You did Furmark just right. Your temp leveled off, dropped rose again and leveled off. That is fine. It looks like your video card is OK. You may have to experiment to get the right video drivers for your systems. The latest and greatest is not always the best.
You did a really good job with the drivers, they all appear up to date.
You can turn Driver Verifier off. Your latest six dumps are Driver Verifier enabled dumps. All but two blames Windows system files or hardware. Two of them blame HECIx64.sys - Intel Management Engine Interface. This driver is up to date. But on the off chance that it is corrupted, I suggest you download a new copy of the the driver from http://downloadcenter.intel.com/Default.aspx and install it.
The uptimes are very short ranging from 3 seconds to a little over 6 seconds. This suggest a hardware problem, possibly a faulty or failing PSU. We will see what you get with Verifier disabled.
It is time to do some more hardware tests. I suggest that you test your RAM with Memtest 86+ following the instructions in this tutorial: RAM - Test with Memtest86+. Run Memtest from a cold boot after your computer has been off for an hour or so. Let it run for a minimum of 7 passes. This wlil take 6 - 8 hours. If you see any errors, you can stop the test. Post back with your results.
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03067000 PsLoadedModuleList = 0xfffff800`032a4e50
Debug session time: Sat Jan 29 14:14:11.339 2011 (GMT-5)
System Uptime: 0 days 0:00:04.291
Loading Kernel Symbols
...............................................................
..........................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {7ff, 2, 0, fffff800030f72b3}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000007ff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030f72b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330f0e0
00000000000007ff
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`030f72b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff880033ae4f0 -- (.trap 0xfffff880033ae4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000007ff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033d35bb rsp=fffff880033ae680 rbp=0000000000000000
r8=0000000000000801 r9=fffffa8003665380 r10=fffffa8003665148
r11=fffff8a0002c9930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObCreateObject+0xdb:
fffff800`033d35bb 8bf0 mov esi,eax
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d6ca9 to fffff800030d7740
STACK_TEXT:
fffff880`033adf38 fffff800`030d6ca9 : 00000000`0000000a 00000000`000007ff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033adf40 fffff800`030d5920 : 00000000`00000000 fffff980`01672ee0 00000000`00000000 fffff800`0310982b : nt!KiBugCheckDispatch+0x69
fffff880`033ae080 fffff800`030f72b3 : 00100000`033d3121 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`033ae210 fffff800`030b40c7 : 00000000`00000001 fffff800`03107e56 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`033ae2e0 fffff800`0308abb5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`033ae360 fffff800`030f2c44 : fffff880`00000050 fffff800`00000040 01600000`033d3860 00000000`00000008 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`033ae390 fffff800`030d582e : 00000000`00000008 fffffa80`0370d660 00000000`00000000 fffff800`0320b8fe : nt!MmAccessFault+0x1844
fffff880`033ae4f0 fffff800`033d35bb : 00000000`00000000 fffffa80`036e4500 00000000`00000004 fffff880`033ae6b8 : nt!KiPageFault+0x16e
fffff880`033ae680 fffff800`033b4f84 : 00000000`00000000 fffff880`033ae891 fffff8a0`00299b98 00000000`00000000 : nt!ObCreateObject+0xdb
fffff880`033ae6f0 fffff800`033b1195 : fffff8a0`00000000 fffff880`002f9e88 fffff8a0`00021190 fffffa80`0718bb10 : nt!CmpDoOpen+0x154
fffff880`033ae7b0 fffff800`033d0e84 : fffff800`033b0cc0 00000000`00000000 fffffa80`0718bb10 00000000`00000000 : nt!CmpParseKey+0x4d5
fffff880`033aea80 fffff800`033d5e4d : fffffa80`0718bb10 fffff880`033aebe0 00000000`00000240 fffffa80`0370d660 : nt!ObpLookupObjectName+0x585
fffff880`033aeb80 fffff800`033b4dcc : fffff8a0`005327e0 00000000`00000000 00000000`00000000 fffff8a0`005327f0 : nt!ObOpenObjectByName+0x1cd
fffff880`033aec30 fffff800`033b7fca : fffff880`033af060 00000000`00020019 fffff880`033aef80 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`033aed80 fffff800`030d6993 : 00000000`00000001 00000000`00000000 fffff8a0`002c98b0 00000000`000000a0 : nt!NtOpenKey+0x12
fffff880`033aedc0 fffff800`030d2f30 : fffff800`03348498 fffffa80`03668840 fffff800`033ed514 fffffa80`036dbb30 : nt!KiSystemServiceCopyEnd+0x13
fffff880`033aef58 fffff800`03348498 : fffffa80`03668840 fffff800`033ed514 fffffa80`036dbb30 00000000`00000000 : nt!KiServiceLinkage
fffff880`033aef60 fffff800`0334844d : fffffa80`07194d00 00000000`00020019 fffff880`033af288 00000000`00000000 : nt!IopOpenRegistryKeyEx+0x38
fffff880`033aefc0 fffff800`033486ae : fffffa80`047da060 00000000`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeviceObjectToDeviceInstance+0x39
fffff880`033aeff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopOpenOrCreateDeviceRegistryKey+0x11e
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`030d5920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
BUCKET_ID: X64_0xA_VRF_nt!KiPageFault+260
Followup: MachineOwner
---------
Debug session time: Sat Jan 29 17:44:06.069 2011 (GMT-5)
System Uptime: 0 days 0:00:06.411
Loading Kernel Symbols
...............................................................
