I'm having a lot of BOSD's


  1. Posts : 2
    windows 7 ultimate x64
       #1

    I'm having a lot of BOSD's


    Hi guys,
    I'm having issues with my windows 7 x64. A lot o BOSD's and since I'm a newbie I can't figure it out. I took your advice and used memtest for about 12 hours (7 passes) with no errors. Can you please help ?
    I've attached two minidumps.

    Thank you for your time and consideration.
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    saphta said:
    Hi guys,
    I'm having issues with my windows 7 x64. A lot o BOSD's and since I'm a newbie I can't figure it out. I took your advice and used memtest for about 12 hours (7 passes) with no errors. Can you please help ?
    I've attached two minidumps.

    Thank you for your time and consideration.
    Your .dmp file shows a stop error of 0x124 which is a general hardware error .. A "stop 0x124" is fundamentally different to many other types of bluescreens because it stems from a hardware complaint. Stop 0x124 minidumps contain very little practical information, and it is therefore necessary to approach the problem as a case of hardware in an unknown state of distress. You can read more on this error and what to try here... Stop 0x124 - what it means and what to try Stop 0x124 - what it means and what to try

    Thanks


    Ken
      My Computer


  3. Posts : 2
    windows 7 ultimate x64
    Thread Starter
       #3

    Thank you for your answer ! I overclocked it from 2.8 to 3.3GHz (found how on youtube) but now I updated the BIOS and went on default settings. It is still happening....
    Can you please help ?
    Thank you and have a Happy New Year !!
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    Please read this tutorial and follow the instructions. Upload all of the files generated. This will help us to help you better.

    https://www.sevenforums.com/crashes-d...tructions.html

    While you are troubleshooting, I suggest that you uninstall Eset using this removal tool:
    Tool. Your version of Eset is know to cause BSOD's on some Win 7 systems. Once you get your system stable, you can try Eset agaion; but I recommend the latest version. Download and install Microsoft Security Essentials in it place and make sure Windows Firewall is turned on.

    I looked at your latest dumps and none are error code 124.
    Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

    Error code 3B (2X), SYSTEM_SERVICE_EXCEPTION. Usual causes: System service, Device driver, graphics driver, ?memory.

    Error code BE, ATTEMPTED_WRITE_TO_READONLY_MEMORY. Usual causes: Device driver, Memory.

    Follow the instructions in the tutorial above, upload the files to us, uninstall Eset, reboot and see how your systems does.
    Code:
    indows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`03815000 PsLoadedModuleList = 0xfffff800`03a52e50
    Debug session time: Wed Dec 29 06:16:56.391 2010 (GMT-5)
    System Uptime: 0 days 12:14:30.687
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {0, 0, 0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: 0000000000000000, The exception code that was not handled
    Arg2: 0000000000000000, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
    
    FAULTING_IP: 
    +5932952f007edd34
    00000000`00000000 ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  0000000000000000
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  WinRAR.exe
    
    CURRENT_IRQL:  2
    
    EXCEPTION_RECORD:  fffff880030d35d8 -- (.exr 0xfffff880030d35d8)
    ExceptionAddress: fffff80003890e39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff880030d3680 -- (.trap 0xfffff880030d3680)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8006366d08 rbx=0000000000000000 rcx=f7fffa8006366d08
    rdx=fffff880030a8700 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003890e39 rsp=fffff880030d3810 rbp=fffffa8006360468
     r8=fffffa800871ec00  r9=0000000000000008 r10=fffff80003815000
    r11=fffff880030d37e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiProcessExpiredTimerList+0x129:
    fffff800`03890e39 48894108        mov     qword ptr [rcx+8],rax ds:f7fffa80`06366d10=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000387d46e to fffff80003885710
    
