Multile BSOD

Joined
Apr 17, 2011
Messages
5
Reaction score
0
I have been getting multile BSOD's. I used a program to analyze them and see they are being caused by multiple things. What im not good at is figuringoutwhat is actually causing them. Any help would be amazing. You will find detailed info on everything in the zip below created using

Windows_NT6_BSOD_v3.03_jcgriff2_
cau
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Hello and Welcome,

take these steps first of all:

1. Uninstall AVG
http://www.avg.com/ww-en/download-tools


2. Install MSE
http://www.microsoft.com/en-us/security_essentials/default.aspx


3. Update or uninstall old Acronis version
tifsfilt.sys Wed Aug 29 08:37:29 2007
timntr.sys Wed Aug 29 08:38:23 2007
snapman.sys Thu Nov 22 03:19:33 2007


4. Update drivers:

TOSHIBA ACPI-Based Value Added Logical and General Purpose Device Driver
TVALZ_O.SYS Thu Nov 08 22:08:41 2007
http://www.csd.toshiba.com/cgi-bin/tais/support/jsp/home.jsp?nav=Download

Realtek LAN
Rt64win7.sys Thu Feb 26 04:04:13 2009
http://218.210.127.131/downloads/do...d=4&Level=5&Conn=4&DownTypeID=3&GetDown=false

Realtek Audio
RTKVHD64.sys Mon Aug 24 06:19:48 2009
http://218.210.127.131/downloads/do...=24&Level=4&Conn=3&DownTypeID=3&GetDown=false

JMB38X Flash Media Controller
jmcr.sys Mon Jun 15 02:07:34 2009
http://www.jmicron.com/Driver.htm
http://www.csd.toshiba.com/cgi-bin/tais/support/jsp/home.jsp?nav=Download

ATI
atikmdag.sys Thu Jul 30 00:23:28 2009
http://www.csd.toshiba.com/cgi-bin/tais/support/jsp/home.jsp?nav=Download

Atheros network adapter
athrx.sys Mon Sep 21 14:00:40 2009
partner.atheros.com/Drivers.aspx
http://www.csd.toshiba.com/cgi-bin/tais/support/jsp/home.jsp?nav=Download





CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041411-68250-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a59000 PsLoadedModuleList = 0xfffff800`02c96e50
Debug session time: Thu Apr 14 20:32:13.953 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:22.528
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff80002acdfc4, fffff880023b7bf8, fffff880023b7460}

Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002acdfc4, The address that the exception occurred at
Arg3: fffff880023b7bf8, Exception Record Address
Arg4: fffff880023b7460, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiDeferredReadyThread+e4
fffff800`02acdfc4 80bd1e04000002  cmp     byte ptr [rbp+41Eh],2

EXCEPTION_RECORD:  fffff880023b7bf8 -- (.exr 0xfffff880023b7bf8)
ExceptionAddress: fffff80002acdfc4 (nt!KiDeferredReadyThread+0x00000000000000e4)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: ffffffffffffffff
   Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000

CONTEXT:  fffff880023b7460 -- (.cxr 0xfffff880023b7460)
rax=0000000000000061 rbx=0000000000000004 rcx=000000000000000f
rdx=000000000000000f rsi=0000000000000000 rdi=fffffa8005211a10
rip=fffff80002acdfc4 rsp=fffff880023b7e30 rbp=bffffa8003a48840
 r8=000000000000000f  r9=fffffa8003a919b0 r10=fffff80002a59000
r11=0000000000000000 r12=0000000000000000 r13=0000000003a53940
r14=0000000000000001 r15=fffffa8003a91410
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!KiDeferredReadyThread+0xe4:
fffff800`02acdfc4 80bd1e04000002  cmp     byte ptr [rbp+41Eh],2 ss:0018:bffffa80`03a48c5e=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  ffffffffffffffff

EXCEPTION_PARAMETER2:  0000000000000000

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d010e0
 0000000000000000 

FOLLOWUP_IP: 
dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
fffff880`06fb89a0 4c8d5c2440      lea     r11,[rsp+40h]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002acd871 to fffff80002acdfc4

