SP1 bork

Joined
Apr 12, 2011
Messages
5
Reaction score
0
Got borked with the SP1 update. Got it stable by undoing a lot of stuff, but I still get an occassional boot error. Figure a clean install, with immediate updates applied, followed by current drivers will stop issue, but just in case.............whats the dump saying please?
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
IRQL_NOT_LESS_OR_EQUAL (a)
Pool Corruption
nt!ExDeferredFreePool
LOCK_ADDRESS: fffff80001ec1400 -- (!locks fffff80001ec1400)
PciDevice_QueryCapabilities




1. Disable Driver Verifier



2. Update:

Intel Matrix Storage
iaStorV.sys Wed Apr 08 12:57:17 2009
http://www.intel.com/p/en_US/support/detect/

Speedfan
speedfan.sys Sun Sep 24 09:26:48 2006

nVidia
nvlddmkm.sys Fri May 21 19:35:15 2010





3. http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html






CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031311-15078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`01c4d000 PsLoadedModuleList = 0xfffff800`01e8ae50
Debug session time: Sun Mar 13 11:02:05.468 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:03.968
Loading Kernel Symbols
...............................................................
.................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80001cdd436}

Probably caused by : pci.sys ( pci!PciDevice_QueryCapabilities+dc )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001cdd436, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001ef50e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+c73
fffff800`01cdd436 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

IRP_ADDRESS:  ffffffffffffff88

TRAP_FRAME:  fffff880023a5fb0 -- (.trap 0xfffff880023a5fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0034ef630 rbx=0000000000000000 rcx=fffff880023a6190
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001ffeffc rsp=fffff880023a6140 rbp=fffff880023a63c0
 r8=fffff8a000003000  r9=00000000000001f0 r10=fffffa8005544420
r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt! ?? ::NNGAKEGL::`string'+0x2b705:
fffff800`01ffeffc 488d4c2468      lea     rcx,[rsp+68h]
Resetting default scope

LOCK_ADDRESS:  fffff80001ec1400 -- (!locks fffff80001ec1400)

Resource @ nt!PiEngineLock (0xfffff80001ec1400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff80001ec1400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80001cbcca9 to fffff80001cbd740

STACK_TEXT:  
fffff880`023a59f8 fffff800`01cbcca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`023a5a00 fffff800`01cbb920 : 00000000`00000010 fffff980`03e0eee0 fffff880`023a5b60 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`023a5b40 fffff800`01cdd436 : 00600000`01ffe121 fffff800`01cede60 00000000`00000010 00000000`00000202 : nt!KiPageFault+0x260
fffff880`023a5cd0 fffff800`01c9a0b7 : 00000000`00000000 fffff880`023a5ee0 00000000`00000000 fffff880`00000000 : nt!IopCompleteRequest+0xc73
fffff880`023a5da0 fffff800`01c9a477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`023a5e20 fffff800`01cbb7bf : 00000000`00000008 00000000`00000000 00000000`00000000 00001f80`010877c0 : nt!KiApcInterrupt+0xd7
fffff880`023a5fb0 fffff800`01ffeffc : fffffa80`05588000 00000000`00000001 fffffa80`05544420 00001f80`01080000 : nt!KiPageFault+0xff
fffff880`023a6140 fffff800`01cbc993 : fffffa80`05588040 fffff880`023a64f8 fffffa80`00000001 fffff980`01590e90 : nt! ?? ::NNGAKEGL::`string'+0x2b705
fffff880`023a62d0 fffff800`01cb8f30 : fffff800`01f2d8bf ffffffff`800001f0 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`023a64d8 fffff800`01f2d8bf : ffffffff`800001f0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`023a64e0 fffff800`01f2de4b : fffffa80`05536060 fffff800`01fc3300 00000000`00000000 00000000`00000000 : nt!IopGetRegistryValue+0xab
fffff880`023a6540 fffff800`01f2dd78 : fffff880`023a6a30 00000000`00000004 fffffa80`06df1d90 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0x9f
fffff880`023a66a0 fffff880`00e1dac4 : 00000000`00000010 fffff880`023a6a30 00000000`00000010 00000000`00010293 : nt!IoGetDeviceProperty+0xbc
fffff880`023a6780 fffff880`00e049d5 : fffff980`017e6ea0 fffff800`021512a7 00000000`00000004 fffff980`017e6ea0 : pci!PciDevice_QueryCapabilities+0xdc
fffff880`023a67c0 fffff800`02164c16 : fffff980`017e6ea0 00000000`00000002 fffffa80`07142a20 fffff800`0216037e : pci!PciDispatchPnpPower+0xd9
fffff880`023a6800 fffff800`0216752a : fffff980`017e6f70 fffffa80`07142a20 fffffa80`09117200 fffffa80`08f2eda0 : nt!IovCallDriver+0x566
fffff880`023a6860 fffff800`02164c16 : fffff980`017e6ea0 00000000`00000002 fffffa80`09117200 fffffa80`08f2ee70 : nt!ViFilterDispatchPnp+0x13a
fffff880`023a6890 fffff800`01f28a09 : fffffa80`09117200 00000000`c00000bb fffff880`023a6990 fffffa80`08f2ee70 : nt!IovCallDriver+0x566
fffff880`023a68f0 fffff800`0207d207 : fffff880`023a6a30 fffffa80`071416e0 00000000`00000040 00000000`00000004 : nt!IopSynchronousCall+0xc5
fffff880`023a6960 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpIrpQueryCapabilities+0x87