    STACK_TEXT:  
    fffff880`030d26c8 fffff800`0387d46e : fffffa80`08840630 fffffa80`08930ac8 fffff880`030d2e40 fffff800`038b2668 : nt!KeBugCheck
    fffff880`030d26d0 fffff800`038ab40d : fffff800`03a93b7c fffff800`039cde84 fffff800`03815000 fffff880`030d35d8 : nt!KiKernelCalloutExceptionHandler+0xe
    fffff880`030d2700 fffff800`038b2a90 : fffff800`039d4a40 fffff880`030d2778 fffff880`030d35d8 fffff800`03815000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`030d2730 fffff800`038bf9ef : fffff880`030d35d8 fffff880`030d2e40 fffff880`00000000 fffffa80`06366d00 : nt!RtlDispatchException+0x410
    fffff880`030d2e10 fffff800`03884d82 : fffff880`030d35d8 fffffa80`06360468 fffff880`030d3680 00000000`00000000 : nt!KiDispatchException+0x16f
    fffff880`030d34a0 fffff800`0388368a : 00000000`00000005 00000000`00433f05 fffffa80`00433f05 fffff880`0164808f : nt!KiExceptionDispatch+0xc2
    fffff880`030d3680 fffff800`03890e39 : fffffa80`0871ec20 fffffa80`0871ec68 fffffa80`0871ec68 fffffa80`06360400 : nt!KiGeneralProtectionFault+0x10a
    fffff880`030d3810 fffff800`038914be : 00000066`9c2d360e fffff880`030d3e88 00000000`002b1b41 fffff880`030a6da8 : nt!KiProcessExpiredTimerList+0x129
    fffff880`030d3e60 fffff800`03890cb7 : fffff880`030a41c2 fffffa80`002b1b41 00000000`00000000 00000000`00000041 : nt!KiTimerExpiration+0x1be
    fffff880`030d3f00 fffff800`0388b865 : 0000058a`00000000 fffffa80`06518b60 00000000`00000000 fffff800`0393e230 : nt!KiRetireDpcList+0x277
    fffff880`030d3fb0 fffff800`0388b67c : fffff880`030a4180 fffff800`03892618 00000000`00000000 fffff880`07544c28 : nt!KxRetireDpcList+0x5
    fffff880`07544be0 fffff800`038cf113 : fffff800`038923ac fffff800`03892418 00000000`00009ca5 fffff880`07544ca0 : nt!KiDispatchInterruptContinue
    fffff880`07544c10 fffff800`03892418 : 00000000`00009ca5 fffff880`07544ca0 00000000`00190750 00000000`00008000 : nt!KiDpcInterruptBypass+0x13
    fffff880`07544c20 00000001`3fdca952 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8
    00000000`06b4f9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1`3fdca952
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiKernelCalloutExceptionHandler+e
    fffff800`0387d46e 90              nop
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
    
    BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
    
    Followup: MachineOwner
    ---------
    
    System Uptime: 0 days 0:52:39.315
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff80003b96cc4, fffff88003bbc030, 0}
    
    Probably caused by : hardware ( nt!IopXxxControlFile+bc1 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80003b96cc4, Address of the exception record for the exception that caused the bugcheck
    Arg3: fffff88003bbc030, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IopXxxControlFile+bc1
    fffff800`03b96cc4 ff4181          inc     dword ptr [rcx-7Fh]
    
    CONTEXT:  fffff88003bbc030 -- (.cxr 0xfffff88003bbc030)
    rax=fffffa8008e90b60 rbx=fffffa80072d3c40 rcx=0000000008547b00
    rdx=0000057ffbe7f7f8 rsi=fffffa8008547bd8 rdi=fffffa8008547ac0
    rip=fffff80003b96cc4 rsp=fffff88003bbca08 rbp=fffff88003bbcca0
     r8=0000000000000000  r9=0000000000000000 r10=fffff880009b2ca0
    r11=fffffa8007d70680 r12=0000000000000008 r13=0000000000000001
    r14=0000000000000001 r15=fffffa8008901da0
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!IopXxxControlFile+0xbc1:
    fffff800`03b96cc4 ff4181          inc     dword ptr [rcx-7Fh] ds:002b:00000000`08547a81=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  HWMonitor 1.17
    