STACK_TEXT:  
fffff880`023b7e30 fffff800`02acd871 : fffffa80`03a91978 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeferredReadyThread+0xe4
fffff880`023b7eb0 fffff880`06fb89a0 : fffffa80`00000000 fffffa80`00000000 fffffa80`06522e00 fffffa80`05211b18 : nt!KeSetEvent+0x1e1
fffff880`023b7f20 fffff880`06fbb6d9 : 00000000`00000001 fffffa80`06520f38 fffff880`023b8180 00000000`00000000 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x1d8
fffff880`023b7f90 fffff880`06efa6c8 : fffffa80`063f6000 00000000`00000200 fffff880`023b87f0 00000000`00000000 : dxgmms1!VidSchSubmitCommand+0x3ad
fffff880`023b7ff0 fffff880`06ed0fb2 : fffff8a0`00000001 fffff8a0`000004e0 fffff880`023b8638 fffff880`00000002 : dxgkrnl!DXGCONTEXT::Render+0xadc
fffff880`023b8600 fffff960`006cb264 : 00000000`00000000 00000000`00000000 fffff900`c00c0020 ffffffff`fffe7960 : dxgkrnl!DxgkCddGdiCommand+0x1ea
fffff880`023b8690 fffff960`006c95d5 : fffffa80`03a4d070 fffffa80`03a4d070 00000000`00000000 fffff900`c00c0020 : cdd!CHwCommandBuffer::FlushGdiCommands+0xb4
fffff880`023b8980 fffff960`006c5c6e : ffffffff`fffd74e4 00000000`00000010 00000000`00000001 fffff900`00000000 : cdd!CDDPDEV::FlushGdiOutput+0x81
fffff880`023b89b0 fffff800`02d6c7c6 : 00000000`068e6f69 fffffa80`058fab60 00000000`00000080 fffffa80`06253b30 : cdd!PresentWorkerThread+0x902
fffff880`023b8d40 fffff800`02aa7c26 : fffff800`02c43e80 fffffa80`058fab60 fffffa80`05802060 00000001`0011c4ac : nt!PspSystemThreadStartup+0x5a
fffff880`023b8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa174

STACK_COMMAND:  .cxr 0xfffff880023b7460 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8

BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8

Followup: MachineOwner
---------



Loading Dump File [F:\DMP\041611-32791-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a4f000 PsLoadedModuleList = 0xfffff800`02c8ce50
Debug session time: Sun Apr 17 01:15:09.867 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:06.442
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : partmgr.sys ( partmgr!PmReadWriteCompletion+81 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3638383833633765
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  AVGIDSAgent.ex

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002f22638 -- (.exr 0xfffff88002f22638)
ExceptionAddress: fffff80002bb24a9 (nt!EtwpTraceIo+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002f226e0 -- (.trap 0xfffff88002f226e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=4000000000000000 rbx=0000000000000000 rcx=0000000001535242
rdx=0000000000060000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002bb24a9 rsp=fffff88002f22870 rbp=fffffa80049c4940
 r8=fffffa80049be9e0  r9=fffffa80049c4b30 r10=fffffa80048ce620
r11=fffff88002f22908 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!EtwpTraceIo+0x129:
fffff800`02bb24a9 488b4018        mov     rax,qword ptr [rax+18h] ds:d5f0:40000000`00000018=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ab746e to fffff80002abf710

