Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100910-14679-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time: Sat Oct 9 09:02:13.719 2010 (GMT-5)
System Uptime: 0 days 0:01:18.499
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C9, {20e, fffff880076ee432, fffff98011bf0ea0, 0}
Unable to load image \??\C:\Users\Luke\Documents\AMD_Chipset_V51010008V13049_XPVistaWin7\Win 7\Bin64\atdcm64a.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atdcm64a.sys
*** ERROR: Module load completed but symbols could not be loaded for atdcm64a.sys
Probably caused by : atdcm64a.sys ( atdcm64a+2432 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000020e, A PNP IRP has an invalid status. Any PNP IRP must have its status initialized
to STATUS_NOT_SUPPORTED.
Arg2: fffff880076ee432, The address in the driver's code where the error was detected.
Arg3: fffff98011bf0ea0, IRP address.
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc9_20e
DRIVER_VERIFIER_IO_VIOLATION_TYPE: 20e
FAULTING_IP:
atdcm64a+2432
fffff880`076ee432 89442478 mov dword ptr [rsp+78h],eax
FOLLOWUP_IP:
atdcm64a+2432
fffff880`076ee432 89442478 mov dword ptr [rsp+78h],eax
IRP_ADDRESS: fffff98011bf0ea0
DEVICE_OBJECT: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: InstallManager
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002f193dc to fffff80002a8f740
STACK_TEXT:
fffff880`09701368 fffff800`02f193dc : 00000000`000000c9 00000000`0000020e fffff880`076ee432 fffff980`11bf0ea0 : nt!KeBugCheckEx
fffff880`09701370 fffff800`02f2347a : fffff800`02f179f0 fffff880`076ee432 fffff980`11bf0ea0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`097013b0 fffff800`02f24483 : 00000000`0000020e 00000000`00000000 fffff980`11bf0ea0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`09701400 fffff800`02f25115 : 00000000`00000000 fffffa80`056ff902 fffff980`11bf0ea0 fffff800`02f1ae56 : nt!VfErrorReport1+0x63
fffff880`097014a0 fffff800`02f191e0 : fffff980`11bf0fb8 fffffa80`07012e50 00000000`00000000 fffff800`02f27e3f : nt!VfPnpVerifyNewRequest+0x45
fffff880`097014d0 fffff800`02f31b33 : fffffa80`056ff980 fffffa80`07012e50 fffff980`11bf0ea0 fffffa80`06d51150 : nt!VfMajorVerifyNewRequest+0x70
fffff880`09701520 fffff800`02f31d86 : 004d0041`00000001 fffffa80`00000001 fffffa80`00000001 fffff880`076ee432 : nt!IovpCallDriver1+0x483
fffff880`097015d0 fffff800`02f35bb2 : fffff980`11bf0ea0 00000000`00000002 fffff980`11bf0ea0 fffff800`02cfc00c : nt!VfBeforeCallDriver+0x186
fffff880`09701630 fffff880`076ee432 : fffff980`11a04ee0 00000000`00000002 fffffa80`05f9ba20 fffffa80`0734c260 : nt!IovCallDriver+0x502
fffff880`09701690 fffff980`11a04ee0 : 00000000`00000002 fffffa80`05f9ba20 fffffa80`0734c260 00000000`00000000 : atdcm64a+0x2432
fffff880`09701698 00000000`00000002 : fffffa80`05f9ba20 fffffa80`0734c260 00000000`00000000 fffff880`097016f0 : 0xfffff980`11a04ee0
fffff880`097016a0 fffffa80`05f9ba20 : fffffa80`0734c260 00000000`00000000 fffff880`097016f0 fffff880`097016e0 : 0x2
fffff880`097016a8 fffffa80`0734c260 : 00000000`00000000 fffff880`097016f0 fffff880`097016e0 00000000`00000000 : 0xfffffa80`05f9ba20
fffff880`097016b0 00000000`00000000 : fffff880`097016f0 fffff880`097016e0 00000000`00000000 fffff980`11bf0ea0 : 0xfffffa80`0734c260
STACK_COMMAND: kb
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: atdcm64a+2432
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atdcm64a
IMAGE_NAME: atdcm64a.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a43f28f
FAILURE_BUCKET_ID: X64_0xc9_20e_VRF_atdcm64a+2432
BUCKET_ID: X64_0xc9_20e_VRF_atdcm64a+2432
Followup: MachineOwner
---------
3: kd> lmvm atdcm64a
start end module name
fffff880`076ec000 fffff880`076f6000 atdcm64a T (no symbols)
Loaded symbol image file: atdcm64a.sys
Image path: \??\C:\Users\Luke\Documents\AMD_Chipset_V51010008V13049_XPVistaWin7\Win 7\Bin64\atdcm64a.sys
Image name: atdcm64a.sys
Timestamp: Fri Jun 26 00:56:31 2009 (4A43F28F)
CheckSum: 0000B83F
ImageSize: 0000A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101410-16099-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c87e50
Debug session time: Thu Oct 14 17:02:45.128 2010 (GMT-5)
