Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100910-12807-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0304e000 PsLoadedModuleList = 0xfffff800`0328be50
Debug session time: Sun Oct 10 08:58:34.811 2010 (GMT-5)
System Uptime: 0 days 0:03:03.122
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 0, fffff8800167a7c0}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167a7c0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f60e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+270
fffff880`0167a7c0 440fb63401 movzx r14d,byte ptr [rcx+rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88008e26f90 -- (.trap 0xfffff88008e26f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167a7c0 rsp=fffff88008e27120 rbp=fffffa80086724e0
r8=0000000000000006 r9=0000000000000007 r10=0000000000000007
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!IpFlcReceivePreValidatedPackets+0x270:
fffff880`0167a7c0 440fb63401 movzx r14d,byte ptr [rcx+rax] ds:00000000`00000008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030bf469 to fffff800030bff00
STACK_TEXT:
fffff880`08e26e48 fffff800`030bf469 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08e26e50 fffff800`030be0e0 : 00000000`00000000 00000000`00000000 fffff880`01765128 fffffa80`09af3080 : nt!KiBugCheckDispatch+0x69
fffff880`08e26f90 fffff880`0167a7c0 : 00000000`00005000 fffff880`08e265c0 fffffa80`06d45000 00000000`00000002 : nt!KiPageFault+0x260
fffff880`08e27120 fffff880`01672682 : fffffa80`089d8740 fffffa80`08a28010 00000000`00000006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
fffff880`08e27280 fffff800`030cf64a : 00000000`00000000 fffff880`08e22000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`08e272d0 fffff880`016720e2 : fffff880`016725e0 fffff880`08e273e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08e273b0 fffff880`0156f0eb : fffffa80`08a29010 00000000`00000000 fffffa80`081351a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`08e27420 fffff880`01538fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`08e27490 fffff880`014b2ef1 : fffffa80`081351a0 00000000`00000002 00000000`0000000a fffff880`0156f5ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`08e27910 fffff880`0187a219 : fffffa80`0859e000 fffffa80`085f64e0 fffffa80`085f6450 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`08e27960 fffffa80`0859e000 : fffffa80`085f64e0 fffffa80`085f6450 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
fffff880`08e27968 fffffa80`085f64e0 : fffffa80`085f6450 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`0859e000
fffff880`08e27970 fffffa80`085f6450 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`085a2500 : 0xfffffa80`085f64e0
fffff880`08e27978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`085a2500 fffff880`0187a3b4 : 0xfffffa80`085f6450
fffff880`08e27980 fffffa80`00000801 : 00000000`00000009 fffffa80`085a2500 fffff880`0187a3b4 fffffa80`08691300 : 0xa
fffff880`08e27988 00000000`00000009 : fffffa80`085a2500 fffff880`0187a3b4 fffffa80`08691300 fffffa80`085f64e0 : 0xfffffa80`00000801
fffff880`08e27990 fffffa80`085a2500 : fffff880`0187a3b4 fffffa80`08691300 fffffa80`085f64e0 fffffa80`08691350 : 0x9
fffff880`08e27998 fffff880`0187a3b4 : fffffa80`08691300 fffffa80`085f64e0 fffffa80`08691350 00000000`0000000a : 0xfffffa80`085a2500
fffff880`08e279a0 fffffa80`08691300 : fffffa80`085f64e0 fffffa80`08691350 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
fffff880`08e279a8 fffffa80`085f64e0 : fffffa80`08691350 00000000`0000000a 0000000a`00000000 fffffa80`086912c0 : 0xfffffa80`08691300
fffff880`08e279b0 fffffa80`08691350 : 00000000`0000000a 0000000a`00000000 fffffa80`086912c0 00000000`00000000 : 0xfffffa80`085f64e0
fffff880`08e279b8 00000000`0000000a : 0000000a`00000000 fffffa80`086912c0 00000000`00000000 fffff880`08e27c18 : 0xfffffa80`08691350
fffff880`08e279c0 0000000a`00000000 : fffffa80`086912c0 00000000`00000000 fffff880`08e27c18 00000000`00000000 : 0xa
fffff880`08e279c8 fffffa80`086912c0 : 00000000`00000000 fffff880`08e27c18 00000000`00000000 fffffa80`080f9140 : 0xa`00000000
fffff880`08e279d0 00000000`00000000 : fffff880`08e27c18 00000000`00000000 fffffa80`080f9140 00000000`00000000 : 0xfffffa80`086912c0
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`0187a219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101010-10857-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0300e000 PsLoadedModuleList = 0xfffff800`0324be50
Debug session time: Sun Oct 10 11:08:50.680 2010 (GMT-5)
System Uptime: 0 days 0:02:36.007