............................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff8800446ef15, 11e664121, fffff880033bcf70, a}
Unable to load image \SystemRoot\system32\DRIVERS\HECIx64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for HECIx64.sys
*** ERROR: Module load completed but symbols could not be loaded for HECIx64.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+d3d )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8800446ef15, Virtual address for the attempted write.
Arg2: 000000011e664121, PTE contents.
Arg3: fffff880033bcf70, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
IRP_ADDRESS: fffff8800446ee95
TRAP_FRAME: fffff880033bcf70 -- (.trap 0xfffff880033bcf70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff98002726e50 rbx=0000000000000000 rcx=fffff8800446ef0d
rdx=fffff880033bd560 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030df44b rsp=fffff880033bd100 rbp=fffff880033bd250
r8=fffff880033bd208 r9=fffff880033bd200 r10=0000000000000002
r11=fffff800030de7d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!IopCompleteRequest+0xc88:
fffff800`030df44b 48894108 mov qword ptr [rcx+8],rax ds:0100:fffff880`0446ef15=4800003754e8cc33
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000313e448 to fffff800030bf740
STACK_TEXT:
fffff880`033bce08 fffff800`0313e448 : 00000000`000000be fffff880`0446ef15 00000001`1e664121 fffff880`033bcf70 : nt!KeBugCheckEx
fffff880`033bce10 fffff800`030bd82e : fffff800`0304f000 fffff980`016deee0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x409b4
fffff880`033bcf70 fffff800`030df44b : 00000000`00000001 fffff800`0356732b fffffa80`07234b00 fffff880`0446ef34 : nt!KiPageFault+0x16e
fffff880`033bd100 fffff800`0309c0c7 : fffff880`0446ef0d 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xc88
fffff880`033bd1d0 fffff800`0309c487 : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`033bd250 fffff800`03164d31 : fffff980`02726e50 00000000`000001b0 00000000`00000000 fffff980`02726e50 : nt!KiApcInterrupt+0xd7
fffff880`033bd3e0 fffff800`03559624 : 00000000`000001b0 00000000`00000000 fffff980`02726e00 fffff980`02726e50 : nt!VfAvlUnlockShared+0x41
fffff880`033bd410 fffff800`031b613f : 00000000`000001b0 fffff980`02726e50 00000000`00000000 fffff880`033bd560 : nt!VfCheckForLookaside+0x94
fffff880`033bd450 fffff800`031f21c1 : 00000000`000001b0 fffff800`0355f7e5 fffffa80`0720df10 fffff800`030f233f : nt!ExpCheckForLookaside+0x1f
fffff880`033bd480 fffff800`03564026 : fffffa80`0720df02 fffffa80`0720df10 00000000`00000000 fffff980`02726e50 : nt!ExDeferredFreePool+0xd3d
fffff880`033bd530 fffff800`035645ec : fffff880`0446ef0d fffff980`02726e50 fffffa80`073f2180 00000000`00000003 : nt!VfIoFreeIrp+0xe6
fffff880`033bd560 fffff880`0446ef0d : fffff880`033bd5d0 fffffa80`00000005 fffffa80`073f2030 fffffa80`071b8e80 : nt!IovFreeIrpPrivate+0x5c
fffff880`033bd5a0 fffff880`033bd5d0 : fffffa80`00000005 fffffa80`073f2030 fffffa80`071b8e80 00000000`00000000 : HECIx64+0x4f0d
fffff880`033bd5a8 fffffa80`00000005 : fffffa80`073f2030 fffffa80`071b8e80 00000000`00000000 fffffa80`073f2228 : 0xfffff880`033bd5d0
fffff880`033bd5b0 fffffa80`073f2030 : fffffa80`071b8e80 00000000`00000000 fffffa80`073f2228 00000001`03060000 : 0xfffffa80`00000005
fffff880`033bd5b8 fffffa80`071b8e80 : 00000000`00000000 fffffa80`073f2228 00000001`03060000 fffff880`033bd5d8 : 0xfffffa80`073f2030
fffff880`033bd5c0 00000000`00000000 : fffffa80`073f2228 00000001`03060000 fffff880`033bd5d8 fffff880`033bd5d8 : 0xfffffa80`071b8e80
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+d3d
fffff800`031f21c1 8b05792b0700 mov eax,dword ptr [nt!ExpPoolFlags (fffff800`03264d40)]
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: nt!ExDeferredFreePool+d3d
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xBE_VRF_nt!ExDeferredFreePool+d3d
BUCKET_ID: X64_0xBE_VRF_nt!ExDeferredFreePool+d3d
Followup: Pool_corruption
---------
Debug session time: Fri Jan 28 19:46:28.557 2011 (GMT-5)
System Uptime: 0 days 0:00:03.900
Loading Kernel Symbols
...............................................................
