Update:
nusb3hub.sys Fri Nov 20 05:15:57 2009
NEC USB 3.0 Hub - motherboard driver
Remove Daemon Tools:
sptd.sys Sun Oct 11 16:55:14 2009
DuplexSecure - FAQ
If bsod's do not stop after the above fixes,
1) Uninstall Eset.
2) Ensure that RAM is set right in the BIOS according to its officially recommended specs. You can view its current voltage and timings with CPU-Z.
3) Run memtest overnight:
RAM - Test with Memtest86+
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121310-16520-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c57000 PsLoadedModuleList = 0xfffff800`02e94e50
Debug session time: Mon Dec 13 13:09:51.294 2010 (UTC - 5:00)
System Uptime: 0 days 2:13:42.684
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffda8005237ff0, 2, 1, fffff80002ccb7b4}
Probably caused by : win32k.sys ( win32k!SetWakeBit+f8 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffda8005237ff0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ccb7b4, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eff0e0
ffffda8005237ff0
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSetEvent+124
fffff800`02ccb7b4 48894108 mov qword ptr [rcx+8],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff880039e4870 -- (.trap 0xfffff880039e4870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005237fe8 rbx=0000000000000000 rcx=ffffda8005237fe8
rdx=fffffa8001bde458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ccb7b4 rsp=fffff880039e4a00 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffffffffffffef
r11=0000000000021114 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KeSetEvent+0x124:
fffff800`02ccb7b4 48894108 mov qword ptr [rcx+8],rax ds:ffffda80`05237ff0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc6ca9 to fffff80002cc7740
STACK_TEXT:
fffff880`039e4728 fffff800`02cc6ca9 : 00000000`0000000a ffffda80`05237ff0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`039e4730 fffff800`02cc5920 : 00000000`00000004 fffffa80`05237fe0 fffffa80`046f13a0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`039e4870 fffff800`02ccb7b4 : 00000000`40df0088 00000000`00000000 00000000`00010001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`039e4a00 fffff960`0019b578 : 00000000`00000000 fffff960`00000002 00000000`00000000 ffffda80`05237fe8 : nt!KeSetEvent+0x124
fffff880`039e4a70 fffff960`00192f33 : fffff900`c00cc280 00000000`00000001 00000000`00000004 fffff800`02cd31e3 : win32k!SetWakeBit+0xf8
fffff880`039e4aa0 fffff960`00193954 : 00000000`00000000 fffff960`003afa90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x157
fffff880`039e4af0 fffff960`00124708 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`8000031c : win32k!RawInputThread+0x9b4
fffff880`039e4bc0 fffff960`001a429a : fffffa80`00000002 fffff880`02139f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`039e4bf0 fffff800`02cc6993 : fffffa80`046f12e0 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`039e4c20 000007fe`fd333d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01bbf9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd333d3a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SetWakeBit+f8
fffff960`0019b578 488b5c2430 mov rbx,qword ptr [rsp+30h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32k!SetWakeBit+f8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
FAILURE_BUCKET_ID: X64_0xA_win32k!SetWakeBit+f8
BUCKET_ID: X64_0xA_win32k!SetWakeBit+f8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121510-16052-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
Debug session time: Wed Dec 15 14:12:35.040 2010 (UTC - 5:00)
System Uptime: 0 days 3:20:52.068
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffda800542652c, 2, 0, fffff880016079eb}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffda800542652c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880016079eb, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb30e0
ffffda800542652c
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!KfdClassify+76e
fffff880`016079eb 458b422c mov r8d,dword ptr [r10+2Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88003361ab0 -- (.trap 0xfffff88003361ab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff88003361d98
rdx=fffffa8001b14cd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880016079eb rsp=fffff88003361c40 rbp=fffff880033621b0
r8=0000000000000000 r9=0000000000000001 r10=ffffda8005426500
r11=fffffa8001b14cb0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
NETIO!KfdClassify+0x76e:
fffff880`016079eb 458b422c mov r8d,dword ptr [r10+2Ch] ds:0001:ffffda80`0542652c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c7aca9 to fffff80002c7b740
STACK_TEXT:
fffff880`03361968 fffff800`02c7aca9 : 00000000`0000000a ffffda80`0542652c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03361970 fffff800`02c79920 : 00000000`00000000 fffff880`03361d98 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03361ab0 fffff880`016079eb : 00000000`00000000 fffff880`033621b0 fffff880`03362070 fffff880`03362070 : nt!KiPageFault+0x260
fffff880`03361c40 fffff880`0163fa84 : fffff880`033623f8 fffff880`03362120 fffffa80`00000001 fffff880`03362020 : NETIO!KfdClassify+0x76e
fffff880`03361fb0 fffff880`0163fef8 : fffffa80`0219d2c0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`033620d0 fffff880`016402a9 : fffffa80`0219d200 fffffa80`02898960 fffffa80`01eeb000 fffff880`010398a2 : NETIO!StreamCommonInspect+0x228
fffff880`033623b0 fffff880`01908af8 : fffffa80`0219d2c0 fffff880`03362700 fffffa80`01eeb030 fffffa80`02727fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`03362430 fffff880`01933131 : fffffa80`023006f0 fffff880`03362760 00000000`0000002a fffff880`03362760 : tcpip!InetInspectReceive+0x48
fffff880`03362470 fffff880`018bb830 : 00000000`81cc1f3d fffffa80`023006f0 fffffa80`01eeb030 fffffa80`01eeb030 : tcpip!TcpInspectReceive+0x71
fffff880`033624c0 fffff880`01878e95 : 00000000`00000014 fffff880`00000000 fffffa80`04a5b6c0 fffffa80`0219d2c0 : tcpip! ?? ::FNODOBFM::`string'+0x3cab5
