PAGE_FAULT_IN_NONPAGED_AREA (50) ,
NTFS_FILE_SYSTEM (24)
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Uninstall sptd.sys
sptd.sys Sun Oct 11 23:55:14 2009
Daemon Tools/Duplex Secure
DuplexSecure - FAQ
Update:
Motherboard driver:
AtiPcie.sys Tue May 05 18:00:22 2009
ATI PCIE Driver for ATI PCIE chipset
Rt64win7.sys Thu Feb 26 11:04:13 2009
Realtek 8136/8168/8169 PCI/PCIe Adapters
RtHDMIVX.sys Tue Apr 14 12:27:32 2009
Realtek Audio
Looks like you don't have any security system, http://www.microsoft.com/security_essentials/
If crashes persist, check your hdd for errors:
Disk Check
HD Diagnostic
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101810-17940-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e08000 PsLoadedModuleList = 0xfffff800`03045e50
Debug session time: Mon Oct 18 10:02:47.457 2010 (UTC - 5:00)
System Uptime: 0 days 0:06:16.298
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88006cad6e8, fffff88006cacf50, fffff880012b0d06}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonCleanup+26d3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88006cad6e8
Arg3: fffff88006cacf50
Arg4: fffff880012b0d06
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88006cad6e8 -- (.exr 0xfffff88006cad6e8)
ExceptionAddress: fffff880012b0d06 (Ntfs!NtfsCommonCleanup+0x00000000000026d3)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000002000000004
Attempt to read from address 0000002000000004
CONTEXT: fffff88006cacf50 -- (.cxr 0xfffff88006cacf50)
rax=0000002000000000 rbx=fffff8a002b20a90 rcx=fffff8800827bf98
rdx=fffff8a002b20ad0 rsi=fffff8a002b20bc0 rdi=0000000000000004
rip=fffff880012b0d06 rsp=fffff88006cad920 rbp=fffff8800827c1a0
r8=fffff8a002b20ed0 r9=0000000000000008 r10=fffffa8004a3b180
r11=fffff88006cadd28 r12=fffff8800827bf50 r13=0000000000000000
r14=0000000000000000 r15=fffff8a002b20e10
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
Ntfs!NtfsCommonCleanup+0x26d3:
fffff880`012b0d06 f6400402 test byte ptr [rax+4],2 ds:002b:00000020`00000004=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000002000000004
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b00e0
0000002000000004
FOLLOWUP_IP:
Ntfs!NtfsCommonCleanup+26d3
fffff880`012b0d06 f6400402 test byte ptr [rax+4],2
FAULTING_IP:
Ntfs!NtfsCommonCleanup+26d3
fffff880`012b0d06 f6400402 test byte ptr [rax+4],2
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff8800121daa9 to fffff880012b0d06
STACK_TEXT:
fffff880`06cad920 fffff880`0121daa9 : fffff880`0827bb28 fffffa80`03b05c10 fffff880`0827beb0 fffffa80`0598e760 : Ntfs!NtfsCommonCleanup+0x26d3
fffff880`06cadd30 fffff800`02e705c7 : fffff880`0827beb0 00000000`00007f02 00000000`00000001 00000000`001ffee0 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`06cadd60 fffff800`02e70581 : 00000000`00000000 fffffa80`0598e760 fffff880`06cae000 fffff800`02e8801a : nt!KySwitchKernelStackCallout+0x27
fffff880`0827bd80 fffff800`02e8801a : 00000000`00001000 fffffa80`0598e760 fffffa80`00001000 00000000`00000000 : nt!KiSwitchKernelStackContinue
fffff880`0827bda0 fffff880`0121d662 : fffff880`0121da90 fffff880`0827beb0 fffff880`0827c200 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x29a
fffff880`0827be80 fffff880`012bf244 : fffff880`0827bf50 fffff880`0827bf50 fffff880`0827bf50 fffffa80`03f90010 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`0827bef0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFsdCleanup+0x144
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsCommonCleanup+26d3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88006cacf50 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonCleanup+26d3
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonCleanup+26d3
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101810-21652-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`0308be50
Debug session time: Mon Oct 18 09:56:07.285 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:40.752
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88003b477d8, fffff88003b47040, fffff80002ff1f8c}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88003b477d8
Arg3: fffff88003b47040
Arg4: fffff80002ff1f8c
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88003b477d8 -- (.exr 0xfffff88003b477d8)
ExceptionAddress: fffff80002ff1f8c (nt!ExDeferredFreePool+0x0000000000000100)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000002000000000
Attempt to read from address 0000002000000000
CONTEXT: fffff88003b47040 -- (.cxr 0xfffff88003b47040)
rax=fffffa800395da50 rbx=0000000000000003 rcx=fffffa800395da50
rdx=0000002000000000 rsi=0000000000000000 rdi=fffff8a008e7fa00
rip=fffff80002ff1f8c rsp=fffff88003b47a10 rbp=0000000000000000
r8=0000002000000000 r9=0000000000000000 r10=fffff8a0094fc8b0
r11=0000000000000001 r12=fffffa800395d3c0 r13=0000000000000000
r14=0000000000000020 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExDeferredFreePool+0x100:
fffff800`02ff1f8c 4c8b02 mov r8,qword ptr [rdx] ds:002b:00000020`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000002000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f60e0
0000002000000000
FOLLOWUP_IP:
nt!ExDeferredFreePool+100
fffff800`02ff1f8c 4c8b02 mov r8,qword ptr [rdx]
FAULTING_IP:
nt!ExDeferredFreePool+100