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 0, fffff8800167ef60}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167ef60, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b60e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+270
fffff880`0167ef60 440fb63401 movzx r14d,byte ptr [rcx+rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88008dc9f90 -- (.trap 0xfffff88008dc9f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167ef60 rsp=fffff88008dca120 rbp=fffffa80085b4d50
r8=0000000000000006 r9=0000000000000010 r10=0000000000000010
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IpFlcReceivePreValidatedPackets+0x270:
fffff880`0167ef60 440fb63401 movzx r14d,byte ptr [rcx+rax] ds:0001:00000000`00000008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307dca9 to fffff8000307e740
STACK_TEXT:
fffff880`08dc9e48 fffff800`0307dca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08dc9e50 fffff800`0307c920 : fffffa80`0857be20 00000000`00000000 fffff880`01767128 fffffa80`078c2f70 : nt!KiBugCheckDispatch+0x69
fffff880`08dc9f90 fffff880`0167ef60 : fffffa80`07ff81a0 fffffa80`08906000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`08dca120 fffff880`01676e22 : fffffa80`08907740 fffffa80`08906010 fffffa80`08900006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
fffff880`08dca280 fffff800`0308de5a : 00000000`00000000 fffff880`08dc5000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`08dca2d0 fffff880`01676882 : fffff880`01676d80 fffff880`08dca3e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08dca3b0 fffff880`0155c0eb : fffffa80`089068d0 00000000`00000000 fffffa80`07ff81a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`08dca420 fffff880`01525fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`08dca490 fffff880`0149fef1 : fffffa80`07ff81a0 00000000`00000002 00000000`0000000a fffff880`0155c5ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`08dca910 fffff880`02cac219 : fffffa80`08421000 fffffa80`084ebd50 fffffa80`085a0c70 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`08dca960 fffffa80`08421000 : fffffa80`084ebd50 fffffa80`085a0c70 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
fffff880`08dca968 fffffa80`084ebd50 : fffffa80`085a0c70 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`08421000
fffff880`08dca970 fffffa80`085a0c70 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`08425500 : 0xfffffa80`084ebd50
fffff880`08dca978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`08425500 fffff880`02cac3b4 : 0xfffffa80`085a0c70
fffff880`08dca980 fffffa80`00000801 : 00000000`00000009 fffffa80`08425500 fffff880`02cac3b4 fffffa80`086a0000 : 0xa
fffff880`08dca988 00000000`00000009 : fffffa80`08425500 fffff880`02cac3b4 fffffa80`086a0000 fffffa80`084ebd50 : 0xfffffa80`00000801
fffff880`08dca990 fffffa80`08425500 : fffff880`02cac3b4 fffffa80`086a0000 fffffa80`084ebd50 fffffa80`086a0030 : 0x9
fffff880`08dca998 fffff880`02cac3b4 : fffffa80`086a0000 fffffa80`084ebd50 fffffa80`086a0030 00000000`0000000a : 0xfffffa80`08425500
fffff880`08dca9a0 fffffa80`086a0000 : fffffa80`084ebd50 fffffa80`086a0030 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
fffff880`08dca9a8 fffffa80`084ebd50 : fffffa80`086a0030 00000000`0000000a 0000000a`00000000 fffffa80`0869f180 : 0xfffffa80`086a0000
fffff880`08dca9b0 fffffa80`086a0030 : 00000000`0000000a 0000000a`00000000 fffffa80`0869f180 00000000`00000000 : 0xfffffa80`084ebd50
fffff880`08dca9b8 00000000`0000000a : 0000000a`00000000 fffffa80`0869f180 00000000`00000000 fffff880`08dcac18 : 0xfffffa80`086a0030
fffff880`08dca9c0 0000000a`00000000 : fffffa80`0869f180 00000000`00000000 fffff880`08dcac18 00000000`00000000 : 0xa
fffff880`08dca9c8 fffffa80`0869f180 : 00000000`00000000 fffff880`08dcac18 00000000`00000000 fffffa80`08125150 : 0xa`00000000
fffff880`08dca9d0 00000000`00000000 : fffff880`08dcac18 00000000`00000000 fffffa80`08125150 00000000`00000000 : 0xfffffa80`0869f180
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`02cac219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101010-10951-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03064000 PsLoadedModuleList = 0xfffff800`032a1e50
Debug session time: Sun Oct 10 11:45:18.040 2010 (GMT-5)
System Uptime: 0 days 0:25:42.351
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 0, fffff8800167ff60}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167ff60, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330c0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+270