fffff880`03362680 fffff880`0187d86a : fffffa80`028aef00 00000000`00000000 fffffa80`0271c448 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff880`03362830 fffff880`0187d3b7 : fffffa80`031effd0 fffffa80`04a5b6c0 00000000`00000000 fffff880`01860700 : tcpip!TcpMatchReceive+0x1fa
fffff880`03362980 fffff880`0185f6c7 : fffffa80`04a5d8d7 fffffa80`028bd9d7 fffffa80`028ad8d7 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`03362a30 fffff880`0185f799 : fffff880`03362bb0 fffff880`0196d9a0 fffff880`03362bc0 00000000`00000001 : tcpip!IppDeliverListToProtocol+0x97
fffff880`03362af0 fffff880`0185fc90 : 00000000`00000000 fffff800`02c82992 00000000`00000000 fffff880`03362bb0 : tcpip!IppProcessDeliverList+0x59
fffff880`03362b60 fffff880`018367c2 : fffffa80`018dfb60 fffff880`00c4077d 00000000`00000000 fffffa80`026fe040 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`03362c40 fffff800`02f77c43 : fffffa80`026fe040 fffff800`02e205f8 fffffa80`018dfb60 fffffa80`027539e0 : tcpip!IppLoopbackTransmit+0x72
fffff880`03362c80 fffff800`02c88961 : fffff800`02e20500 fffff800`02f77c20 fffffa80`018dfb60 fffff800`02e205f8 : nt!IopProcessWorkItem+0x23
fffff880`03362cb0 fffff800`02f1fc06 : 00000000`00000000 fffffa80`018dfb60 00000000`00000080 fffffa80`018aa890 : nt!ExpWorkerThread+0x111
fffff880`03362d40 fffff800`02c59c26 : fffff880`0328e180 fffffa80`018dfb60 fffff880`03299040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03362d80 00000000`00000000 : fffff880`03363000 fffff880`0335d000 fffff880`033629f0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!KfdClassify+76e
fffff880`016079eb 458b422c mov r8d,dword ptr [r10+2Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!KfdClassify+76e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!KfdClassify+76e
BUCKET_ID: X64_0xD1_NETIO!KfdClassify+76e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121810-15475-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c66000 PsLoadedModuleList = 0xfffff800`02ea3e50
Debug session time: Sat Dec 18 12:56:26.580 2010 (UTC - 5:00)
System Uptime: 0 days 2:25:17.969
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffda8003398290, 2, 0, fffff80002ce31dc}
Probably caused by : win32k.sys ( win32k!TimersProc+197 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffda8003398290, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ce31dc, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0e0e0
ffffda8003398290
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertTimerTable+1cc
fffff800`02ce31dc 4c3b78f8 cmp r15,qword ptr [rax-8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff8800212c7e0 -- (.trap 0xfffff8800212c7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8003398298 rbx=0000000000000000 rcx=fffffa800339c298
rdx=fffffa8003396298 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ce31dc rsp=fffff8800212c970 rbp=fffffa8003396298
r8=ffffffffffffffff r9=0000000000000013 r10=fffff80002e50e80
r11=fffff8800212c900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiInsertTimerTable+0x1cc:
fffff800`02ce31dc 4c3b78f8 cmp r15,qword ptr [rax-8] ds:dc40:ffffda80`03398290=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd5ca9 to fffff80002cd6740
STACK_TEXT:
fffff880`0212c698 fffff800`02cd5ca9 : 00000000`0000000a ffffda80`03398290 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0212c6a0 fffff800`02cd4920 : fffff800`02ce2b25 fffffa80`0464b160 fffff880`03163180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0212c7e0 fffff800`02ce31dc : 00000000`00200202 fffff800`02cdb1fa fffff880`031d3180 fffffa80`05749060 : nt!KiPageFault+0x260
fffff880`0212c970 fffff800`02ce2de0 : ffffffff`ffbf9ba0 fffff800`02e50e80 fffffa80`0464b160 00000000`00000000 : nt!KiInsertTimerTable+0x1cc
fffff880`0212c9d0 fffff800`02ce2ce4 : fffff900`c013dc40 ffffffff`ffbf9ba0 00000000`00000000 fffff960`00000002 : nt!KiSetTimerEx+0xf0
fffff880`0212ca60 fffff960`000f2eb3 : fffff900`c013dc40 00000000`00000001 00000000`00000004 fffff800`02ce21e3 : nt!KeSetTimer+0x14
fffff880`0212caa0 fffff960`000f3894 : 00000000`00000000 fffff960`00310a90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x197
fffff880`0212caf0 fffff960`00084528 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 00000000`00000000 : win32k!RawInputThread+0x9b4
fffff880`0212cbc0 fffff960`0010409a : fffffa80`00000002 fffff880`02111f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`0212cbf0 fffff800`02cd5993 : fffffa80`04658990 00000000`00000004 000007ff`fffae000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`0212cc20 000007fe`fda83d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0033f9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fda83d3a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!TimersProc+197
fffff960`000f2eb3 488b5c2450 mov rbx,qword ptr [rsp+50h]
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!TimersProc+197
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cbe5d3e
FAILURE_BUCKET_ID: X64_0xA_win32k!TimersProc+197
BUCKET_ID: X64_0xA_win32k!TimersProc+197
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
fffff880`045b2000 fffff880`045f0000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00e2f000 fffff880`00e86000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04235000 fffff880`042bf000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02e9c000 fffff880`02eb2000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`02e0e000 fffff880`02e53000 ajjjwb2r ajjjwb2r.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`0451a000 fffff880`0452f000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`011d9000 fffff880`011ed000 amdsata amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`01062000 fffff880`0106d000 amdxata amdxata.sys Wed Oct 07 16:13:10 2009 (4ACCF656)
fffff880`044ec000 fffff880`044f4000 AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
fffff880`07671000 fffff880`0767c000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`0119b000 fffff880`011a4000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011a4000 fffff880`011ce000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01b61000 fffff880`01b69000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486)