STACK_COMMAND:  kb

FOLLOWUP_IP: 
pci!PciDevice_QueryCapabilities+dc
fffff880`00e1dac4 488b8790000000  mov     rax,qword ptr [rdi+90h]

SYMBOL_STACK_INDEX:  d

SYMBOL_NAME:  pci!PciDevice_QueryCapabilities+dc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: pci

IMAGE_NAME:  pci.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc117

FAILURE_BUCKET_ID:  X64_0xA_VRF_pci!PciDevice_QueryCapabilities+dc

BUCKET_ID:  X64_0xA_VRF_pci!PciDevice_QueryCapabilities+dc

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031311-10296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`01c5a000 PsLoadedModuleList = 0xfffff800`01e97e50
Debug session time: Sun Mar 13 17:38:13.562 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:04.078
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80001cea2b3}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+d3d )

Followup: Pool_corruption
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001cea2b3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001f020e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`01cea2b3 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff88002392050 -- (.trap 0xfffff88002392050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002391d10 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001cea2b3 rsp=fffff880023921e0 rbp=fffff88002392330
 r8=fffff880023922e8  r9=fffff880023922e0 r10=0000000000000002
r11=fffff80001ce97d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!IopCompleteRequest+0xae3:
fffff800`01cea2b3 488b09          mov     rcx,qword ptr [rcx] ds:ed10:00000000`00000000=????????????????
Resetting default scope

LOCK_ADDRESS:  fffff80001ece400 -- (!locks fffff80001ece400)

Resource @ nt!PiEngineLock (0xfffff80001ece400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
	Lock address  : 0xfffff80001ece400
	Thread Count  : 0
	Thread address: 0x0000000000000000
	Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff80001cc9ca9 to fffff80001cca740

STACK_TEXT:  
fffff880`02391f08 fffff800`01cc9ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02391f10 fffff800`01cc8920 : 00000000`00000040 fffff980`040daee0 fffff8a0`03500df0 00000000`00000040 : nt!KiBugCheckDispatch+0x69
fffff880`02392050 fffff800`01cea2b3 : 00000000`00000000 0000007f`fffffff8 fffff880`02392380 fffff800`01ce6d26 : nt!KiPageFault+0x260
fffff880`023921e0 fffff800`01ca70b7 : 00000000`00000001 00000000`00000000 fffff8a0`00535d00 fffff800`00000000 : nt!IopCompleteRequest+0xae3
fffff880`023922b0 fffff800`01ca7477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02392330 fffff800`01d6fd31 : fffff980`015a2fa0 00000000`00000060 fffff880`02392708 fffff980`015a2fa0 : nt!KiApcInterrupt+0xd7
fffff880`023924c0 fffff800`02165624 : 00000000`00000060 ffffffff`800001d4 fffff980`015a2f00 fffff980`015a2fa0 : nt!VfAvlUnlockShared+0x41
fffff880`023924f0 fffff800`01dc10df : 00000000`00000060 fffff980`015a2fa0 fffff800`01f9b6f0 00000000`000007ff : nt!VfCheckForLookaside+0x94
fffff880`02392530 fffff800`01dfd1c1 : 00000000`00000060 00000000`00000000 00000000`0000001c fffff8a0`03500e00 : nt!ExpCheckForLookaside+0x1f
fffff880`02392560 fffff800`02075b7b : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000100 : nt!ExDeferredFreePool+0xd3d
fffff880`02392610 fffff800`020ac611 : fffff880`02392708 00000000`00000002 00000000`00000001 fffff980`015a2fa0 : nt!PipGetRegistrySecurityWithFallback+0x12b
fffff880`023926b0 fffff800`020b67d3 : fffffa80`08fafe00 fffffa80`08f75480 fffff8a0`03427260 fffffa80`07122750 : nt!PipChangeDeviceObjectFromRegistryProperties+0x161
fffff880`023927a0 fffff800`020b7c92 : fffffa80`07115750 fffffa80`07122750 00000000`00000002 fffffa80`07122a20 : nt!PipCallDriverAddDevice+0x733
fffff880`02392950 fffff800`020b812c : fffffa80`08f0b000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02392bc0 fffff800`01dcc3a2 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02392c10 fffff800`01cd7961 : fffff800`01dcc0a0 fffff800`01fc4901 fffffa80`05507000 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02392cb0 fffff800`01f6d7c6 : 00000000`00000000 fffffa80`05507040 00000000`00000080 fffffa80`054c3890 : nt!ExpWorkerThread+0x111
fffff880`02392d40 fffff800`01ca8c26 : fffff880`022a4180 fffffa80`05507040 fffff880`022af0c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02392d80 00000000`00000000 : fffff880`02393000 fffff880`0238d000 fffff880`02391f90 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+d3d
fffff800`01dfd1c1 8b05792b0700    mov     eax,dword ptr [nt!ExpPoolFlags (fffff800`01e6fd40)]