fffff880`0167ff60 440fb63401 movzx r14d,byte ptr [rcx+rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880082a7f90 -- (.trap 0xfffff880082a7f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167ff60 rsp=fffff880082a8120 rbp=fffffa80082d2d50
r8=0000000000000006 r9=0000000000000007 r10=0000000000000007
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IpFlcReceivePreValidatedPackets+0x270:
fffff880`0167ff60 440fb63401 movzx r14d,byte ptr [rcx+rax] ds:afe8:00000000`00000008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d3ca9 to fffff800030d4740
STACK_TEXT:
fffff880`082a7e48 fffff800`030d3ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`082a7e50 fffff800`030d2920 : 00000000`00000000 00000000`00000000 fffff880`01768128 fffffa80`07a27000 : nt!KiBugCheckDispatch+0x69
fffff880`082a7f90 fffff880`0167ff60 : 00000000`00005000 fffffa80`069915c4 00000000`cefa5000 fffff880`03b04000 : nt!KiPageFault+0x260
fffff880`082a8120 fffff880`01677e22 : fffffa80`0829e750 fffffa80`0829a010 fffffa80`08290006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
fffff880`082a8280 fffff800`030e3e5a : 00000000`00000000 fffff880`082a3000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`082a82d0 fffff880`01677882 : fffff880`01677d80 fffff880`082a83e0 fffffa80`06995302 fffff8a0`01992470 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`082a83b0 fffff880`015610eb : fffffa80`0829e010 00000000`00000000 fffffa80`074211a0 fffff800`030ecf8f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`082a8420 fffff880`0152afc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`082a8490 fffff880`014a4ef1 : fffffa80`074211a0 00000000`00000002 00000000`0000000a fffff880`015615ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`082a8910 fffff880`11e21219 : fffffa80`08188000 fffffa80`0817ec30 fffffa80`0817d180 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`082a8960 fffffa80`08188000 : fffffa80`0817ec30 fffffa80`0817d180 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
fffff880`082a8968 fffffa80`0817ec30 : fffffa80`0817d180 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`08188000
fffff880`082a8970 fffffa80`0817d180 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`0818c500 : 0xfffffa80`0817ec30
fffff880`082a8978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`0818c500 fffff880`11e213b4 : 0xfffffa80`0817d180
fffff880`082a8980 fffffa80`00000801 : 00000000`00000009 fffffa80`0818c500 fffff880`11e213b4 fffffa80`0817d900 : 0xa
fffff880`082a8988 00000000`00000009 : fffffa80`0818c500 fffff880`11e213b4 fffffa80`0817d900 fffffa80`0817ec30 : 0xfffffa80`00000801
fffff880`082a8990 fffffa80`0818c500 : fffff880`11e213b4 fffffa80`0817d900 fffffa80`0817ec30 fffffa80`0817d950 : 0x9
fffff880`082a8998 fffff880`11e213b4 : fffffa80`0817d900 fffffa80`0817ec30 fffffa80`0817d950 00000000`0000000a : 0xfffffa80`0818c500
fffff880`082a89a0 fffffa80`0817d900 : fffffa80`0817ec30 fffffa80`0817d950 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
fffff880`082a89a8 fffffa80`0817ec30 : fffffa80`0817d950 00000000`0000000a 0000000a`00000000 fffffa80`0817d8c0 : 0xfffffa80`0817d900
fffff880`082a89b0 fffffa80`0817d950 : 00000000`0000000a 0000000a`00000000 fffffa80`0817d8c0 00000000`00000000 : 0xfffffa80`0817ec30
fffff880`082a89b8 00000000`0000000a : 0000000a`00000000 fffffa80`0817d8c0 00000000`00000000 fffff880`082a8c18 : 0xfffffa80`0817d950
fffff880`082a89c0 0000000a`00000000 : fffffa80`0817d8c0 00000000`00000000 fffff880`082a8c18 00000000`00000000 : 0xa
fffff880`082a89c8 fffffa80`0817d8c0 : 00000000`00000000 fffff880`082a8c18 00000000`00000000 fffffa80`07cea430 : 0xa`00000000
fffff880`082a89d0 00000000`00000000 : fffff880`082a8c18 00000000`00000000 fffffa80`07cea430 00000000`00000000 : 0xfffffa80`0817d8c0
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`11e21219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101010-14430-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
Debug session time: Sun Oct 10 11:55:50.356 2010 (GMT-5)
System Uptime: 0 days 0:09:57.306
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {9, 2, 0, fffff8800167cdb6}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167cdb6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032aa0e0
0000000000000009
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+c6
fffff880`0167cdb6 0fb60411 movzx eax,byte ptr [rcx+rdx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88007ce9f90 -- (.trap 0xfffff88007ce9f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80078d1820 rbx=0000000000000000 rcx=0000000000000009
