys  
    fffff880`06688000 fffff880`06750000   HTTP     HTTP.sys    
    fffff880`01940000 fffff880`01949000   hwpolicy hwpolicy.sys
    fffff880`03f84000 fffff880`03fa2000   i8042prt i8042prt.sys
    fffff880`00ddf000 fffff880`00dff000   jraid    jraid.sys   
    fffff880`03fa2000 fffff880`03fb1000   kbdclass kbdclass.sys
    fffff800`00bb3000 fffff800`00bbd000   kdcom    kdcom.dll   
    fffff880`037af000 fffff880`037f2000   ks       ks.sys      
    fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys  
    fffff880`0121a000 fffff880`01245000   ksecpkg  ksecpkg.sys 
    fffff880`043ab000 fffff880`043b0200   ksthunk  ksthunk.sys 
    fffff880`01e88000 fffff880`01e9d000   lltdio   lltdio.sys  
    fffff880`01e44000 fffff880`01e67000   luafv    luafv.sys   
    fffff880`00c89000 fffff880`00c96000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll
    fffff880`01e00000 fffff880`01e0e000   monitor  monitor.sys 
    fffff880`03e9c000 fffff880`03eab000   mouclass mouclass.sys
    fffff880`043ed000 fffff880`043fa000   mouhid   mouhid.sys  
    fffff880`00c2f000 fffff880`00c49000   mountmgr mountmgr.sys
    fffff880`0676e000 fffff880`06786000   mpsdrv   mpsdrv.sys  
    fffff880`06786000 fffff880`067ae000   mrxdav   mrxdav.sys  
    fffff880`067ae000 fffff880`067db000   mrxsmb   mrxsmb.sys  
    fffff880`06600000 fffff880`0664e000   mrxsmb10 mrxsmb10.sys
    fffff880`0664e000 fffff880`06671000   mrxsmb20 mrxsmb20.sys
    fffff880`013e8000 fffff880`013f3000   Msfs     Msfs.SYS    
    fffff880`00fe3000 fffff880`00fed000   msisadrv msisadrv.sys
    fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys   
    fffff880`03696000 fffff880`036a1000   mssmbios mssmbios.sys
    fffff880`01925000 fffff880`01937000   mup      mup.sys     
    fffff880`014f2000 fffff880`015e4000   ndis     ndis.sys    
    fffff880`03e00000 fffff880`03e0c000   ndistapi ndistapi.sys
    fffff880`04200000 fffff880`04213000   ndisuio  ndisuio.sys 
    fffff880`03e0c000 fffff880`03e3b000   ndiswan  ndiswan.sys 
    fffff880`042db000 fffff880`042f0000   NDProxy  NDProxy.SYS 
    fffff880`02c16000 fffff880`02c25000   netbios  netbios.sys 
    fffff880`02d74000 fffff880`02db9000   netbt    netbt.sys   
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS   
    fffff880`01efe000 fffff880`01ff8000   netr28ux netr28ux.sys
    fffff880`00c72000 fffff880`00c83000   Npfs     Npfs.SYS    
    fffff880`0368a000 fffff880`03696000   nsiproxy nsiproxy.sys
    fffff800`02c07000 fffff800`031de000   nt       ntkrnlmp.exe
    fffff880`01245000 fffff880`013e8000   Ntfs     Ntfs.sys    
    fffff880`01800000 fffff880`01809000   Null     Null.SYS    
    fffff880`14aa4000 fffff880`14aa5180   nvBridge nvBridge.kmd
    fffff880`13e36000 fffff880`14aa3c80   nvlddmkm nvlddmkm.sys
    fffff880`00c49000 fffff880`00c72000   nvraid   nvraid.sys  
    fffff880`01e9d000 fffff880`01ef0000   nwifi    nwifi.sys   
    fffff880`02dc2000 fffff880`02de8000   pacer    pacer.sys   
    fffff880`00e33000 fffff880`00e48000   partmgr  partmgr.sys 
    fffff880`06e9c000 fffff880`06ea3000   pbfilter pbfilter.sys
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys     
    fffff880`00dc8000 fffff880`00dcf000   pciide   pciide.sys  
    fffff880`00dcf000 fffff880`00ddf000   PCIIDEX  PCIIDEX.SYS 
    fffff880`014d7000 fffff880`014e8000   pcw      pcw.sys     
    fffff880`06aad000 fffff880`06b53000   peauth   peauth.sys  
    fffff880`0434c000 fffff880`04389000   portcls  portcls.sys 
    fffff880`00c96000 fffff880`00caa000   PSHED    PSHED.dll   
    fffff880`03fd7000 fffff880`03ffb000   rasl2tp  rasl2tp.sys 
    fffff880`03e3b000 fffff880`03e56000   raspppoe raspppoe.sys
    fffff880`03e56000 fffff880`03e77000   raspptp  raspptp.sys 
    fffff880`03e77000 fffff880`03e91000   rassstp  rassstp.sys 
    fffff880`03639000 fffff880`0368a000   rdbss    rdbss.sys   
    fffff880`03e91000 fffff880`03e9c000   rdpbus   rdpbus.sys  