fffff800`02ff1f8c 4c8b02 mov r8,qword ptr [rdx]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80002ff34c1 to fffff80002ff1f8c
STACK_TEXT:
fffff880`03b47a10 fffff800`02ff34c1 : fffffa80`04a3a180 fffff8a0`094fc480 fffffa80`04a3a180 fffff880`012e73ef : nt!ExDeferredFreePool+0x100
fffff880`03b47aa0 fffff880`012ef1b0 : fffff8a0`094fc490 fffff880`074df4b0 fffff880`4146744e fffffa80`04294ba0 : nt!ExFreePoolWithTag+0x411
fffff880`03b47b50 fffff880`01256c0d : fffffa80`04294ba0 fffffa80`0428bc10 fffff880`074df4b0 fffffa80`0500d300 : Ntfs!NtfsCommonCreate+0x22f9
fffff880`03b47d30 fffff800`02eb65c7 : fffff880`074df420 00000000`00000000 00000000`00000000 00000001`00024160 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`03b47d60 fffff800`02eb6581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`074df2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+100
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88003b47040 ; kb
FAILURE_BUCKET_ID: X64_0x24_nt!ExDeferredFreePool+100
BUCKET_ID: X64_0x24_nt!ExDeferredFreePool+100
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101810-16770-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e60000 PsLoadedModuleList = 0xfffff800`0309de50
Debug session time: Mon Oct 18 09:49:34.858 2010 (UTC - 5:00)
System Uptime: 0 days 8:10:02.700
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff82003046448, 1, fffff80003327e69, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!WmipRegistrationWorker+29 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff82003046448, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80003327e69, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800031080e0
fffff82003046448
FAULTING_IP:
nt!WmipRegistrationWorker+29
fffff800`03327e69 48894808 mov qword ptr [rax+8],rcx
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031b6af0 -- (.trap 0xfffff880031b6af0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff82003046440 rbx=0000000000000000 rcx=fffff80003046440
rdx=fffff8000307d538 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003327e69 rsp=fffff880031b6c80 rbp=fffff800030755f8
r8=fffff78000000008 r9=0000000000000000 r10=0000000000000000
r11=fffff88002f63180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!WmipRegistrationWorker+0x29:
fffff800`03327e69 48894808 mov qword ptr [rax+8],rcx ds:fb60:fffff820`03046448=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f4f8c1 to fffff80002ed0740
STACK_TEXT:
fffff880`031b6988 fffff800`02f4f8c1 : 00000000`00000050 fffff820`03046448 00000000`00000001 fffff880`031b6af0 : nt!KeBugCheckEx
fffff880`031b6990 fffff800`02ece82e : 00000000`00000001 fffff800`03327e40 00000000`00000000 fffff800`0305f888 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`031b6af0 fffff800`03327e69 : 00000000`00000000 fffff800`0307d4a0 00000000`00000000 fffffa80`039dfb60 : nt!KiPageFault+0x16e
fffff880`031b6c80 fffff800`02edd961 : fffff800`03327e40 fffff800`032f63a0 fffffa80`039dfb60 fffff800`03084e80 : nt!WmipRegistrationWorker+0x29
fffff880`031b6cb0 fffff800`03174c06 : 00000000`00000001 fffffa80`039dfb60 00000000`00000080 fffffa80`039cc040 : nt!ExpWorkerThread+0x111
fffff880`031b6d40 fffff800`02eaec26 : fffff880`02f63180 fffffa80`039dfb60 fffff880`02f6dfc0 0079006e`00610070 : nt!PspSystemThreadStartup+0x5a
fffff880`031b6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!WmipRegistrationWorker+29
fffff800`03327e69 48894808 mov qword ptr [rax+8],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!WmipRegistrationWorker+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!WmipRegistrationWorker+29
BUCKET_ID: X64_0x50_nt!WmipRegistrationWorker+29
Followup: MachineOwner
start end module name
fffff800`00b9c000 fffff800`00ba6000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02e17000 fffff800`02e60000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02e60000 fffff800`0343c000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00c5e000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`00c5e000 fffff880`00c83000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`00c86000 fffff880`00c93000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00c93000 fffff880`00ca7000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00ca7000 fffff880`00d05000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d05000 fffff880`00dc5000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00dc5000 fffff880`00dd9000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`00dd9000 fffff880`00df7000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00e35000 fffff880`00e81000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00e84000 fffff880`00f28000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f28000 fffff880`00f37000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f37000 fffff880`00f6a000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f6a000 fffff880`00f7f000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00f7f000 fffff880`00fdb000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00fdb000 fffff880`00ff5000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00ff5000 fffff880`00ffe000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`01010000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01014000 fffff880`0113a000 sptd sptd.sys Sun Oct 11 23:55:14 2009 (4AD24632)