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167cdb6 rsp=fffff88007cea120 rbp=fffffa800823cbc0
r8=0000000000000010 r9=0000000000000009 r10=0000000000000009
r11=fffffa80084519a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip!IpFlcReceivePreValidatedPackets+0xc6:
fffff880`0167cdb6 0fb60411 movzx eax,byte ptr [rcx+rdx] ds:4fb8:00000000`00000009=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003071ca9 to fffff80003072740
STACK_TEXT:
fffff880`07ce9e48 fffff800`03071ca9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07ce9e50 fffff800`03070920 : fffffa80`08261140 00000000`00000000 fffff880`01765128 1f1f1f1f`1f1f1f1f : nt!KiBugCheckDispatch+0x69
fffff880`07ce9f90 fffff880`0167cdb6 : 27272727`27275000 27272727`272700c1 28282828`28285000 28282828`28282828 : nt!KiPageFault+0x260
fffff880`07cea120 fffff880`01674e22 : fffffa80`08174550 fffffa80`08174550 00000000`00000002 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0xc6
fffff880`07cea280 fffff800`03081e5a : 00000000`00000000 fffff880`07ce5000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`07cea2d0 fffff880`01674882 : fffff880`01674d80 fffff880`07cea3e0 20202020`1f1f1f02 20202020`20202020 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`07cea3b0 fffff880`015ae0eb : fffffa80`07ed98d0 00000000`00000000 fffffa80`0809a1a0 27272727`26262626 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`07cea420 fffff880`01577fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`07cea490 fffff880`014f1ef1 : fffffa80`0809a1a0 00000000`00000002 00000000`0000000a 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`07cea910 fffff880`11e21219 : fffffa80`08282000 fffffa80`0823cbc0 fffffa80`0823cb30 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`07cea960 fffffa80`08282000 : fffffa80`0823cbc0 fffffa80`0823cb30 00000000`0000000a fffffa80`00000801 : e1q62x64+0x21219
fffff880`07cea968 fffffa80`0823cbc0 : fffffa80`0823cb30 00000000`0000000a fffffa80`00000801 00000000`00000009 : 0xfffffa80`08282000
fffff880`07cea970 fffffa80`0823cb30 : 00000000`0000000a fffffa80`00000801 00000000`00000009 fffffa80`08286500 : 0xfffffa80`0823cbc0
fffff880`07cea978 00000000`0000000a : fffffa80`00000801 00000000`00000009 fffffa80`08286500 fffff880`11e213b4 : 0xfffffa80`0823cb30
fffff880`07cea980 fffffa80`00000801 : 00000000`00000009 fffffa80`08286500 fffff880`11e213b4 fffffa80`08268900 : 0xa
fffff880`07cea988 00000000`00000009 : fffffa80`08286500 fffff880`11e213b4 fffffa80`08268900 fffffa80`0823cbc0 : 0xfffffa80`00000801
fffff880`07cea990 fffffa80`08286500 : fffff880`11e213b4 fffffa80`08268900 fffffa80`0823cbc0 fffffa80`082689b0 : 0x9
fffff880`07cea998 fffff880`11e213b4 : fffffa80`08268900 fffffa80`0823cbc0 fffffa80`082689b0 00000000`0000000a : 0xfffffa80`08286500
fffff880`07cea9a0 fffffa80`08268900 : fffffa80`0823cbc0 fffffa80`082689b0 00000000`0000000a 0000000a`00000000 : e1q62x64+0x213b4
fffff880`07cea9a8 fffffa80`0823cbc0 : fffffa80`082689b0 00000000`0000000a 0000000a`00000000 fffffa80`08268920 : 0xfffffa80`08268900
fffff880`07cea9b0 fffffa80`082689b0 : 00000000`0000000a 0000000a`00000000 fffffa80`08268920 00000000`00000000 : 0xfffffa80`0823cbc0
fffff880`07cea9b8 00000000`0000000a : 0000000a`00000000 fffffa80`08268920 00000000`00000000 fffff880`07ceac18 : 0xfffffa80`082689b0
fffff880`07cea9c0 0000000a`00000000 : fffffa80`08268920 00000000`00000000 fffff880`07ceac18 00000000`00000000 : 0xa
fffff880`07cea9c8 fffffa80`08268920 : 00000000`00000000 fffff880`07ceac18 00000000`00000000 fffffa80`07c8c870 : 0xa`00000000
fffff880`07cea9d0 00000000`00000000 : fffff880`07ceac18 00000000`00000000 fffffa80`07c8c870 00000000`00000000 : 0xfffffa80`08268920
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`11e21219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101010-15912-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03000000 PsLoadedModuleList = 0xfffff800`0323de50
Debug session time: Sun Oct 10 10:59:11.137 2010 (GMT-5)
System Uptime: 0 days 0:39:07.464
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 0, fffff8800167df60}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167df60, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a80e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+270
fffff880`0167df60 440fb63401 movzx r14d,byte ptr [rcx+rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88003ccdf90 -- (.trap 0xfffff88003ccdf90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167df60 rsp=fffff88003cce120 rbp=fffffa8008876540