............................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff88010028f15, 11e649121, fffff880033b6090, a}
Unable to load image \SystemRoot\system32\DRIVERS\HECIx64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for HECIx64.sys
*** ERROR: Module load completed but symbols could not be loaded for HECIx64.sys
Probably caused by : HECIx64.sys ( HECIx64+4f0d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88010028f15, Virtual address for the attempted write.
Arg2: 000000011e649121, PTE contents.
Arg3: fffff880033b6090, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
IRP_ADDRESS: fffff88010028e95
TRAP_FRAME: fffff880033b6090 -- (.trap 0xfffff880033b6090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff9800171ee50 rbx=0000000000000000 rcx=fffff88010028f0d
rdx=fffff880033b6560 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030f744b rsp=fffff880033b6220 rbp=fffff880033b6370
r8=fffff880033b6328 r9=fffff880033b6320 r10=0000000000000002
r11=fffff800030f67d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!IopCompleteRequest+0xc88:
fffff800`030f744b 48894108 mov qword ptr [rcx+8],rax ds:fffff880`10028f15=4800003754e8cc33
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003156448 to fffff800030d7740
STACK_TEXT:
fffff880`033b5f28 fffff800`03156448 : 00000000`000000be fffff880`10028f15 00000001`1e649121 fffff880`033b6090 : nt!KeBugCheckEx
fffff880`033b5f30 fffff800`030d582e : fffff880`033b5dc0 fffff980`0284cee0 00000000`00000100 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x409b4
fffff880`033b6090 fffff800`030f744b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`033b6220 fffff800`030b40c7 : fffff880`10028f0d 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xc88
fffff880`033b62f0 fffff800`030b4487 : fffffa80`07129dc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`033b6370 fffff800`035690b6 : 00000000`00000003 fffffa80`07129dc0 00000000`00000000 00000000`00000001 : nt!KiApcInterrupt+0xd7
fffff880`033b6500 fffff800`0357c01e : fffffa80`07129d02 fffffa80`07129dc0 00000000`00000000 fffff980`0171ee50 : nt!VfIrpDatabaseEntryReleaseLock+0x126
fffff880`033b6530 fffff800`0357c5ec : fffff880`10028f0d fffff980`0171ee50 fffffa80`071b4180 00000000`00000003 : nt!VfIoFreeIrp+0xde
fffff880`033b6560 fffff880`10028f0d : fffff880`033b65d0 fffffa80`00000005 fffffa80`071b4030 fffffa80`05dcaa10 : nt!IovFreeIrpPrivate+0x5c
fffff880`033b65a0 fffff880`033b65d0 : fffffa80`00000005 fffffa80`071b4030 fffffa80`05dcaa10 00000000`00000000 : HECIx64+0x4f0d
fffff880`033b65a8 fffffa80`00000005 : fffffa80`071b4030 fffffa80`05dcaa10 00000000`00000000 fffffa80`071b4228 : 0xfffff880`033b65d0
fffff880`033b65b0 fffffa80`071b4030 : fffffa80`05dcaa10 00000000`00000000 fffffa80`071b4228 00000001`04060000 : 0xfffffa80`00000005
fffff880`033b65b8 fffffa80`05dcaa10 : 00000000`00000000 fffffa80`071b4228 00000001`04060000 fffff880`033b65d8 : 0xfffffa80`071b4030
fffff880`033b65c0 00000000`00000000 : fffffa80`071b4228 00000001`04060000 fffff880`033b65d8 fffff880`033b65d8 : 0xfffffa80`05dcaa10
STACK_COMMAND: kb
FOLLOWUP_IP:
HECIx64+4f0d
fffff880`10028f0d 8bc6 mov eax,esi
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: HECIx64+4f0d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HECIx64
IMAGE_NAME: HECIx64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c98e458
FAILURE_BUCKET_ID: X64_0xBE_VRF_HECIx64+4f0d
BUCKET_ID: X64_0xBE_VRF_HECIx64+4f0d
Followup: MachineOwner
---------
2: kd> lmtsmn
start end module name
fffff880`00fa8000 fffff880`00fff000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`040c7000 fffff880`04151000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0130d000 fffff880`01318000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`042d2000 fffff880`042d8000 AsIO AsIO.sys Mon Aug 23 21:53:02 2010 (4C7325FE)
fffff880`042cb000 fffff880`042d2000 AsUpIO AsUpIO.sys Mon Aug 02 22:47:59 2010 (4C57835F)
fffff880`011f1000 fffff880`011fa000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0102a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02e3a000 fffff880`02e41000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042ba000 fffff880`042cb000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02fab000 fffff880`02fd5000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ee8000 fffff880`00fa8000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01bb1000 fffff880`01be1000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce9000 fffff880`00d47000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01200000 fffff880`01273000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`01be1000 fffff880`01bef000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04219000 fffff880`0429c000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`0429c000 fffff880`042ba000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04097000 fffff880`040a6000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01b9b000 fffff880`01bb1000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02f98000 fffff880`02fab000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02e44000 fffff880`02f98000 dump_iaStor dump_iaStor.sys Mon Sep 13 21:23:32 2010 (4C8ECE94)