fffff880`010ed000 fffff880`010f9000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`01bdb000 fffff880`01be2000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`044db000 fffff880`044ec000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02af9000 fffff880`02b17000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00770000 fffff960`00797000 cdd cdd.dll unavailable (00000000)
fffff880`01ba8000 fffff880`01bd2000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c85000 fffff880`00d45000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01b31000 fffff880`01b61000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c27000 fffff880`00c85000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012d5000 fffff880`01348000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`010e4000 fffff880`010ed000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`02e8c000 fffff880`02e9c000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0614b000 fffff880`06159000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0443a000 fffff880`044bd000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`044bd000 fffff880`044db000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04200000 fffff880`0420f000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01b1b000 fffff880`01b31000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`06123000 fffff880`06145000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06163000 fffff880`06177000 dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`06159000 fffff880`06163000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`06177000 fffff880`0618a000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0618a000 fffff880`06196000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`046e5000 fffff880`047d9000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04600000 fffff880`04646000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`05a78000 fffff880`05b4f000 eamonm eamonm.sys Wed Jul 14 04:13:43 2010 (4C3D71B7)
fffff880`01a00000 fffff880`01a25000 ehdrv ehdrv.sys Wed Jul 14 04:14:21 2010 (4C3D71DD)
fffff880`02bcd000 fffff880`02bee000 epfwwfpr epfwwfpr.sys Wed Jul 14 04:10:34 2010 (4C3D70FA)
fffff880`01263000 fffff880`01277000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01217000 fffff880`01263000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01411000 fffff880`0141b000 Fs_Rec Fs_Rec.sys unavailable (00000000)
fffff880`01ae1000 fffff880`01b1b000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0179e000 fffff880`017e8000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`077b0000 fffff880`077b9000 gdrv gdrv.sys Thu Mar 12 23:22:29 2009 (49B9D175)
fffff880`047d9000 fffff880`047e6000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02c1d000 fffff800`02c66000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0458e000 fffff880`045b2000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`061c1000 fffff880`061da000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`061da000 fffff880`061e2080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`061b3000 fffff880`061c1000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02a31000 fffff880`02af9000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01612000 fffff880`0161b000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02e5f000 fffff880`02e7d000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02f72000 fffff880`02f81000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061e3000 fffff880`061f1000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba1000 fffff800`00bab000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`02f83000 fffff880`02fc6000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`015dd000 fffff880`015f7000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01773000 fffff880`0179e000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`06145000 fffff880`0614a200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05e44000 fffff880`05e59000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05e00000 fffff880`05e23000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c06000 fffff880`00c13000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`061f1000 fffff880`061ff000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`02e7d000 fffff880`02e8c000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`01181000 fffff880`0119b000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b17000 fffff880`02b2f000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02b2f000 fffff880`02b5c000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02b5c000 fffff880`02baa000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`02baa000 fffff880`02bcd000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`011ce000 fffff880`011d9000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01a83000 fffff880`01a8e000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e86000 fffff880`00e90000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01277000 fffff880`012d5000 msrpc msrpc.sys unavailable (00000000)
fffff880`043eb000 fffff880`043f6000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01600000 fffff880`01612000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01621000 fffff880`01713000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02ed6000 fffff880`02ee2000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02ee2000 fffff880`02f11000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05a63000 fffff880`05a78000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04333000 fffff880`04342000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`042bf000 fffff880`04304000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01713000 fffff880`01773000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01a8e000 fffff880`01a9f000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`043df000 fffff880`043eb000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c66000 fffff800`03242000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0143a000 fffff880`015dd000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01bd2000 fffff880`01bdb000 Null Null.SYS unavailable (00000000)