r8=0000000000000006 r9=0000000000000002 r10=0000000000000002
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!IpFlcReceivePreValidatedPackets+0x270:
fffff880`0167df60 440fb63401 movzx r14d,byte ptr [rcx+rax] ds:1fe8:00000000`00000008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000306fca9 to fffff80003070740
STACK_TEXT:
fffff880`03ccde48 fffff800`0306fca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03ccde50 fffff800`0306e920 : fffffa80`08888540 00000000`00000000 fffff880`01766128 fffffa80`07a48000 : nt!KiBugCheckDispatch+0x69
fffff880`03ccdf90 fffff880`0167df60 : 00000000`00009669 fffff880`03cc90c1 00000000`ffff9669 00000000`00000001 : nt!KiPageFault+0x260
fffff880`03cce120 fffff880`01675e22 : fffffa80`088bbc00 fffffa80`088b7010 fffffa80`088b0006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
fffff880`03cce280 fffff800`0307fe5a : 00000000`00000000 fffff880`03cc9000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`03cce2d0 fffff880`01675882 : fffff880`01675d80 fffff880`03cce3e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`03cce3b0 fffff880`014c90eb : fffffa80`088b3010 00000000`00000000 fffffa80`07fe61a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`03cce420 fffff880`01492fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`03cce490 fffff880`0140cef1 : fffffa80`07fe61a0 00000000`00000002 00000000`00000007 fffff880`014c95ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`03cce910 fffff880`04c47219 : fffffa80`084b5000 fffffa80`088903c0 fffffa80`08890330 00000000`00000007 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`03cce960 fffffa80`084b5000 : fffffa80`088903c0 fffffa80`08890330 00000000`00000007 00000000`00000801 : e1q62x64+0x21219
fffff880`03cce968 fffffa80`088903c0 : fffffa80`08890330 00000000`00000007 00000000`00000801 00000000`00000007 : 0xfffffa80`084b5000
fffff880`03cce970 fffffa80`08890330 : 00000000`00000007 00000000`00000801 00000000`00000007 fffffa80`084b9500 : 0xfffffa80`088903c0
fffff880`03cce978 00000000`00000007 : 00000000`00000801 00000000`00000007 fffffa80`084b9500 fffff880`04c473b4 : 0xfffffa80`08890330
fffff880`03cce980 00000000`00000801 : 00000000`00000007 fffffa80`084b9500 fffff880`04c473b4 00000000`00000001 : 0x7
fffff880`03cce988 00000000`00000007 : fffffa80`084b9500 fffff880`04c473b4 00000000`00000001 fffffa80`088903c0 : 0x801
fffff880`03cce990 fffffa80`084b9500 : fffff880`04c473b4 00000000`00000001 fffffa80`088903c0 fffffa80`087f3c30 : 0x7
fffff880`03cce998 fffff880`04c473b4 : 00000000`00000001 fffffa80`088903c0 fffffa80`087f3c30 00000000`00000007 : 0xfffffa80`084b9500
fffff880`03cce9a0 00000000`00000001 : fffffa80`088903c0 fffffa80`087f3c30 00000000`00000007 0000000a`00000001 : e1q62x64+0x213b4
fffff880`03cce9a8 fffffa80`088903c0 : fffffa80`087f3c30 00000000`00000007 0000000a`00000001 00000000`00000000 : 0x1
fffff880`03cce9b0 fffffa80`087f3c30 : 00000000`00000007 0000000a`00000001 00000000`00000000 00000000`00000000 : 0xfffffa80`088903c0
fffff880`03cce9b8 00000000`00000007 : 0000000a`00000001 00000000`00000000 00000000`00000000 fffff880`03ccec18 : 0xfffffa80`087f3c30
fffff880`03cce9c0 0000000a`00000001 : 00000000`00000000 00000000`00000000 fffff880`03ccec18 00000000`00000000 : 0x7
fffff880`03cce9c8 00000000`00000000 : 00000000`00000000 fffff880`03ccec18 00000000`00000000 fffffa80`081fd9b0 : 0xa`00000001
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`04c47219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------
Loaded symbol image file: e1q62x64.sys
Image path: \SystemRoot\system32\DRIVERS\e1q62x64.sys
Image name: e1q62x64.sys
Timestamp: Thu Nov 05 20:23:03 2009 (4AF31807)
CheckSum: 0004943F
ImageSize: 0004A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
start end module name
fffff800`00bb1000 fffff800`00bbb000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`03000000 fffff800`035dc000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`035dc000 fffff800`03625000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c0f000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00c1a000 fffff880`00c27000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00c27000 fffff880`00c3b000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00c3b000 fffff880`00c99000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00c99000 fffff880`00d59000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00d59000 fffff880`00dfd000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00e02000 fffff880`00e59000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00e59000 