System Uptime: 0 days 0:02:34.907
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8a0022fcfe0, 2, 0, fffff8800618e26d}
Unable to load image \SystemRoot\system32\DRIVERS\RzSynapse.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RzSynapse.sys
*** ERROR: Module load completed but symbols could not be loaded for RzSynapse.sys
Probably caused by : RzSynapse.sys ( RzSynapse+426d )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8a0022fcfe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800618e26d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf20e0
fffff8a0022fcfe0
CURRENT_IRQL: 2
FAULTING_IP:
RzSynapse+426d
fffff880`0618e26d 833804 cmp dword ptr [rax],4
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002dfd240 -- (.trap 0xfffff88002dfd240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0022fcfe0 rbx=0000000000000000 rcx=fffffa8006ddd270
rdx=fffff88002dfd370 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800618e26d rsp=fffff88002dfd3d0 rbp=fffffa8004aab390
r8=0000057ff9222de8 r9=000000000000100a r10=fffffa80064b14f0
r11=fffff88002dfd388 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
RzSynapse+0x426d:
fffff880`0618e26d 833804 cmp dword ptr [rax],4 ds:d3d0:fffff8a0`022fcfe0=00000002
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ab9ca9 to fffff80002aba740
STACK_TEXT:
fffff880`02dfd0f8 fffff800`02ab9ca9 : 00000000`0000000a fffff8a0`022fcfe0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02dfd100 fffff800`02ab8920 : fffff880`02dd9f40 fffffa80`0713ff00 00000202`0018002b 00000000`80000000 : nt!KiBugCheckDispatch+0x69
fffff880`02dfd240 fffff880`0618e26d : fffffa80`06ddd270 fffffa80`0713ff00 fffffa80`0713ff00 0000057f`f8ec01e8 : nt!KiPageFault+0x260
fffff880`02dfd3d0 fffffa80`06ddd270 : fffffa80`0713ff00 fffffa80`0713ff00 0000057f`f8ec01e8 0000057f`fb97f0a8 : RzSynapse+0x426d
fffff880`02dfd3d8 fffffa80`0713ff00 : fffffa80`0713ff00 0000057f`f8ec01e8 0000057f`fb97f0a8 fffff880`0618e09b : 0xfffffa80`06ddd270
fffff880`02dfd3e0 fffffa80`0713ff00 : 0000057f`f8ec01e8 0000057f`fb97f0a8 fffff880`0618e09b 0000057f`fb554fd8 : 0xfffffa80`0713ff00
fffff880`02dfd3e8 0000057f`f8ec01e8 : 0000057f`fb97f0a8 fffff880`0618e09b 0000057f`fb554fd8 0000057f`fb554fd8 : 0xfffffa80`0713ff00
fffff880`02dfd3f0 0000057f`fb97f0a8 : fffff880`0618e09b 0000057f`fb554fd8 0000057f`fb554fd8 05000000`014a0000 : 0x57f`f8ec01e8
fffff880`02dfd3f8 fffff880`0618e09b : 0000057f`fb554fd8 0000057f`fb554fd8 05000000`014a0000 00000000`00000000 : 0x57f`fb97f0a8
fffff880`02dfd400 0000057f`fb554fd8 : 0000057f`fb554fd8 05000000`014a0000 00000000`00000000 00000000`00000000 : RzSynapse+0x409b
fffff880`02dfd408 0000057f`fb554fd8 : 05000000`014a0000 00000000`00000000 00000000`00000000 fffff880`0618ffde : 0x57f`fb554fd8
fffff880`02dfd410 05000000`014a0000 : 00000000`00000000 00000000`00000000 fffff880`0618ffde fffffa80`04af2de0 : 0x57f`fb554fd8
fffff880`02dfd418 00000000`00000000 : 00000000`00000000 fffff880`0618ffde fffffa80`04af2de0 00000000`00000000 : 0x5000000`014a0000
STACK_COMMAND: kb
FOLLOWUP_IP:
RzSynapse+426d
fffff880`0618e26d 833804 cmp dword ptr [rax],4
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: RzSynapse+426d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RzSynapse
IMAGE_NAME: RzSynapse.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bceaef1
FAILURE_BUCKET_ID: X64_0xD1_VRF_RzSynapse+426d
BUCKET_ID: X64_0xD1_VRF_RzSynapse+426d
Followup: MachineOwner
---------
3: kd> lmvm RzSynapse
start end module name
fffff880`0618a000 fffff880`061a2000 RzSynapse T (no symbols)
Loaded symbol image file: RzSynapse.sys
Image path: \SystemRoot\system32\DRIVERS\RzSynapse.sys
Image name: RzSynapse.sys
Timestamp: Wed Apr 21 10:53:21 2010 (4BCEAEF1)
CheckSum: 0001A940
ImageSize: 00018000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100910-18720-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
Debug session time: Sat Oct 9 03:43:00.130 2010 (GMT-5)
System Uptime: 0 days 0:01:27.519