fffff880`10ca8000 fffff880`10d9c000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`10d9c000 fffff880`10de2000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01364000 fffff880`01378000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01318000 fffff880`01364000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01411000 fffff880`0141b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01b61000 fffff880`01b9b000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01035000 fffff880`0107f000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0301e000 fffff800`03067000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`10000000 fffff880`10024000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`10024000 fffff880`10035000 HECIx64 HECIx64.sys Tue Sep 21 12:59:04 2010 (4C98E458)
fffff880`01b58000 fffff880`01b61000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0109d000 fffff880`011f1000 iaStor iaStor.sys Mon Sep 13 21:23:32 2010 (4C8ECE94)
fffff880`00c10000 fffff880`00c31000 jraid jraid.sys Tue Aug 10 05:28:44 2010 (4C611BCC)
fffff800`00bc2000 fffff800`00bcc000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`015e0000 fffff880`015fa000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0178f000 fffff880`017ba000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c91000 fffff880`00cd5000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`00c60000 fffff880`00c7a000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02e00000 fffff880`02e31000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0102a000 fffff880`01035000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01a37000 fffff880`01a42000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ebc000 fffff880`00ec6000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01378000 fffff880`013d6000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`0408c000 fffff880`04097000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01b46000 fffff880`01b58000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01279000 fffff880`01305000 mv91xx mv91xx.sys Fri Aug 27 05:49:22 2010 (4C778A22)
fffff880`01305000 fffff880`0130d000 mvxxmm mvxxmm.sys Fri Aug 27 05:49:03 2010 (4C778A0F)
fffff880`0163d000 fffff880`0172f000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`041c5000 fffff880`041d4000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04151000 fffff880`04196000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0172f000 fffff880`0178f000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`01a42000 fffff880`01a53000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04080000 fffff880`0408c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03067000 fffff800`03643000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0143d000 fffff880`015e0000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02e31000 fffff880`02e3a000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10ca6000 fffff880`10ca7180 nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`1004b000 fffff880`10ca5d00 nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`0419f000 fffff880`041c5000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00ed3000 fffff880`00ee8000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d47000 fffff880`00d7a000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00deb000 fffff880`00df2000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c00000 fffff880`00c10000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01400000 fffff880`01411000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00cd5000 fffff880`00ce9000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0402f000 fffff880`04080000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02ff3000 fffff880`02ffc000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a25000 fffff880`01a2e000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a2e000 fffff880`01a37000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01b0c000 fffff880`01b46000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`00c31000 fffff880`00c60000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`041d4000 fffff880`041f1000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01b04000 fffff880`01b0c000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01800000 fffff880`019fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`01a71000 fffff880`01a7e000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01a53000 fffff880`01a71000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`0401b000 fffff880`0402f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`042d8000 fffff880`042fe000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00ec6000 fffff880`00ed3000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02fd5000 fffff880`02fe3000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01a00000 fffff880`01a25000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017ba000 fffff880`017ca000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00d7a000 fffff880`00d8f000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d8f000 fffff880`00deb000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01ab8000 fffff880`01b04000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04000000 fffff880`0401b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02fe3000 fffff880`02ff3000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04196000 fffff880`0419f000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00eb3000 fffff880`00ebc000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)