STACK_TEXT:  
fffff880`02f21728 fffff800`02ab746e : 00000000`00000017 fffff880`016401d6 fffff880`02f21ea0 fffff800`02aec668 : nt!KeBugCheck
fffff880`02f21730 fffff800`02ae540d : fffff800`02ccdb7c fffff800`02c07ea4 fffff800`02a4f000 fffff880`02f22638 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f21760 fffff800`02aeca90 : fffff800`02c0ea60 fffff880`02f217d8 fffff880`02f22638 fffff800`02a4f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f21790 fffff800`02af99ef : fffff880`02f22638 fffff880`02f21ea0 fffff880`00000000 00000000`0000010a : nt!RtlDispatchException+0x410
fffff880`02f21e70 fffff800`02abed82 : fffff880`02f22638 fffffa80`049c4940 fffff880`02f226e0 fffffa80`049c4b30 : nt!KiDispatchException+0x16f
fffff880`02f22500 fffff800`02abd68a : 00000000`00000000 fffff880`02f22790 ffffffff`00000020 fffff880`01814903 : nt!KiExceptionDispatch+0xc2
fffff880`02f226e0 fffff800`02bb24a9 : 00000000`00000000 00000000`00002000 fffff880`037dab30 fffff880`0180c386 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f22870 fffff880`00ebefb1 : fffff800`02bb2380 fffffa80`049c4940 fffffa80`049c4b30 00000000`00000000 : nt!EtwpTraceIo+0x129
fffff880`02f22910 fffff800`02ac1d26 : fffffa80`049c4aeb 00000000`00000034 fffffa80`04940b90 fffffa80`049c4940 : partmgr!PmReadWriteCompletion+0x81
fffff880`02f22940 fffff880`00fcf8ee : fffffa80`06273a10 00000000`00000001 fffffa80`05d47000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f22a20 fffff800`02ac1d26 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0520c4f0 : CLASSPNP!TransferPktComplete+0x1ce
fffff880`02f22aa0 fffff880`00f9741a : 00000000`00000000 00000000`00000001 fffffa80`05492b80 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f22b80 fffff880`00f97242 : fffffa80`05492b80 00000000`00000000 fffff880`02f22cd0 fffff880`068b0c01 : ataport!IdeCompleteScsiIrp+0x62
fffff880`02f22bb0 fffff880`00f91e32 : 00000000`00000002 00000000`00000000 fffffa80`05226000 fffff880`06bafc29 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`02f22be0 fffff880`00f9a7ed : fffffa80`048cd1a0 fffffa80`05492b80 00000000`00000000 00000000`00000000 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`02f22d10 fffff880`00f9a0ec : fffffa80`048cd1a0 00000000`00000000 fffffa80`048cd1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`02f22e40 fffff800`02acabfc : fffff880`009e6180 fffffa80`000010a3 fffffa80`048cd050 fffffa80`048cd118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02f22f00 fffff800`02ac5865 : 00000000`00000000 fffffa80`06dbfb60 00000000`00000000 fffff880`00f99f44 : nt!KiRetireDpcList+0x1bc
fffff880`02f22fb0 fffff800`02ac567c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`0a62cbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
partmgr!PmReadWriteCompletion+81
fffff880`00ebefb1 488b5c2430      mov     rbx,qword ptr [rsp+30h]

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  partmgr!PmReadWriteCompletion+81

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc11e

FAILURE_BUCKET_ID:  X64_0x1E_0_partmgr!PmReadWriteCompletion+81

BUCKET_ID:  X64_0x1E_0_partmgr!PmReadWriteCompletion+81

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041611-39905-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a63000 PsLoadedModuleList = 0xfffff800`02ca0e50
Debug session time: Sun Apr 17 02:20:08.074 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:39.649
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002ad6905, fffff8800be1aaa0, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ad6905, Address of the instruction which caused the bugcheck
Arg3: fffff8800be1aaa0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6905 498b08          mov     rcx,qword ptr [r8]

CONTEXT:  fffff8800be1aaa0 -- (.cxr 0xfffff8800be1aaa0)
rax=00000001613e0017 rbx=0000000000001000 rcx=fffff80002c5bb90
rdx=bffffa8003c23001 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80002ad6905 rsp=fffff8800be1b470 rbp=fffff8800be1b4c0
 r8=bffffa8003c23000  r9=0000000063416d4d r10=fffff80002c5bb90
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000063416d4d
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02ad6905 498b08          mov     rcx,qword ptr [r8] ds:002b:bffffa80`03c23000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002ad6905

STACK_TEXT:  
fffff880`0be1b470 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16


FOLLOWUP_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6905 498b08          mov     rcx,qword ptr [r8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpInterlockedPopEntrySListFault16+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

STACK_COMMAND:  .cxr 0xfffff8800be1aaa0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