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {6535dd8, 2, 0, fffff88003fc45c4}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiExecuteMmIoFlip+98 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000006535dd8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003fc45c4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
0000000006535dd8
CURRENT_IRQL: 2
FAULTING_IP:
dxgmms1!VidSchiExecuteMmIoFlip+98
fffff880`03fc45c4 8b8638040000 mov eax,dword ptr [rsi+438h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002ffb160 -- (.trap 0xfffff88002ffb160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002ffb388 rbx=0000000000000000 rcx=fffff88002ffb5c8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003fc45c4 rsp=fffff88002ffb2f0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa8006530000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgmms1!VidSchiExecuteMmIoFlip+0x98:
fffff880`03fc45c4 8b8638040000 mov eax,dword ptr [rsi+438h] ds:0002:00000000`00000438=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad0ca9 to fffff80002ad1740
STACK_TEXT:
fffff880`02ffb018 fffff800`02ad0ca9 : 00000000`0000000a 00000000`06535dd8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02ffb020 fffff800`02acf920 : 00000000`00000000 00000000`00000014 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ffb160 fffff880`03fc45c4 : 00000000`00040000 00000000`00000013 00000000`00000004 fffff880`02ff6000 : nt!KiPageFault+0x260
fffff880`02ffb2f0 fffff880`03fc4a0e : fffffa80`05af3000 00000000`00000000 00000000`00000014 00000000`00000001 : dxgmms1!VidSchiExecuteMmIoFlip+0x98
fffff880`02ffb610 fffff880`03fc1638 : fffffa80`05ba5410 fffffa80`060aa9f0 fffffa80`060a5010 fffff880`04871370 : dxgmms1!VidSchUnwaitFlipQueue+0x146
fffff880`02ffb660 fffff880`03fc0e00 : 00000000`00000000 fffffa80`00000013 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiProcessDpcCompletedPacket+0x214
fffff880`02ffb700 fffff880`03fc0c4c : fffffa80`06423b60 fffffa80`03a2b410 fffffa80`05ab98d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpcWorker+0x198
fffff880`02ffb750 fffff880`03ec71cf : fffffa80`05123480 fffffa80`047fe1b0 fffffa80`047fe1b0 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpc+0x94
fffff880`02ffb7a0 fffff880`048613ec : fffffa80`047fe060 00000000`00000000 fffffa80`049d2010 fffff880`01994947 : dxgkrnl!DxgNotifyDpcCB+0x77
fffff880`02ffb7d0 fffffa80`047fe060 : 00000000`00000000 fffffa80`049d2010 fffff880`01994947 fffffa80`00000001 : atikmdag+0x553ec
fffff880`02ffb7d8 00000000`00000000 : fffffa80`049d2010 fffff880`01994947 fffffa80`00000001 fffff880`04871370 : 0xfffffa80`047fe060
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiExecuteMmIoFlip+98
fffff880`03fc45c4 8b8638040000 mov eax,dword ptr [rsi+438h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiExecuteMmIoFlip+98
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiExecuteMmIoFlip+98
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiExecuteMmIoFlip+98
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100810-15662-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0c000 PsLoadedModuleList = 0xfffff800`02c49e50
Debug session time: Fri Oct 8 15:39:25.362 2010 (GMT-5)
System Uptime: 0 days 0:49:29.141
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88008849d88, fffff880088495f0, fffff880010716ce}
Probably caused by : Ntfs.sys ( Ntfs!NtfsClearCancelRoutine+16 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88008849d88
Arg3: fffff880088495f0
Arg4: fffff880010716ce
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88008849d88 -- (.exr 0xfffff88008849d88)
ExceptionAddress: fffff880010716ce (Ntfs!NtfsClearCancelRoutine+0x0000000000000016)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880088495f0 -- (.cxr 0xfffff880088495f0)
rax=0000000000000000 rbx=effffa80045eac10 rcx=fffff88002d63860
rdx=0000000000000000 rsi=fffffa80049d05d0 rdi=fffff8800884a730
rip=fffff880010716ce rsp=fffff88008849fc0 rbp=fffff8800884a980
r8=fffffa8004a10e90 r9=0000000000000000 r10=fffff88002d63ca0
r11=fffffa800442eae0 r12=fffff8a00019ab60 r13=fffffa80060c9190
r14=fffff8a00019ad30 r15=fffff8a01180c300
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
Ntfs!NtfsClearCancelRoutine+0x16:
fffff880`010716ce 48874368 xchg rax,qword ptr [rbx+68h] ds:002b:effffa80`045eac78=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb40e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsClearCancelRoutine+16
fffff880`010716ce 48874368 xchg rax,qword ptr [rbx+68h]
FAULTING_IP:
Ntfs!NtfsClearCancelRoutine+16
fffff880`010716ce 48874368 xchg rax,qword ptr [rbx+68h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880011203ab to fffff880010716ce
STACK_TEXT:
fffff880`08849fc0 fffff880`011203ab : 00000000`2869bb01 fffffa80`03c34010 00000000`7646744e 00000000`000005d9 : Ntfs!NtfsClearCancelRoutine+0x16
fffff880`08849ff0 fffff880`010fa5fa : fffff880`0884a730 fffff8a0`0019ab60 00000000`2869bb00 fffff880`00000101 : Ntfs!NtOfsPostNewLength+0x6b
fffff880`0884a080 fffff880`0110ca07 : fffff880`0884a730 fffff880`0884a980 fffff880`0884a730 fffff8a0`0df6ba70 : Ntfs!NtfsCommitCurrentTransaction+0x22a
fffff880`0884a110 fffff880`010fb98b : fffff8a0`0df6b940 fffff8a0`0f491710 fffff8a0`0019ab60 fffff8a0`0df6b940 : Ntfs!NtfsCheckpointCurrentTransaction+0x27
fffff880`0884a140 fffff880`01069aa9 : fffff880`0884a628 fffff880`02acf670 fffff880`0884a690 fffff880`08839000 : Ntfs!NtfsCommonCleanup+0x135b
fffff880`0884a550 fffff800`02a8be5a : fffff880`0884a690 fffff880`02b09c10 fffff8a0`0d742220 fffff800`02bb12dd : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`0884a580 fffff880`01069662 : fffff880`01069a90 fffff880`0884a690 fffff880`0884a900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0884a660 fffff880`0110b244 : fffff880`0884a730 fffff880`0884a730 fffff880`0884a730 fffff8a0`0fb1a010 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`0884a6d0 fffff880`00fac23f : fffff880`0884a730 fffffa80`043cc530 fffffa80`043cc8d0 fffffa80`04431010 : Ntfs!NtfsFsdCleanup+0x144
fffff880`0884a940 fffff880`00faa6df : fffffa80`048c9d90 00000000`00000000 fffffa80`0438e200 fffffa80`043cc530 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0884a9d0 fffff800`02d92a0f : fffffa80`043cc530 fffffa80`06a9a740 00000000`00000000 fffffa80`04a27120 : fltmgr!FltpDispatch+0xcf
fffff880`0884aa30 fffff800`02d78a24 : 00000000`00000000 fffffa80`06a9a740 fffffa80`048c9d00 fffffa80`06b30060 : nt!IopCloseFile+0x11f
fffff880`0884aac0 fffff800`02d92501 : fffffa80`06a9a740 fffffa80`00000001 fffff8a0`07680c90 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`0884ab40 fffff800`02d92414 : 00000000`0000050c fffffa80`06a9a740 fffff8a0`07680c90 00000000`0000050c : nt!ObpCloseHandleTableEntry+0xb1
fffff880`0884abd0 fffff800`02a7b993 : fffffa80`06b30060 fffff880`0884aca0 00000000`7ef71000 fffffa80`04a27120 : nt!ObpCloseHandle+0x94
fffff880`0884ac20 00000000`772bfe4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04a9e3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772bfe4a
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsClearCancelRoutine+16
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff880088495f0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsClearCancelRoutine+16
BUCKET_ID: X64_0x24_Ntfs!NtfsClearCancelRoutine+16
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101410-32557-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c93e50
Debug session time: Thu Oct 14 16:35:09.729 2010 (GMT-5)
System Uptime: 0 days 0:00:43.508
Loading Kernel Symbols
...............................................................
.............................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002a74b6c, fffff880031a7fd8, fffff880031a7840}
Probably caused by : cng.sys ( cng!GatherRandomKey+294 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a74b6c, The address that the exception occurred at
Arg3: fffff880031a7fd8, Exception Record Address
Arg4: fffff880031a7840, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExpGetLookasideInformation+8c
fffff800`02a74b6c 0fb742c0 movzx eax,word ptr [rdx-40h]
EXCEPTION_RECORD: fffff880031a7fd8 -- (.exr 0xfffff880031a7fd8)
Cannot read Exception record @ fffff880031a7fd8
CONTEXT: fffff880031a7840 -- (.cxr 0xfffff880031a7840)
rax=0000000000000070 rbx=0000000000000ff4 rcx=fffff8800eea9b10
rdx=effff880009ea880 rsi=0000000000000000 rdi=0000000000000001
rip=fffff80002a74b6c rsp=fffff880031a8210 rbp=000000000000004d