    CURRENT_IRQL:  0
    
    MISALIGNED_IP: 
    nt!IopXxxControlFile+bc1
    fffff800`03b96cc4 ff4181          inc     dword ptr [rcx-7Fh]
    
    LAST_CONTROL_TRANSFER:  from fffffa8008e90b60 to fffff80003b96cc4
    
    STACK_TEXT:  
    fffff880`03bbca08 fffffa80`08e90b60 : fffff800`03b96f66 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xbc1
    fffff880`03bbcb38 fffff800`03b96f66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`08e90b60
    fffff880`03bbcb40 fffff800`0387a993 : 00000000`73682450 00000000`0098f170 00000000`0098fd20 fffff880`03bbcc20 : nt!NtDeviceIoControlFile+0x56
    fffff880`03bbcbb0 00000000`73682dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0098f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73682dd9
    
    
    FOLLOWUP_IP: 
    nt!IopXxxControlFile+bc1
    fffff800`03b96cc4 ff4181          inc     dword ptr [rcx-7Fh]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!IopXxxControlFile+bc1
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    STACK_COMMAND:  .cxr 0xfffff88003bbc030 ; kb
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  X64_IP_MISALIGNED
    
    BUCKET_ID:  X64_IP_MISALIGNED
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Thu Dec 30 03:28:06.166 2010 (GMT-5)
    System Uptime: 0 days 12:55:28.461
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck BE, {fffff960002e0010, 80800001e6074021, fffff8800745cd80, b}
    
    Probably caused by : win32k.sys ( win32k!SpBitBlt+4a3 )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
    An attempt was made to write to readonly memory.  The guilty driver is on the
    stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff960002e0010, Virtual address for the attempted write.
    Arg2: 80800001e6074021, PTE contents.
    Arg3: fffff8800745cd80, (reserved)
    Arg4: 000000000000000b, (reserved)
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xBE
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff8800745cd80 -- (.trap 0xfffff8800745cd80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff900c1e57850 rbx=0000000000000000 rcx=fffff900c1e578b8
    rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff960001e1baf rsp=fffff8800745cf10 rbp=000000000000f0f0
     r8=fffff900c2aae0f8  r9=0000000000000001 r10=fffff8800745d0e0
    r11=fffff8800745cee0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    win32k!SpBitBlt+0x4a3:
    fffff960`001e1baf ff155be40f00    call    qword ptr [win32k!_imp_PsGetCurrentThreadWin32Thread (fffff960`002e0010)] ds:fffff960`002e0010={nt!PsGetCurrentThreadWin32Thread (fffff800`038cb990)}
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000393fae2 to fffff800038bf740
    