fffff880`00e62000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e62000 fffff880`00e6c000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00e6c000 fffff880`00e9f000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e9f000 fffff880`00eac000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00eac000 fffff880`00ec1000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00ec1000 fffff880`00ed6000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00ed6000 fffff880`00f32000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00f32000 fffff880`00f39000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00f39000 fffff880`00f49000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00f49000 fffff880`00f69000 jraid jraid.sys Mon Jan 11 13:28:18 2010 (4B4B0B52)
fffff880`00f69000 fffff880`00f98000 SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`00f98000 fffff880`00fb2000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fb2000 fffff880`00fbb000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00fbb000 fffff880`00fe5000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00fe5000 fffff880`00ff0000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`01000000 fffff880`01073000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01073000 fffff880`010bf000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`010dc000 fffff880`01128000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`01128000 fffff880`0113c000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`0113c000 fffff880`0119a000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`0119a000 fffff880`011d4000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01211000 fffff880`013b4000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013b4000 fffff880`013ce000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`013ce000 fffff880`013df000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`013df000 fffff880`013e9000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`01409000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`0140b000 fffff880`014fd000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`014fd000 fffff880`0155d000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`0155d000 fffff880`01588000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`01588000 fffff880`015d2000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`015d2000 fffff880`015e2000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`015e2000 fffff880`015ea000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`015ea000 fffff880`015fc000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`0182e000 fffff880`01868000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01868000 fffff880`0187e000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0187e000 fffff880`018ae000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`018e4000 fffff880`0190e000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`0190e000 fffff880`01917000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`01917000 fffff880`0191e000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`0191e000 fffff880`0192c000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`0192c000 fffff880`01951000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`01951000 fffff880`01961000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01961000 fffff880`0196a000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`0196a000 fffff880`01973000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01973000 fffff880`0197c000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0197c000 fffff880`01987000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01987000 fffff880`01998000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01998000 fffff880`019b6000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`019b6000 fffff880`019c3000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02c2d000 fffff880`02cb7000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02cb7000 fffff880`02cfc000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02cfc000 fffff880`02d05000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d05000 fffff880`02d2b000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02d2b000 fffff880`02d3a000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d3a000 fffff880`02d55000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02d55000 fffff880`02d69000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`02d69000 fffff880`02dba000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`02dba000 fffff880`02dc6000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`02dc6000 fffff880`02dd1000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`02dd1000 fffff880`02de0000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`04015000 fffff880`04098000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`04098000 fffff880`040b6000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`040b6000 fffff880`040c7000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`040c7000 fffff880`040cd000 AsUpIO AsUpIO.sys Mon Jul 06 05:21:38 2009 (4A515FB2)