fffff880`0113a000 fffff880`01143000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`01143000 fffff880`01172000 SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`01172000 fffff880`011c9000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`011c9000 fffff880`011d3000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`011d3000 fffff880`011e0000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`011e0000 fffff880`011f5000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`011f5000 fffff880`011fc000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`01200000 fffff880`01211000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01211000 fffff880`0121e000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01221000 fffff880`013c4000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013c4000 fffff880`013de000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`013de000 fffff880`013e7000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`013e7000 fffff880`013f0000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`013f0000 fffff880`013fb000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`01460000 fffff880`01470000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01470000 fffff880`01479000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`0147a000 fffff880`014ed000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`014ed000 fffff880`014fe000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`014fe000 fffff880`01508000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01508000 fffff880`015fa000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`01600000 fffff880`0163a000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`0163a000 fffff880`01650000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01650000 fffff880`01680000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01680000 fffff880`01688000 AtiPcie AtiPcie.sys Tue May 05 18:00:22 2009 (4A005486)
fffff880`01688000 fffff880`0168f000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`0168f000 fffff880`0169d000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`0169f000 fffff880`016ca000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`016ca000 fffff880`01714000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01714000 fffff880`01724000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`01724000 fffff880`01770000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01770000 fffff880`01778000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01778000 fffff880`017b2000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`017b2000 fffff880`017c4000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`017c4000 fffff880`017cd000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`017cd000 fffff880`017f7000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`017f7000 fffff880`01800000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`01800000 fffff880`019fd000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02c00000 fffff880`02c1d000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`02c1d000 fffff880`02c38000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02c38000 fffff880`02c4c000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`02c4c000 fffff880`02c9d000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`02c9d000 fffff880`02ca9000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`02ca9000 fffff880`02cb4000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`02cb4000 fffff880`02cc3000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`02ce5000 fffff880`02d6f000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02d6f000 fffff880`02db4000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02db4000 fffff880`02dbd000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02dbd000 fffff880`02de3000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02de3000 fffff880`02df2000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03e00000 fffff880`03e32000 Rt64win7 Rt64win7.sys Thu Feb 26 11:04:13 2009 (49A65B0D)
fffff880`03e63000 fffff880`03ee6000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`03ee6000 fffff880`03f04000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03f04000 fffff880`03f15000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03f15000 fffff880`03f3b000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03f3b000 fffff880`03f50000 amdppm amdppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03f50000 fffff880`03f9a000 atikmpag atikmpag.sys Thu Aug 26 04:20:56 2010 (4C75C178)
fffff880`03f9a000 fffff880`03ff0000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`04000000 fffff880`0401e000 i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`0401e000 fffff880`0402d000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04030000 fffff880`04124000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04124000 fffff880`0416a000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`0416a000 fffff880`0418e000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0418e000 fffff880`041be000 nusb3xhc nusb3xhc.sys Fri Apr 23 04:34:36 2010 (4BD0F92C)
