Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\091810-29343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xe281f000 PsLoadedModuleList = 0xe2967810
Debug session time: Sat Sep 18 16:27:36.974 2010 (GMT-5)
System Uptime: 0 days 5:18:56.550
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, e285de85, d6551b60, 0}
Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: e285de85, The address that the exception occurred at
Arg3: d6551b60, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!memset+45
e285de85 f3ab rep stos dword ptr es:[edi]
TRAP_FRAME: d6551b60 -- (.trap 0xffffffffd6551b60)
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=00000040 edx=00000000 esi=c4b00188 edi=00000000
eip=e285de85 esp=d6551bd4 ebp=d6551bfc iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!memset+0x45:
e285de85 f3ab rep stos dword ptr es:[edi]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: PnkBstrB.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from e285b4bc to e285de85
STACK_TEXT:
d6551bfc e285b4bc c4b00188 c533a598 c533a598 nt!memset+0x45
d6551c14 e2a5cf6e c528b8c0 c533a598 c533a608 nt!IofCallDriver+0x63
d6551c34 e2a79d5f c4b00188 c528b8c0 00000000 nt!IopSynchronousServiceTail+0x1f8
d6551cd0 e2a7c53a c4b00188 c533a598 00000000 nt!IopXxxControlFile+0x6aa
d6551d04 e286244a 00000118 00000114 00000000 nt!NtDeviceIoControlFile+0x2a
d6551d04 777f64f4 00000118 00000114 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0096eb90 00000000 00000000 00000000 00000000 0x777f64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IofCallDriver+63
e285b4bc 5e pop esi
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!IofCallDriver+63
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
FAILURE_BUCKET_ID: 0x8E_nt!IofCallDriver+63
BUCKET_ID: 0x8E_nt!IofCallDriver+63
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100810-27861-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xe2a1d000 PsLoadedModuleList = 0xe2b65810
Debug session time: Fri Oct 8 22:03:47.111 2010 (GMT-5)
System Uptime: 0 days 4:56:57.812
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, e2ad82f1, cb91b814, cb91b3f0}
Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+4a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: e2ad82f1, The address that the exception occurred at
Arg3: cb91b814, Exception Record Address
Arg4: cb91b3f0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlImageNtHeaderEx+4a
e2ad82f1 663902 cmp word ptr [edx],ax
EXCEPTION_RECORD: cb91b814 -- (.exr 0xffffffffcb91b814)
ExceptionAddress: e2ad82f1 (nt!RtlImageNtHeaderEx+0x0000004a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 7fff0000
Attempt to read from address 7fff0000
CONTEXT: cb91b3f0 -- (.cxr 0xffffffffcb91b3f0)
eax=00005a4d ebx=00000000 ecx=00000500 edx=7fff0000 esi=7fff0000 edi=cb91b8f0
eip=e2ad82f1 esp=cb91b8dc ebp=cb91b8dc iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!RtlImageNtHeaderEx+0x4a:
e2ad82f1 663902 cmp word ptr [edx],ax ds:0023:7fff0000=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 7fff0000
READ_ADDRESS: GetPointerFromAddress: unable to read from e2b85718
Unable to read MiSystemVaType memory at e2b65160
7fff0000
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+4a
e2ad82f1 663902 cmp word ptr [edx],ax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from e2adc394 to e2ad82f1
STACK_TEXT:
cb91b8dc e2adc394 00000000 00000000 ed01c3ef nt!RtlImageNtHeaderEx+0x4a
cb91b964 e2a5ddad 00000008 00000286 ed08b4d3 nt!RtlImageNtHeader+0x1a
cb91b968 00000000 00000286 ed08b4d3 80000840 nt!ZwClose+0x11
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlImageNtHeaderEx+4a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
STACK_COMMAND: .cxr 0xffffffffcb91b3f0 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100910-22729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xe2a53000 PsLoadedModuleList = 0xe2b9b810
Debug session time: Sat Oct 9 22:04:37.481 2010 (GMT-5)
System Uptime: 0 days 23:59:46.182
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
...........................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, e2b0e2f1, cb91f814, cb91f3f0}
Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+4a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: e2b0e2f1, The address that the exception occurred at
Arg3: cb91f814, Exception Record Address
Arg4: cb91f3f0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlImageNtHeaderEx+4a
e2b0e2f1 663902 cmp word ptr [edx],ax
EXCEPTION_RECORD: cb91f814 -- (.exr 0xffffffffcb91f814)
ExceptionAddress: e2b0e2f1 (nt!RtlImageNtHeaderEx+0x0000004a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 7fff0000
Attempt to read from address 7fff0000
CONTEXT: cb91f3f0 -- (.cxr 0xffffffffcb91f3f0)
eax=00005a4d ebx=00000000 ecx=00000500 edx=7fff0000 esi=7fff0000 edi=cb91f8f0
eip=e2b0e2f1 esp=cb91f8dc ebp=cb91f8dc iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!RtlImageNtHeaderEx+0x4a:
e2b0e2f1 663902 cmp word ptr [edx],ax ds:0023:7fff0000=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 7fff0000
READ_ADDRESS: GetPointerFromAddress: unable to read from e2bbb718
Unable to read MiSystemVaType memory at e2b9b160
7fff0000
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+4a
e2b0e2f1 663902 cmp word ptr [edx],ax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from e2b12394 to e2b0e2f1
STACK_TEXT:
cb91f8dc e2b12394 00000000 00000000 ed01c3ef nt!RtlImageNtHeaderEx+0x4a
cb91f964 e2a93dad 00000008 00000286 c350a4d3 nt!RtlImageNtHeader+0x1a
cb91f968 00000000 00000286 c350a4d3 80000fb4 nt!ZwClose+0x11
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlImageNtHeaderEx+4a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
STACK_COMMAND: .cxr 0xffffffffcb91f3f0 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
BUCKET_ID: 0x7E_nt!RtlImageNtHeaderEx+4a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101510-31543-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xe2a47000 PsLoadedModuleList = 0xe2b8f810
Debug session time: Fri Oct 15 16:44:20.273 2010 (GMT-5)
System Uptime: 0 days 0:00:15.974
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
........