fffff880`02fd8000 fffff880`02fef000 nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
fffff880`04646000 fffff880`04676000 nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
fffff880`055ec000 fffff880`055ed180 nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`04a12000 fffff880`055eba80 nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`0430d000 fffff880`04333000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`010cf000 fffff880`010e4000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`0109c000 fffff880`010cf000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0116a000 fffff880`01171000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`01171000 fffff880`01181000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01400000 fffff880`01411000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05b4f000 fffff880`05bf5000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`060e6000 fffff880`06123000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c13000 fffff880`00c27000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02eb2000 fffff880`02ed6000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`02f11000 fffff880`02f2c000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02f2c000 fffff880`02f4d000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02f4d000 fffff880`02f67000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0438e000 fffff880`043df000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02f67000 fffff880`02f72000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01a68000 fffff880`01a71000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a71000 fffff880`01a7a000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a7a000 fffff880`01a83000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01394000 fffff880`013ce000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05e59000 fffff880`05e71000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04685000 fffff880`046dc000 Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`05eac000 fffff880`060e5080 RTKVHD64 RTKVHD64.sys Tue Apr 06 06:17:30 2010 (4BBB0A3A)
fffff880`00e00000 fffff880`00e2f000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`02bee000 fffff880`02bf9000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`02e53000 fffff880`02e5f000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04342000 fffff880`0435f000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017f8000 fffff880`01800000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`00eb8000 fffff880`00fde000 sptd sptd.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`0771a000 fffff880`077b0000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`076b3000 fffff880`0771a000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`02a00000 fffff880`02a2d000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`01000000 fffff880`01062000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`02f81000 fffff880`02f82480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05e71000 fffff880`05e83000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01abd000 fffff880`01aca000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01a9f000 fffff880`01abd000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`0437a000 fffff880`0438e000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004d0000 fffff960`004da000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`044f4000 fffff880`0451a000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`02fc6000 fffff880`02fd8000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06196000 fffff880`061b3000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04676000 fffff880`04677f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`055ee000 fffff880`055ff000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04678000 fffff880`04685000 usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`05a09000 fffff880`05a63000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`047e6000 fffff880`047f1000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04538000 fffff880`0458e000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e90000 fffff880`00e9d000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01a25000 fffff880`01a33000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01a33000 fffff880`01a58000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017e8000 fffff880`017f8000 vmstorfl vmstorfl.sys unavailable (00000000)
fffff880`010f9000 fffff880`0110e000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0110e000 fffff880`0116a000 volmgrx volmgrx.sys unavailable (00000000)
fffff880`01348000 fffff880`01394000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0435f000 fffff880`0437a000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01a58000 fffff880`01a68000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d45000 fffff880`00de9000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de9000 fffff880`00df8000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04304000 fffff880`0430d000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00030000 fffff960`00340000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`0452f000 fffff880`04538000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fde000 fffff880`00fe7000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05e23000 fffff880`05e44000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`07600000 fffff880`07671000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01b69000 fffff880`01b77000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01b77000 fffff880`01b81000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`01b81000 fffff880`01b95000 dump_amdsata
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00014000
fffff880`01b95000 fffff880`01ba8000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000