fffff880`041be000 fffff880`041bff00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`041c0000 fffff880`041cd000 usbfilter usbfilter.sys Tue Dec 22 10:26:22 2009 (4B3082AE)
fffff880`041cd000 fffff880`041d8000 usbohci usbohci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`041d8000 fffff880`041e9000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`041e9000 fffff880`041f5000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`04200000 fffff880`04243000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`04243000 fffff880`04255000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04255000 fffff880`0426d000 nusb3hub nusb3hub.sys Fri Apr 23 04:34:35 2010 (4BD0F92B)
fffff880`04295000 fffff880`042da000 aa0z4330 aa0z4330.SYS Wed Jul 15 00:12:55 2009 (4A5CF4D7)
fffff880`042da000 fffff880`042ea000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`042ea000 fffff880`04300000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04300000 fffff880`04324000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04324000 fffff880`04330000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04330000 fffff880`0435f000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`0435f000 fffff880`0437a000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`0437a000 fffff880`0439b000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`0439b000 fffff880`043b5000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`043b5000 fffff880`043c0000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`043c0000 fffff880`043cf000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`043cf000 fffff880`043d0480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`0482a000 fffff880`04fe5000 atikmdag atikmdag.sys Thu Aug 26 04:47:22 2010 (4C75C7AA)
fffff880`05000000 fffff880`050c8000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`050e8000 fffff880`05142000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05142000 fffff880`05157000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05157000 fffff880`05188500 RtHDMIVX RtHDMIVX.sys Tue Apr 14 12:27:32 2009 (49E45704)
fffff880`05189000 fffff880`051c6000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`051c6000 fffff880`051e8000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`051e8000 fffff880`051ed200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`05c00000 fffff880`05c18000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`05c18000 fffff880`05c45000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`05c6b000 fffff880`05eb7f80 RTKVHD64 RTKVHD64.sys Tue Jul 06 13:05:16 2010 (4C32FFDC)
fffff880`05eb8000 fffff880`05ec6000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05ec6000 fffff880`05ed2000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05ed2000 fffff880`05edb000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05edb000 fffff880`05eee000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05eee000 fffff880`05efa000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`05efa000 fffff880`05f15000 USBSTOR USBSTOR.SYS Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`05f15000 fffff880`05f23000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`05f23000 fffff880`05f3c000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`05f3c000 fffff880`05f44080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`05f45000 fffff880`05f52000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`05f52000 fffff880`05f60000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`05f60000 fffff880`05f83000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05f83000 fffff880`05fa4000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`05fa4000 fffff880`05fb9000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05fb9000 fffff880`05fd1000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05fd1000 fffff880`05fef000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`06000000 fffff880`06067000 srv2 srv2.sys Fri Aug 27 06:37:46 2010 (4C77330A)
fffff880`0608e000 fffff880`060dc000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`060dc000 fffff880`060ff000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`060ff000 fffff880`061a5000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`061a5000 fffff880`061b0000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`061b0000 fffff880`061dd000 srvnet srvnet.sys Fri Aug 27 06:37:24 2010 (4C7732F4)
fffff880`061dd000 fffff880`061ef000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`06c00000 fffff880`06c13000 hiber_dumpfve hiber_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`06ccf000 fffff880`06d65000 srv srv.sys Fri Aug 27 06:38:00 2010 (4C773318)
fffff880`06dd6000 fffff880`06de1000 asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`06de1000 fffff880`06ded000 hiber_dumpata hiber_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`06ded000 fffff880`06df6000 hiber_atapi hiber_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff960`00050000 fffff960`0035f000 win32k win32k.sys unavailable (00000000)
fffff960`00550000 fffff960`0055a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`007c0000 fffff960`007e7000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`06d65000 fffff880`06dd6000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000