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 00000003, Process
Arg2: c4a33318, Terminating object
Arg3: c4a33484, Process image file name
Arg4: e2c6fdd0, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: c4a33318
IMAGE_NAME: wininit.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: wininit
FAULTING_MODULE: 00000000
PROCESS_NAME: wininit.exe
EXCEPTION_RECORD: cb8e3ce0 -- (.exr 0xffffffffcb8e3ce0)
ExceptionAddress: 77326c32
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00130ff8
Attempt to write to address 00130ff8
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 00130ff8
WRITE_ADDRESS: GetPointerFromAddress: unable to read from e2baf718
Unable to read MiSystemVaType memory at e2b8f160
00130ff8
FOLLOWUP_IP:
+0
77326c32 ?? ???
FAULTING_IP:
+0
77326c32 ?? ???
FAILED_INSTRUCTION_ADDRESS:
+0
77326c32 ?? ???
BUGCHECK_STR: 0xF4_C0000005
STACK_TEXT:
cb8e37a8 e2d230d7 000000f4 00000003 c4a33318 nt!KeBugCheckEx+0x1e
cb8e37cc e2ca6ed2 e2c6fdd0 c4a33484 c4a33588 nt!PspCatchCriticalBreak+0x71
cb8e37fc e2ca8d6f c4a33318 c4a32d48 c0000005 nt!PspTerminateAllThreads+0x2d
cb8e3830 e2a8a44a ffffffff c0000005 cb8e3cc4 nt!NtTerminateProcess+0x1a2
cb8e3830 e2a896ad ffffffff c0000005 cb8e3cc4 nt!KiFastCallEntry+0x12a
cb8e38b0 e2b0466f ffffffff c0000005 0001003f nt!ZwTerminateProcess+0x11
cb8e3cc4 e2a8b036 cb8e3ce0 00000000 cb8e3d34 nt!KiDispatchException+0x497
cb8e3d2c e2a8afea 0013102c 77326c32 badb0d00 nt!CommonDispatchException+0x4a
cb8e3d34 77326c32 badb0d00 773264f4 00000000 nt!Kei386EoiHelper+0x192
WARNING: Frame IP not in any known module. Following frames may be wrong.
cb8e3d38 badb0d00 773264f4 00000000 00000000 0x77326c32
cb8e3d3c 773264f4 00000000 00000000 00000000 0xbadb0d00
cb8e3d40 00000000 00000000 00000000 00000000 0x773264f4
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: 0xF4_C0000005_IMAGE_wininit.exe
BUCKET_ID: 0xF4_C0000005_IMAGE_wininit.exe
Followup: MachineOwner
c9200000 c921d000 ehdrv ehdrv.sys Thu May 14 16:31:56 2009 (4A0C1D4C)
c9234000 c92ac000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
c92ac000 c92bd000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
c92bd000 c92c5000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
c92c5000 c9307000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
c9307000 c93b2000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
c93b2000 c93fa000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
c9400000 c942a000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
c9434000 c94a5000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
c94a5000 c94b3000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
c94b3000 c95a6000 sptd sptd.sys Sun Oct 11 23:54:02 2009 (4AD245EA)
c95a6000 c95af000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
c95af000 c95d5000 SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733)
c95d5000 c95dd000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
c95dd000 c95e8000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
c95e8000 c95f9000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
c9600000 c9623000 MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
c9626000 c96f9000 xyadrec xyadrec.sys Fri Oct 08 21:12:51 2010 (4CAF5F23)
c96f9000 c9709000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
c9709000 c9754000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
c9754000 c975b000 pciide pciide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
c975b000 c9769000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
c9769000 c977f000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
c977f000 c9788000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
c9788000 c97ab000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
c97ab000 c97b4000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
c97b4000 c97e8000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
c97e8000 c97f9000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
c9816000 c9945000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
c9945000 c9970000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
c9970000 c9983000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
c9983000 c99e0000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
c99e0000 c99ee000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
c99ee000 c99f7000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
c9a00000 c9a0c000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
c9a0c000 c9ac3000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
c9ac3000 c9b01000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
c9b01000 c9b26000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6)
c9b26000 c9b53000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
c9b53000 c9b85000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55)
c9b85000 c9baa000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
c9bd1000 c9bf0000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
c9bf0000 c9bf7000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
c9bf7000 c9bfe000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
c9c00000 c9c10000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
c9c10000 c9c18000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
c9c18000 c9c29000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
c9c2a000 c9d73000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB)
c9d73000 c9da4000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
c9da4000 c9dac380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
c9dad000 c9dec000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
c9dec000 c9df4000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
d040a000 d042b000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
d042b000 d0438000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
d0438000 d0440000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
d0440000 d0448000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
d0448000 d0450000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
d0450000 d045b000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