r8=fffff80002c6b720 r9=0000000000000000 r10=0000000000000000
r11=0000fffffffff000 r12=fffff880031a82e0 r13=0000000000000000
r14=000000000001fe90 r15=fffff880031a8840
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!ExpGetLookasideInformation+0x8c:
fffff800`02a74b6c 0fb742c0 movzx eax,word ptr [rdx-40h] ds:002b:effff880`009ea840=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfe0e0
0000000000000000
FOLLOWUP_IP:
cng!GatherRandomKey+294
fffff880`01320b04 85c0 test eax,eax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002dc47bb to fffff80002a74b6c
STACK_TEXT:
fffff880`031a8210 fffff800`02dc47bb : 00000000`00000000 fffff800`00000ff4 fffff880`031a82e0 00000000`00000000 : nt!ExpGetLookasideInformation+0x8c
fffff880`031a82a0 fffff800`02dc51e5 : fffff8a0`012c6170 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ExpQuerySystemInformation+0x15bc
fffff880`031a8640 fffff800`02ac5993 : fffff8a0`012e0000 fffff800`02ac493d 00000000`00000041 fffffa80`05606080 : nt!NtQuerySystemInformation+0x4d
fffff880`031a8680 fffff800`02ac1f30 : fffff880`01320b04 00000000`00020000 fffff880`031a8844 fffff8a0`012c6148 : nt!KiSystemServiceCopyEnd+0x13
fffff880`031a8818 fffff880`01320b04 : 00000000`00020000 fffff880`031a8844 fffff8a0`012c6148 fffff800`02a2044e : nt!KiServiceLinkage
fffff880`031a8820 fffff880`0132056d : fffffa80`05606080 00000000`00000000 fffff800`02c6b5f8 fffff800`02ad12a1 : cng!GatherRandomKey+0x294
fffff880`031a8be0 fffff800`02dc2c5d : 00000000`00000000 fffff980`026c8fc0 fffff980`026c8fc0 fffffa80`039ffb60 : cng!scavengingWorkItemRoutine+0x3d
fffff880`031a8c80 fffff800`02ad3961 : fffff800`02c6b500 fffff800`02dc2c20 fffffa80`039ffb60 00000000`00000000 : nt!IopProcessWorkItem+0x3d
fffff880`031a8cb0 fffff800`02d6ac06 : 00000000`00000000 fffffa80`039ffb60 00000000`00000080 fffffa80`03988890 : nt!ExpWorkerThread+0x111
fffff880`031a8d40 fffff800`02aa4c26 : fffff880`02f64180 fffffa80`039ffb60 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031a8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: cng!GatherRandomKey+294
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cng
IMAGE_NAME: cng.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc814
STACK_COMMAND: .cxr 0xfffff880031a7840 ; kb
FAILURE_BUCKET_ID: X64_0x7E_VRF_cng!GatherRandomKey+294
BUCKET_ID: X64_0x7E_VRF_cng!GatherRandomKey+294
Followup: MachineOwner
---------
3: kd> lmtn
start end module name
fffff800`00bc9000 fffff800`00bd3000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02a0d000 fffff800`02a56000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02a56000 fffff800`03032000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00ca4000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00ca4000 fffff880`00cb3000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cbf000 fffff880`00ccc000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00ccc000 fffff880`00ce0000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00ce0000 fffff880`00d3e000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d3e000 fffff880`00dfe000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00e00000 fffff880`00e10000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00e10000 fffff880`00e2a000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00e2a000 fffff880`00e33000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e33000 fffff880`00e5d000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00e5d000 fffff880`00e68000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00e68000 fffff880`00eb4000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00ebb000 fffff880`00f12000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f12000 fffff880`00f1b000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f1b000 fffff880`00f25000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00f25000 fffff880`00f58000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f58000 fffff880`00f65000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00f65000 fffff880`00f7a000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00f7a000 fffff880`00f8f000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00f8f000 