BUCKET_ID:  X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`06a00000 fffff880`06a3e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f17000 fffff880`00f6e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02f2e000 fffff880`02fb8000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`07733000 fffff880`07749000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`08acb000 fffff880`08bed000   agrsm64  agrsm64.sys  Mon Nov 10 10:01:35 2008 (49184CCF)
fffff880`0a511000 fffff880`0a519000   ALSysIO64 ALSysIO64.sys Sun Apr 19 15:41:04 2009 (49EB7E50)
fffff880`0744a000 fffff880`0745e000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`06800000 fffff880`06815000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00dd1000 fffff880`00ddc000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00d93000 fffff880`00d9c000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d9c000 fffff880`00dc6000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0747a000 fffff880`075f6000   athrx    athrx.sys    Mon Sep 21 14:00:40 2009 (4AB7BF48)
fffff880`06a80000 fffff880`07097000   atikmdag atikmdag.sys Thu Jul 30 00:23:28 2009 (4A712040)
fffff880`01b72000 fffff880`01b7a000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff960`008b0000 fffff960`00911000   ATMFD    ATMFD.DLL    Fri Feb 18 23:13:38 2011 (4D5F4372)
fffff880`01a7a000 fffff880`01a8b000   avgfwd6a avgfwd6a.sys Sun Jul 11 21:38:24 2010 (4C3A7210)
fffff880`05773000 fffff880`0579e000   AVGIDSDriver AVGIDSDriver.Sys Wed Mar 30 10:57:08 2011 (4D9344C4)
fffff880`01b68000 fffff880`01b72000   AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`05678000 fffff880`05683000   AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`0697d000 fffff880`069cc000   avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`01bdc000 fffff880`01beb000   avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`01b5c000 fffff880`01b68000   avgrkx64 avgrkx64.sys Tue Jan 18 21:31:31 2011 (4D364D03)
fffff880`02e8a000 fffff880`02ee9000   avgtdia  avgtdia.sys  Thu Feb 10 00:50:32 2011 (4D537CA8)
fffff880`00fdf000 fffff880`00feb000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`01bf4000 fffff880`01bfb000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0696c000 fffff880`0697d000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`037d1000 fffff880`037ef000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00600000 fffff960`00627000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`01bb2000 fffff880`01bdc000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ca9000 fffff880`00d69000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01b2c000 fffff880`01b5c000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c4b000 fffff880`00ca9000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0771e000 fffff880`07722500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01176000 fffff880`011e9000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fd6000 fffff880`00fdf000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`07723000 fffff880`07733000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`08a81000 fffff880`08a8f000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`068cb000 fffff880`0694e000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`0694e000 fffff880`0696c000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`068bc000 fffff880`068cb000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01b16000 fffff880`01b2c000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`07f99000 fffff880`07fbb000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02e0f000 fffff880`02e52000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`08a8f000 fffff880`08a9b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`08aa6000 fffff880`08ab9000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`08a9b000 fffff880`08aa6000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`08ab9000 fffff880`08ac5000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`07097000 fffff880`0718b000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0718b000 fffff880`071d1000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`08a00000 fffff880`08a36000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`010f8000 fffff880`0110c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010ac000 fffff880`010f8000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01adc000 fffff880`01b16000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a1a000 fffff800`02a63000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`076be000 fffff880`076e2000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`03709000 fffff880`037d1000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`018ae000 fffff880`018b7000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`076e2000 fffff880`07700000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`06a3e000 fffff880`06a64000   jmcr     jmcr.sys     Mon Jun 15 02:07:34 2009 (4A35E526)
fffff880`07700000 fffff880`0770f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb5000 fffff800`00bbf000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`0760d000 fffff880`07650000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013d4000 fffff880`013ee000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0159e000 fffff880`015c9000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`089f7000 fffff880`089fc200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`07eaf000 fffff880`07ec4000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`07e54000 fffff880`07e77000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c2a000 fffff880`00c37000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`08bef000 fffff880`08bfe000   modem    modem.sys    Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`08800000 fffff880`0880e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0770f000 fffff880`0771e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00d79000 fffff880`00d93000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03600000 fffff880`03618000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03618000 fffff880`03645000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`05607000 fffff880`05655000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`05655000 fffff880`05678000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`00dc6000 fffff880`00dd1000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01a5e000 fffff880`01a69000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f77000 fffff880`00f81000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01118000 fffff880`01176000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`068b1000 fffff880`068bc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0189c000 fffff880`018ae000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0144c000 fffff880`0153e000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0776d000 fffff880`07779000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`036de000 fffff880`036f1000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`07779000 fffff880`077a8000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07f47000 fffff880`07f5c000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02e00000 