d045b000 d0469000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
d0469000 d0480000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
d0480000 d048b000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
d048b000 d04e5000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
d04e5000 d0517000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
d0517000 d051e000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
d051e000 d053d000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
d053d000 d054b000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
d054b000 d0565000 serial serial.sys Tue Jul 14 02:45:33 2009 (4A5BC71D)
d0565000 d0578000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
d0578000 d0588000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
d0588000 d05c9000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
d05c9000 d05d1420 oreans32 oreans32.sys Tue Jul 11 10:05:03 2006 (44B34D9F)
d05d2000 d05dc000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
d05dc000 d05e6000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
d05e6000 d05eb900 MpKsl49ada959 MpKsl49ada959.sys Wed Mar 31 05:06:14 2010 (4BB2AE16)
d05ec000 d05f8000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
d0600000 d060d000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
d062a000 d068e000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
d068e000 d06a6000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
d06a6000 d06b4000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
d06b4000 d06d5000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
d06d5000 d06e7000 intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
d06e7000 d06f6000 L1E62x86 L1E62x86.sys Thu Jun 11 09:39:12 2009 (4A30A690)
d06f6000 d0701000 fdc fdc.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
d0701000 d073a000 a46uv0uu a46uv0uu.SYS Wed Jul 15 00:12:41 2009 (4A5CF4C9)
d073a000 d0747000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
d0747000 d0759000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
d0759000 d0771000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
d0771000 d077c000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
d077c000 d079e000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
d079e000 d07b6000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
d07b6000 d07cd000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
d07cd000 d07e4000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
d07e4000 d07ee000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
d07ee000 d07fb000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
d0a00000 d0a11000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
d0a1b000 d0a4f000 ks ks.sys Thu Mar 04 05:57:52 2010 (4B8F2FC0)
d0a4f000 d0a517a0 WmBEnum WmBEnum.sys Wed Apr 13 05:21:27 2005 (425C8227)
d0a52000 d0a5d1c0 WmXlCore WmXlCore.sys Wed Apr 13 05:21:25 2005 (425C8225)
d0a5e000 d0a6c000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
d0a6c000 d0ab0000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
d0ab0000 d0aba000 flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
d0aba000 d0acb000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
d0acb000 d0b1b000 HdAudio HdAudio.sys Tue Jul 14 02:51:46 2009 (4A5BC892)
d0b1b000 d0b4a000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
d0b4a000 d0b63000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
d0b63000 d0b6d000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
d0b6d000 d0b84000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883)
d0b84000 d0b85700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
d0b86000 d0b91000 hidusb hidusb.sys Tue Jul 14 02:51:04 2009 (4A5BC868)
d0b91000 d0ba4000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
d0ba4000 d0baa480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
d0bab000 d0bc1000 cdfs cdfs.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
d0bc1000 d0bcc000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
d0bcc000 d0bd7000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
d0bd7000 d0be4000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
d0be4000 d0bef000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
d0bef000 d0bf8000 dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
d1c00000 d1c0f000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
d1c0f000 d1c2e000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
d1c2e000 d1c38000 serenum serenum.sys Tue Jul 14 02:45:27 2009 (4A5BC717)
d1c38000 d26b5dc0 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:14 2010 (4C379162)
d26b6000 d26b7040 nvBridge nvBridge.kmd Sat Jul 10 00:10:11 2010 (4C379033)
d26b8000 d276f000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
d276f000 d27a8000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
d27a8000 d27b3000 usbuhci usbuhci.sys Tue Jul 14 02:51:10 2009 (4A5BC86E)
d27b3000 d27fe000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
d27fe000 d27ff380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
d3ed0000 d411a000 win32k win32k.sys Sat Jun 19 07:06:50 2010 (4C1C425A)
d4130000 d4139000 TSDDD TSDDD.dll Tue Jul 14 03:01:40 2009 (4A5BCAE4)
d4160000 d417e000 cdd cdd.dll unavailable (00000000)
e0bcf000 e0bd7000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
e2a10000 e2a47000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
e2a47000 e2e57000 nt ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
Unloaded modules:
c9baa000 c9bb7000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
c9df4000 c9dff000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
c9bb7000 c9bc0000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
c9bc0000 c9bd1000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
c9bec000 c9bf5000 ujihpmok.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
c9be3000 c9bec000 tcpmqkci.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
c9bda000 c9be3000 swqqbqql.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
c9bd1000 c9bda000 qhmfjnjx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000