fffff880`040cd000 fffff880`040d3000 AsIO AsIO.sys Mon Jun 28 08:19:38 2010 (4C2830EA)
fffff880`040d3000 fffff880`040f9000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`040f9000 fffff880`0410e000 amdppm amdppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`0410e000 fffff880`04132000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04132000 fffff880`04162000 nusb3xhc nusb3xhc.sys Fri Apr 23 04:34:36 2010 (4BD0F92C)
fffff880`04162000 fffff880`041b8000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`041b8000 fffff880`041c0000 ASACPI ASACPI.sys Thu Jul 16 06:31:29 2009 (4A5E9F11)
fffff880`04200000 fffff880`04205200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`04206000 fffff880`04244000 1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`04245000 fffff880`04316d80 ctaud2k ctaud2k.sys Thu Mar 18 14:18:42 2010 (4BA21A22)
fffff880`04317000 fffff880`04354000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`04354000 fffff880`04376000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`04376000 fffff880`043b9000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`043b9000 fffff880`043f4000 ctoss2k ctoss2k.sys Thu Mar 18 14:17:56 2010 (4BA219F4)
fffff880`043f4000 fffff880`043fc000 ctprxy2k ctprxy2k.sys Thu Mar 18 14:18:45 2010 (4BA21A25)
fffff880`04c26000 fffff880`04c70000 e1q62x64 e1q62x64.sys Thu Nov 05 20:23:03 2009 (4AF31807)
fffff880`04c70000 fffff880`04c79000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`04c79000 fffff880`04c89000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`04c89000 fffff880`04c9f000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04c9f000 fffff880`04cc3000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04cc3000 fffff880`04ccf000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04ccf000 fffff880`04cfe000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04cfe000 fffff880`04d19000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04d19000 fffff880`04d3a000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04d3a000 fffff880`04d54000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04d54000 fffff880`04d5f000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`04d5f000 fffff880`04d6e000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04d6e000 fffff880`04d7d000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04d7d000 fffff880`04d7e480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04d7f000 fffff880`04d91000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04d91000 fffff880`04da9000 nusb3hub nusb3hub.sys Fri Apr 23 04:34:35 2010 (4BD0F92B)
fffff880`0503a000 fffff880`05094000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05094000 fffff880`050d6000 hap16v2k hap16v2k.sys Thu Mar 18 14:18:03 2010 (4BA219FB)
fffff880`050d6000 fffff880`05128000 emupia2k emupia2k.sys Thu Mar 18 14:17:45 2010 (4BA219E9)
fffff880`05128000 fffff880`05172000 ctsfm2k ctsfm2k.sys Thu Mar 18 14:17:48 2010 (4BA219EC)
fffff880`05837000 fffff880`059f0000 ha10kx2k ha10kx2k.sys Thu Mar 18 14:17:59 2010 (4BA219F7)
fffff880`05c13000 fffff880`05cc1000 ctac32k ctac32k.sys Thu Mar 18 14:20:26 2010 (4BA21A8A)
fffff880`05cc1000 fffff880`05cec000 COMMONFX COMMONFX.SYS Thu Mar 18 14:19:04 2010 (4BA21A38)
fffff880`05cec000 fffff880`05d97000 CTSBLFX CTSBLFX.SYS Thu Mar 18 14:19:13 2010 (4BA21A41)
fffff880`05e53000 fffff880`05f03000 CTAUDFX CTAUDFX.SYS Thu Mar 18 14:19:07 2010 (4BA21A3B)
fffff880`05f03000 fffff880`05f18000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05f18000 fffff880`05f3b000 nvhda64v nvhda64v.sys Tue Jun 22 01:07:25 2010 (4C1FE29D)