fffff880`00feb000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00feb000 fffff880`00ff2000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`01025000 fffff880`01039000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01039000 fffff880`011dc000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01200000 fffff880`0123a000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`0123a000 fffff880`01274000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01274000 fffff880`0128a000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`012a1000 fffff880`012ff000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`012ff000 fffff880`01319000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01319000 fffff880`0138c000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`0138c000 fffff880`0139d000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0139d000 fffff880`013a7000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`013a7000 fffff880`013f3000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`014d5000 fffff880`014dd000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`014dd000 fffff880`014ef000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`014ef000 fffff880`014f8000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`014fc000 fffff880`015ee000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`01811000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01811000 fffff880`0182f000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`0182f000 fffff880`0183c000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`0183c000 fffff880`018c6000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`018ef000 fffff880`0191f000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`0191f000 fffff880`01927000 AtiPcie AtiPcie.sys Tue May 05 18:00:22 2009 (4A005486)
fffff880`0195d000 fffff880`01987000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`01987000 fffff880`01990000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`01990000 fffff880`01997000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`01997000 fffff880`019a5000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`019a5000 fffff880`019ca000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`019ca000 fffff880`019da000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`019da000 fffff880`019e3000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`019e3000 fffff880`019ec000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`019ec000 fffff880`019f5000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`019f5000 fffff880`01a00000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`02c5d000 fffff880`02c68000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`02c68000 fffff880`02c77000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`02c77000 fffff880`02c95000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`02c95000 fffff880`02ca6000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`02ca6000 fffff880`02cac000 AsUpIO AsUpIO.sys Mon Jul 06 05:21:38 2009 (4A515FB2)
fffff880`02cac000 fffff880`02cb2000 AsIO AsIO.sys Mon Aug 03 10:03:16 2009 (4A768BB4)
fffff880`02cb2000 fffff880`02cd8000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`02cd8000 fffff880`02ced000 amdppm amdppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`02cfd000 fffff880`02d42000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02d42000 fffff880`02d4b000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d4b000 fffff880`02d71000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02d71000 fffff880`02d80000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d80000 fffff880`02d9d000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`02d9d000 fffff880`02db8000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02db8000 fffff880`02dcc000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03e00000 fffff880`03e21000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`03e21000 fffff880`03e3b000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`03e3b000 fffff880`03e4a000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`03e4a000 fffff880`03e8d000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`03e8d000 fffff880`03e9f000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`03ec8000 fffff880`03f12000 atikmpag atikmpag.sys Thu Aug 26 04:20:56 2010 (4C75C178)