fffff880`02e0f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ee9000 fffff880`02f2e000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0153e000 fffff880`0159e000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01a69000 fffff880`01a7a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`068a5000 fffff880`068b1000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a63000 fffff800`03040000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01231000 fffff880`013d4000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01beb000 fffff880`01bf4000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0368b000 fffff880`036de000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02fc1000 fffff880`02fe7000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fc1000 fffff880`00fd6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f81000 fffff880`00fb4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d69000 fffff880`00d79000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ee000 fffff880`013ff000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05683000 fffff880`05729000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`07f5c000 fffff880`07f99000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c37000 fffff880`00c4b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0110c000 fffff880`01117e00   PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`07749000 fffff880`0776d000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`077a8000 fffff880`077c3000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`077c3000 fffff880`077e4000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`077e4000 fffff880`077fe000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`06854000 fffff880`068a5000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`07600000 fffff880`0760b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01a43000 fffff880`01a4c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a4c000 fffff880`01a55000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01a55000 fffff880`01a5e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0103b000 fffff880`01075000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`036f1000 fffff880`03709000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0740d000 fffff880`0743f000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`08813000 fffff880`089f6080   RTKVHD64 RTKVHD64.sys Mon Aug 24 06:19:48 2009 (4A926944)
fffff880`071d1000 fffff880`07200000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`05729000 fffff880`05734000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`01000000 fffff880`0103b000   snapman  snapman.sys  Thu Nov 22 03:19:33 2007 (47453B95)
fffff880`01894000 fffff880`0189c000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0a54a000 fffff880`0a5bb000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0a47c000 fffff880`0a511000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`0a415000 fffff880`0a47c000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`05734000 fffff880`05761000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`0760b000 fffff880`0760c480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05761000 fffff880`05773000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01aa9000 fffff880`01ab6000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01800000 fffff880`01894000   tdrpman  tdrpman.sys  Mon Nov 12 08:36:33 2007 (473856E1)
fffff880`01a8b000 fffff880`01aa9000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02e6d000 fffff880`02e81000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`07e77000 fffff880`07e8e000   tifsfilt tifsfilt.sys Wed Aug 29 08:37:29 2007 (46D56889)
fffff880`018bd000 fffff880`0196d000   timntr   timntr.sys   Wed Aug 29 08:38:23 2007 (46D568BF)
fffff960`004d0000 fffff960`004da000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`069cc000 fffff880`069f2000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`019c9000 fffff880`019cde80   TVALZ_O  TVALZ_O.SYS  Thu Nov 08 22:08:41 2007 (4733CF39)
fffff880`07e00000 fffff880`07e54000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`0745e000 fffff880`07470000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`08a36000 fffff880`08a53000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`08bed000 fffff880`08beef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`076ad000 fffff880`076be000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`07eed000 fffff880`07f47000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`0743f000 fffff880`0744a000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`07657000 fffff880`076ad000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`08a53000 fffff880`08a80200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00fb4000 fffff880`00fc1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01a00000 fffff880`01a0e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01a0e000 fffff880`01a33000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0196d000 fffff880`0197d000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00feb000 fffff880`01000000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0197d000 fffff880`019c9000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`07400000 fffff880`0740d000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02fe7000 fffff880`02ffd000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02e52000 fffff880`02e6d000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01a33000 fffff880`01a43000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e64000 fffff880`00f08000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f08000 fffff880`00f17000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02fb8000 fffff880`02fc1000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00382000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`00f6e000 fffff880`00f77000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`07e8e000 fffff880`07eaf000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`0a519000 fffff880`0a54a000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00031000
fffff880`01b7a000 fffff880`01b88000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01b88000 fffff880`01b94000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01b94000 fffff880`01b9f000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`01b9f000 fffff880`01bb2000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Last edited:
Joined
Apr 17, 2011
Messages
5
Reaction score
0
Thank you so much for your reply. However, while doing one of toshibas retarded bios flashes, atikmdag.sys BSOD the computer. So, i tore the computer apart, not my first cup of tea, and found the cmos battery. Is there a way to jump it, i dont see pins, to reset the bios then do a CD bios install?
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
So, i tore the computer apart, not my first cup of tea, and found the cmos battery. Is there a way to jump it, i dont see pins, to reset the bios then do a CD bios install?

For what? You should have updated the drivers first of all.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top