    STACK_TEXT:  
    fffff880`0745cc18 fffff800`0393fae2 : 00000000`000000be fffff960`002e0010 80800001`e6074021 fffff880`0745cd80 : nt!KeBugCheckEx
    fffff880`0745cc20 fffff800`038bd82e : 00000000`00000001 00000000`00000000 00000420`00000000 00000436`00000780 : nt! ?? ::FNODOBFM::`string'+0x4237e
    fffff880`0745cd80 fffff960`001e1baf : fffff900`c39c8b10 00000000`00000000 00000000`0000f0f0 fffff900`c1efd018 : nt!KiPageFault+0x16e
    fffff880`0745cf10 fffff960`0005f88d : fffff900`c00cf028 00000000`00000000 00000000`00000000 fffff880`0745d0e0 : win32k!SpBitBlt+0x4a3
    fffff880`0745d300 fffff960`0005f474 : 00000000`00000000 00000000`00f00021 fffff880`0745d550 fffff900`0000f0f0 : win32k!GrePatBltLockedDC+0x2f9
    fffff880`0745d3b0 fffff960`0005f144 : fffff880`0745d550 fffff800`038cb772 fffff880`0745d5a0 00000000`00000000 : win32k!GrePolyPatBltInternal+0x2ec
    fffff880`0745d500 fffff960`0005f0c3 : fffff900`c0805390 fffff900`c0805390 00000000`01100073 fffff960`0023b192 : win32k!GrePolyPatBlt+0x74
    fffff880`0745d570 fffff960`00147035 : fffff900`c0805390 00000000`01100073 00000000`00000000 fffff900`c0805390 : win32k!FillRect+0x63
    fffff880`0745d5d0 fffff960`00146f5d : 00000000`00000000 fffff900`c0805390 00000000`01100073 ffffffff`f6011c8d : win32k!xxxPaintRect+0xb5
    fffff880`0745d600 fffff960`00196e18 : 00000000`00000000 fffff900`c0805390 ffffffff`f6011c8d fffff800`03bd8500 : win32k!xxxFillWindow+0x9d
    fffff880`0745d660 fffff960`000e9897 : 00000000`00000000 00000000`00000014 00000000`00000000 fffff800`03bb1fd1 : win32k!xxxDWP_EraseBkgnd+0xdc
    fffff880`0745d6b0 fffff960`000f0a9c : 00000000`00000000 fffff900`c0805390 00000000`00000014 00000000`0001004c : win32k!xxxRealDefWindowProc+0x507
    fffff880`0745d8c0 fffff960`000e2be7 : fffff900`c0805390 00000000`0000029e 00000000`00000014 fffffa80`087dbb60 : win32k!xxxWrapRealDefWindowProc+0x3c
    fffff880`0745d8f0 fffff960`000effbe : 00000000`0001004c 00000000`00000014 fffffa80`0867d060 00000000`00000000 : win32k!NtUserfnNCDESTROY+0x27
    fffff880`0745d930 fffff800`038be993 : fffffa80`087dbb60 fffff880`0745daa0 00000000`02f8d8a8 00000000`0001004c : win32k!NtUserMessageCall+0x132
    fffff880`0745d9b0 00000000`778ba08a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`02f8d888 fffff800`038b7080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778ba08a
    fffff880`0745de10 fffff880`0745de28 : fffff880`0745e178 00000000`00000000 fffff960`00000018 00000000`00000002 : nt!KiCallUserMode
    fffff880`0745de18 fffff880`0745e178 : 00000000`00000000 fffff960`00000018 00000000`00000002 fffff880`0745e4f0 : 0xfffff880`0745de28
    fffff880`0745de20 00000000`00000000 : fffff960`00000018 00000000`00000002 fffff880`0745e4f0 00000000`00000000 : 0xfffff880`0745e178
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!SpBitBlt+4a3
    fffff960`001e1baf ff155be40f00    call    qword ptr [win32k!_imp_PsGetCurrentThreadWin32Thread (fffff960`002e0010)]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  win32k!SpBitBlt+4a3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c7dc13c
    