fffff880`05f3b000 fffff880`05fe1000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`0620a000 fffff880`062d2000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`062d2000 fffff880`062f0000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`062f0000 fffff880`06308000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`06308000 fffff880`06335000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`06335000 fffff880`06383000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`06383000 fffff880`063a6000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`063a6000 fffff880`063b1000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`063b1000 fffff880`063de000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`063de000 fffff880`063f0000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0642c000 fffff880`06652300 RTKVHD64 RTKVHD64.sys Fri Jan 29 08:48:35 2010 (4B6284C3)
fffff880`06653000 fffff880`0665f000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`0665f000 fffff880`0666d000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`0666d000 fffff880`0668a000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`0668a000 fffff880`06698000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`06698000 fffff880`066b1000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`066b1000 fffff880`066b9080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`066ba000 fffff880`066c7000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`066c7000 fffff880`066d5000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`066d5000 fffff880`066f2000 cdfs cdfs.sys Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`06728000 fffff880`0674b000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`0674b000 fffff880`06760000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`06760000 fffff880`06778000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`06778000 fffff880`067e0000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`072b6000 fffff880`0734c000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`07374000 fffff880`07382000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`07382000 fffff880`0738e000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0738e000 fffff880`07397000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`07397000 fffff880`073aa000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`073bd000 fffff880`073c8000 asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`11e00000 fffff880`11e46000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`11e46000 fffff880`11e47f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`11e48000 fffff880`11e55000 usbfilter usbfilter.sys Tue Dec 22 10:26:22 2009 (4B3082AE)
fffff880`11e5c000 fffff880`12aede00 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`12aee000 fffff880`12aef180 nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`12af0000 fffff880`12be4000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`12be4000 fffff880`12bef000 usbohci usbohci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`12bef000 fffff880`12c00000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff960`00010000 fffff960`0031f000 win32k win32k.sys unavailable (00000000)
fffff960`00450000 fffff960`0045a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00690000 fffff960`006b7000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`07200000 fffff880`07271000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07200000 fffff880`07271000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07200000 fffff880`07271000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`072a7000 fffff880`072b5000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0734c000 fffff880`07358000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07358000 fffff880`07361000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07361000 fffff880`07374000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07271000 fffff880`0727f000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0727f000 fffff880`0728b000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0728b000 fffff880`07294000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07294000 fffff880`072a7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`066f2000 fffff880`06700000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`06700000 fffff880`0670c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0670c000 fffff880`06715000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`06715000 fffff880`06728000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0734c000 fffff880`073bd000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018ae000 fffff880`018bc000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018bc000 fffff880`018c8000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018c8000 fffff880`018d1000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018d1000 fffff880`018e4000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000