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  nt!ExDeferredFreePool+d3d

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+d3d

BUCKET_ID:  X64_0xA_VRF_nt!ExDeferredFreePool+d3d

Followup: Pool_corruption
---------




DRIVERS

Code:
start             end                 module name
fffff880`00f43000 fffff880`00f9a000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c24000 fffff880`02cae000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`013ce000 fffff880`013d9000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`02ff8000 fffff880`02fff000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03394000 fffff880`033a5000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02f94000 fffff880`02fbe000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d09000 fffff880`00dc9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01659000 fffff880`01689000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cab000 fffff880`00d09000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`016e6000 fffff880`01759000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`01689000 fffff880`01697000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`032f3000 fffff880`03376000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03376000 fffff880`03394000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02de5000 fffff880`02df4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01643000 fffff880`01659000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02f81000 fffff880`02f94000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02e2d000 fffff880`02f81000   dump_iaStor dump_iaStor.sys Sat Nov 06 03:44:52 2010 (4CD50774)
fffff880`04cbc000 fffff880`04db0000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04db0000 fffff880`04df6000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0124c000 fffff880`01260000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01200000 fffff880`0124c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0176a000 fffff880`01774000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01609000 fffff880`01643000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0182b000 fffff880`01875000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`01c11000 fffff800`01c5a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0127a000 fffff880`013ce000   iaStor   iaStor.sys   Sat Nov 06 03:44:52 2010 (4CD50774)
fffff880`010cf000 fffff880`011ed000   iaStorV  iaStorV.sys  Wed Apr 08 12:57:17 2009 (49DCD76D)
fffff880`033cb000 fffff880`033e1000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff800`01a49000 fffff800`01a53000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`015b5000 fffff880`015cf000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01800000 fffff880`0182b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c53000 fffff880`00c97000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`00dc9000 fffff880`00de3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02fbe000 fffff880`02fef000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`016ce000 fffff880`016d9000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fa3000 fffff880`00fad000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dda000 fffff880`02de5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019ea000 fffff880`019fc000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01889000 fffff880`0197b000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02d22000 fffff880`02d31000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cae000 fffff880`02cf3000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0197b000 fffff880`019db000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`015cf000 fffff880`015e0000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dce000 fffff880`02dda000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`01c5a000 fffff800`02237000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01412000 fffff880`015b5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02fef000 fffff880`02ff8000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04cba000 fffff880`04cbb180   nvBridge nvBridge.kmd Fri May 21 19:31:11 2010 (4BF717BF)
fffff880`0404c000 fffff880`04cb9d00   nvlddmkm nvlddmkm.sys Fri May 21 19:35:15 2010 (4BF718B3)
fffff880`02cfc000 fffff880`02d22000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fad000 fffff880`00fe0000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01759000 fffff880`0176a000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c97000 fffff880`00cab000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02d7d000 fffff880`02dce000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02e1e000 fffff880`02e27000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`016bc000 fffff880`016c5000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`016c5000 fffff880`016ce000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`017c0000 fffff880`017fa000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02d31000 fffff880`02d4e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`019e3000 fffff880`019ea000   speedfan speedfan.sys Sun Sep 24 09:26:48 2006 (45168798)
fffff880`019db000 fffff880`019e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01a01000 fffff880`01bfe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`016d9000 fffff880`016e6000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`015e0000 fffff880`015fe000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d69000 fffff880`02d7d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`033a5000 fffff880`033cb000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00fe0000 fffff880`00fed000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02e00000 fffff880`02e0e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01697000 fffff880`016bc000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01875000 fffff880`01885000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01774000 fffff880`017c0000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d4e000 fffff880`02d69000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02e0e000 fffff880`02e1e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e90000 fffff880`00f34000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f34000 fffff880`00f43000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cf3000 fffff880`02cfc000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00f9a000 fffff880`00fa3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top