    FAILURE_BUCKET_ID:  X64_0xBE_win32k!SpBitBlt+4a3
    
    BUCKET_ID:  X64_0xBE_win32k!SpBitBlt+4a3
    
    Followup: MachineOwner
    ---------
    
    4: kd> lmtsmn
    start             end                 module name
    fffff880`02d9d000 fffff880`02ddb000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00f15000 fffff880`00f6c000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02c3f000 fffff880`02cc9000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02ddb000 fffff880`02df1000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03faa000 fffff880`03fbf000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00db6000 fffff880`00dca000   amdsata  amdsata.sys  Wed Oct 07 16:13:09 2009 (4ACCF655)
    fffff880`01075000 fffff880`01080000   amdxata  amdxata.sys  Wed Oct 07 16:13:10 2009 (4ACCF656)
    fffff880`072ad000 fffff880`072de000   AODDriver2 AODDriver2.sys Wed May 05 00:03:12 2010 (4BE0EE00)
    fffff880`00d83000 fffff880`00d8c000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00d8c000 fffff880`00db6000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`048f5000 fffff880`05106000   atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
    fffff880`03e00000 fffff880`03e4c000   atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
    fffff880`01931000 fffff880`01939000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
    fffff880`019ab000 fffff880`019b2000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`03f73000 fffff880`03f84000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`06bdf000 fffff880`06bfd000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`007c0000 fffff960`007e7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`073bf000 fffff880`073dc000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`01978000 fffff880`019a2000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03c1e000 fffff880`03dc1000   cfosspeed6 cfosspeed6.sys Tue Dec 21 10:26:50 2010 (4D10C73A)
    fffff880`00ca9000 fffff880`00d69000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01901000 fffff880`01931000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c4b000 fffff880`00ca9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01149000 fffff880`011bc000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`03ebe000 fffff880`03ece000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`073dc000 fffff880`073e5000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
    fffff880`0734f000 fffff880`07357000   cpuz_x64 cpuz_x64.sys Tue Dec 02 08:51:19 2008 (49353D57)
    fffff880`06ae2000 fffff880`06af0000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03ed2000 fffff880`03f55000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03f55000 fffff880`03f73000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02d8e000 fffff880`02d9d000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`018eb000 fffff880`01901000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`057d5000 fffff880`057f7000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06afa000 fffff880`06b0e000   dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
    fffff880`06b2b000 fffff880`06b3e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06af0000 fffff880`06afa000   dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`06b3e000 fffff880`06b4a000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`05106000 fffff880`051fa000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`04800000 fffff880`04846000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`02ac8000 fffff880`02b9a000   eamon    eamon.sys    Tue Sep 29 06:51:47 2009 (4AC1E6C3)
    fffff880`019b2000 fffff880`019d5000   ehdrv    ehdrv.sys    Tue Sep 29 06:52:21 2009 (4AC1E6E5)
    fffff880`05600000 fffff880`05620000   epfwwfpr epfwwfpr.sys Tue Sep 29 06:47:10 2009 (4AC1E5AE)
    fffff880`010d7000 fffff880`010eb000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0108b000 fffff880`010d7000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013da000 fffff880`013e4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`018b1000 fffff880`018eb000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`03806000 fffff800`0384f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04846000 fffff880`0486a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`06b73000 fffff880`06b8c000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`06b8c000 fffff880`06b94080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`06b65000 fffff880`06b73000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`02a00000 fffff880`02ac8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`018a8000 fffff880`018b1000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`03fc8000 fffff880`03fe6000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03fe6000 fffff880`03ff5000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00ba8000 fffff800`00bb2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`05686000 fffff880`056c9000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013af000 fffff880`013c9000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`015a3000 fffff880`015ce000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`057f7000 fffff880`057fc200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`02bbb000 fffff880`02bd0000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06bbc000 fffff880`06bdf000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00c2a000 fffff880`00c37000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`06bae000 fffff880`06bbc000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`05675000 fffff880`05684000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06ba1000 fffff880`06bae000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00d69000 fffff880`00d83000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`06800000 fffff880`0682d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0682d000 fffff880`0687b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0687b000 fffff880`0689e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01080000 fffff880`0108b000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`015f0000 fffff880`015fb000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f75000 fffff880`00f7f000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010eb000 fffff880`01149000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03c0c000 fffff880`03c17000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01896000 fffff880`018a8000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01451000 fffff880`01543000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02c24000 fffff880`02c30000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`00dca000 fffff880`00df9000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0574c000 fffff880`05761000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`03dc1000 fffff880`03dd0000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02cc9000 fffff880`02d0e000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01543000 fffff880`015a3000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`013e4000 fffff880`013f5000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03c00000 fffff880`03c0c000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0384f000 fffff800`03e2b000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0120c000 fffff880`013af000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019a2000 fffff880`019ab000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`056db000 fffff880`056f2000   nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