fffff880`03f12000 fffff880`03f68000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`03f68000 fffff880`03f7e000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`03f7e000 fffff880`03fa2000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03fa2000 fffff880`03fae000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`03fae000 fffff880`03fdd000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03fdd000 fffff880`03ff8000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04000000 fffff880`04046000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`04046000 fffff880`0406a000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0406a000 fffff880`040a9000 Rt64win7 Rt64win7.sys Thu Aug 20 19:05:06 2009 (4A8D7432)
fffff880`040a9000 fffff880`040b4000 usbohci usbohci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`040b4000 fffff880`040c5000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`040c5000 fffff880`040c6480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`040cb000 fffff880`041bf000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`041bf000 fffff880`041dc000 parport parport.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`041dc000 fffff880`041e4000 ASACPI ASACPI.sys Thu Jul 16 06:31:29 2009 (4A5E9F11)
fffff880`041e4000 fffff880`041f3000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`041f3000 fffff880`041ff000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`04800000 fffff880`04810000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`04818000 fffff880`04fd3000 atikmdag atikmdag.sys Thu Aug 26 04:47:22 2010 (4C75C7AA)
fffff880`04fd3000 fffff880`04ff1000 i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`04ff1000 fffff880`04ffa000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`05800000 fffff880`05818000 RzSynapse RzSynapse.sys Wed Apr 21 10:53:21 2010 (4BCEAEF1)
fffff880`05818000 fffff880`05826000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`05826000 fffff880`05834000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05834000 fffff880`05840000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05840000 fffff880`05849000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05849000 fffff880`0585c000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`0585c000 fffff880`05868000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`05868000 fffff880`05876000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`058fa000 fffff880`05954000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05954000 fffff880`05969000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05969000 fffff880`05989000 AtihdW76 AtihdW76.sys Thu Jul 15 15:46:49 2010 (4C3F0339)
fffff880`05989000 fffff880`059c6000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`059c6000 fffff880`059e8000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`059e8000 fffff880`059ed200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`059ee000 fffff880`059fb000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`06000000 fffff880`0601d000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`0601d000 fffff880`0601ef00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`0601f000 fffff880`0602d000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`0602d000 fffff880`06046000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`06046000 fffff880`0604e080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`0604f000 fffff880`061fd000 viahduaa viahduaa.sys Mon Jan 11 12:05:18 2010 (4B4AF7DE)
fffff960`000d0000 fffff960`003df000 win32k win32k.sys unavailable (00000000)
Unloaded modules:
fffff880`01927000 fffff880`01935000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01935000 fffff880`01941000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01941000 fffff880`0194a000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0194a000 fffff880`0195d000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000