    fffff880`015e4000 fffff880`015ed000   RDPCDD   RDPCDD.sys  
    fffff880`015ed000 fffff880`015f6000   rdpencdd rdpencdd.sys
    fffff880`015f6000 fffff880`015ff000   rdprefmp rdprefmp.sys
    fffff880`018e3000 fffff880`0191d000   rdyboost rdyboost.sys
    fffff880`04213000 fffff880`0422b000   rspndr   rspndr.sys  
    fffff880`00c00000 fffff880`00c2f000   SCSIPORT SCSIPORT.SYS
    fffff880`06b53000 fffff880`06b5e000   secdrv   secdrv.SYS  
    fffff880`03f78000 fffff880`03f84000   serenum  serenum.sys 
    fffff880`02c25000 fffff880`02c42000   serial   serial.sys  
    fffff880`0191d000 fffff880`01925000   SiRemFil SiRemFil.sys
    fffff880`011b9000 fffff880`011c3000   SiWinAcc SiWinAcc.sys
    fffff880`018db000 fffff880`018e3000   spldr    spldr.sys   
    fffff880`06ea3000 fffff880`06f14000   spsys    spsys.sys   
    fffff880`06e04000 fffff880`06e9c000   srv      srv.sys     
    fffff880`06a00000 fffff880`06a69000   srv2     srv2.sys    
    fffff880`06b5e000 fffff880`06b8b000   srvnet   srvnet.sys  
    fffff880`010f7000 fffff880`01159000   storport storport.sys
    fffff880`03eab000 fffff880`03eac480   swenum   swenum.sys  
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys   
    fffff880`06b8b000 fffff880`06b9d000   tcpipreg tcpipreg.sys
    fffff880`02cdd000 fffff880`02cea000   TDI      TDI.SYS     
    fffff880`02cbf000 fffff880`02cdd000   tdx      tdx.sys     
    fffff880`03625000 fffff880`03639000   termdd   termdd.sys  
    fffff960`005f0000 fffff960`005fa000   TSDDD    TSDDD.dll   
    fffff880`0376b000 fffff880`03791000   tunnel   tunnel.sys  
    fffff880`14beb000 fffff880`14bfd000   umbus    umbus.sys   
    fffff880`03ead000 fffff880`03eaef00   USBD     USBD.SYS    
    fffff880`03f05000 fffff880`03f16000   usbehci  usbehci.sys 
    fffff880`04281000 fffff880`042db000   usbhub   usbhub.sys  
    fffff880`14be0000 fffff880`14beb000   usbohci  usbohci.sys 
    fffff880`03eaf000 fffff880`03f05000   USBPORT  USBPORT.SYS 
    fffff880`13e1d000 fffff880`13e2c000   usbrpm   usbrpm.sys  
    fffff880`00fed000 fffff880`00ffa000   vdrvroot vdrvroot.sys
    fffff880`01810000 fffff880`0181e000   vga      vga.sys     
    fffff880`011cd000 fffff880`011f2000   VIDEOPRT VIDEOPRT.SYS
    fffff880`0187f000 fffff880`0188f000   vmstorfl vmstorfl.sys
    fffff880`00e5d000 fffff880`00e72000   volmgr   volmgr.sys  
    fffff880`00e72000 fffff880`00ece000   volmgrx  volmgrx.sys 
    fffff880`0188f000 fffff880`018db000   volsnap  volsnap.sys 
    fffff880`04245000 fffff880`04281000   vpchbus  vpchbus.sys 
    fffff880`02de8000 fffff880`02dfc000   vpcnfltr vpcnfltr.sys
    fffff880`13e00000 fffff880`13e1d000   vpcusb   vpcusb.sys  
    fffff880`02c5d000 fffff880`02cb3180   vpcvmm   vpcvmm.sys  
    fffff880`010cd000 fffff880`010f7000   vsmraid  vsmraid.sys 
    fffff880`02c00000 fffff880`02c16000   vwififlt vwififlt.sys
    fffff880`02c42000 fffff880`02c5d000   wanarp   wanarp.sys  
    fffff880`0181e000 fffff880`0182e000   watchdog watchdog.sys
    fffff880`00ed0000 fffff880`00f74000   Wdf01000 Wdf01000.sys
    fffff880`00f74000 fffff880`00f83000   WDFLDR   WDFLDR.SYS  
    fffff880`02db9000 fffff880`02dc2000   wfplwf   wfplwf.sys  
    fffff960`000b0000 fffff960`003bf000   win32k   win32k.sys  
    fffff880`037a6000 fffff880`037af000   wmiacpi  wmiacpi.sys 
    fffff880`00fda000 fffff880`00fe3000   WMILIB   WMILIB.SYS  
    fffff880`01e67000 fffff880`01e88000   WudfPf   WudfPf.sys  
    fffff880`011c3000 fffff880`011cd000   xfiltx64 xfiltx64.sys
    
    Unloaded modules:
    fffff880`01999000 fffff880`019a7000   crashdmp.sys
    fffff880`019a7000 fffff880`019b3000   dump_ataport
    fffff880`019b3000 fffff880`019bc000   dump_atapi.s
    fffff880`019bc000 fffff880`019cf000   dump_dumpfve
    fffff880`01937000 fffff880`01940000   johci.sys
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd
All times are GMT -5. The time now is 20:37.
Find Us