    fffff880`0486a000 fffff880`0489a000   nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
    fffff880`02d17000 fffff880`02d3d000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fbf000 fffff880`00fd4000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f7f000 fffff880`00fb2000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00fe9000 fffff880`00ff0000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00ff0000 fffff880`01000000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013c9000 fffff880`013da000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`06e8b000 fffff880`06f31000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05798000 fffff880`057d5000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c37000 fffff880`00c4b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02c00000 fffff880`02c24000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`00c00000 fffff880`00c1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0562f000 fffff880`05650000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`05650000 fffff880`0566a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d3d000 fffff880`02d8e000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`0566a000 fffff880`05675000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`019f3000 fffff880`019fc000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015de000 fffff880`015e7000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015e7000 fffff880`015f0000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`0185c000 fffff880`01896000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02bd0000 fffff880`02be8000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`0489c000 fffff880`048f3000   Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
    fffff880`05761000 fffff880`05797d80   RtHDMIVX RtHDMIVX.sys Tue Jan 26 22:04:58 2010 (4B5FAD5A)
    fffff880`068a8000 fffff880`06ae1080   RTKVHD64 RTKVHD64.sys Tue Apr 06 06:17:30 2010 (4BBB0A3A)
    fffff880`01854000 fffff880`0185c000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`07217000 fffff880`072ad000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`06f70000 fffff880`06fd7000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`06f31000 fffff880`06f5e000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`01013000 fffff880`01075000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`05684000 fffff880`05685480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`06f5e000 fffff880`06f70000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01000000 fffff880`0100d000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`011e1000 fffff880`011ff000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03deb000 fffff880`03dff000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00460000 fffff960`0046a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`03f84000 fffff880`03faa000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`056c9000 fffff880`056db000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`06b4a000 fffff880`06b64c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`06b0e000 fffff880`06b2b000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0489a000 fffff880`0489bf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`03ead000 fffff880`03ebe000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`056f2000 fffff880`0574c000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`03e4c000 fffff880`03e57000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`03e57000 fffff880`03ead000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`06b95000 fffff880`06ba1000   usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
    fffff880`00fb2000 fffff880`00fbf000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`019d5000 fffff880`019e3000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`011bc000 fffff880`011e1000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015ce000 fffff880`015de000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fd4000 fffff880`00fe9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01808000 fffff880`01854000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03dd0000 fffff880`03deb000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`019e3000 fffff880`019f3000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e62000 fffff880`00f06000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f06000 fffff880`00f15000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02d0e000 fffff880`02d17000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00040000 fffff960`0034f000   win32k   win32k.sys   Tue Aug 31 22:58:04 2010 (4C7DC13C)
    fffff880`03fbf000 fffff880`03fc8000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f6c000 fffff880`00f75000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`02b9a000 fffff880`02bbb000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`073ef000 fffff880`073f9000   HWiNFO64A.SY
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`073e5000 fffff880`073ef000   HWiNFO64A.SY
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`073b6000 fffff880`073bf000   cpuz135_x64.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07385000 fffff880`073b6000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07374000 fffff880`07385000   WinUsb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`0736a000 fffff880`07374000   HWiNFO64A.SY
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07361000 fffff880`0736a000   cpuz135_x64.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`07357000 fffff880`07361000   HWiNFO64A.SY
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`072de000 fffff880`0734f000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01939000 fffff880`01947000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01947000 fffff880`01951000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01951000 fffff880`01965000   dump_amdsata
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    fffff880`01965000 fffff880`01978000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    4: kd> !sysinfo cpuinfo
    [CPU Information]
    ~MHz = REG_DWORD 3500
    Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
    Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
    Identifier = REG_SZ AMD64 Family 16 Model 10 Stepping 0
    ProcessorNameString = REG_SZ AMD Phenom(tm) II X6 1055T Processor
    VendorIdentifier = REG_SZ AuthenticAMD
    Last edited by CarlTR6; 30 Dec 2010 at 14:13.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 14:27.
Find Us