BCCodes: 3b, 24, a.
1. Your latest crash was caused by ntfs.sys, so check for errors and diagnose your hard disk:
chkdsk /r /f
Disk Check
HD Diagnostic
2. Drivers I'd recommend to update:
jraid.sys Fri Jul 17 18:31:50 2009
JMicron JMB36X RAID
iaStor.sys Fri Jun 05 04:53:40 2009
Intel Matrix Storage
e1y62x64.sys Sat Jun 13 04:16:42 2009
Intel Gigabit Network
RTKVHD64.sys Tue Sep 15 14:02:10 2009
Realtek Audio
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\101910-18860-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c57000 PsLoadedModuleList = 0xfffff800`02e94e50
Debug session time: Wed Oct 20 05:36:07.075 2010 (UTC - 5:00)
System Uptime: 1 days 13:27:18.340
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa8029cec190, 2, 1, fffff80002d85ab7}
Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8029cec190, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d85ab7, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eff0e0
fffffa8029cec190
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`02d85ab7 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880033d2900 -- (.trap 0xfffff880033d2900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a7ec010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d85ab7 rsp=fffff880033d2a90 rbp=00000000fa800c19
r8=fffff880033d2ac0 r9=fffff880009b2180 r10=0000000000000000
r11=fffff880033d2b20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x87:
fffff800`02d85ab7 480fb328 btr qword ptr [rax],rbp ds:88e0:fffffa80`0a7ec010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc6ca9 to fffff80002cc7740
STACK_TEXT:
fffff880`033d27b8 fffff800`02cc6ca9 : 00000000`0000000a fffffa80`29cec190 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`033d27c0 fffff800`02cc5920 : fffffa80`00000001 fffffa80`07641a10 fffff8a0`0f32cc10 fffff8a0`0f326000 : nt!KiBugCheckDispatch+0x69
fffff880`033d2900 fffff800`02d85ab7 : 00000000`00000000 fffffa80`07641a10 fffffa80`0a5c5d10 fffffa80`09354030 : nt!KiPageFault+0x260
fffff880`033d2a90 fffff800`02cb19da : fa800c19`06a80060 fa800c19`06a80460 fffffa80`0c1906a8 fa800c19`06a80060 : nt!MiReleaseConfirmedPageFileSpace+0x87
fffff880`033d2b10 fffff800`02fb860f : fffffa80`0c1905f0 00000000`00000000 00000000`000840a1 fffffa80`000840a1 : nt!MiDeleteSegmentPages+0x316
fffff880`033d2bc0 fffff800`02def08b : fffffa80`0c1905f8 00000000`00000001 00000000`00000000 fffffa80`00000631 : nt!MiSegmentDelete+0x7b
fffff880`033d2c00 fffff800`02def6fd : 00000000`00000000 00000000`00000080 fffffa80`075b5b30 fffff880`00000012 : nt!MiProcessDereferenceList+0x23b
fffff880`033d2cc0 fffff800`02f6bc06 : 00000000`00000000 fffffa80`07638530 00000000`00000080 fffffa80`075b5b30 : nt!MiDereferenceSegmentThread+0x10d
fffff880`033d2d40 fffff800`02ca5c26 : fffff880`009b2180 fffffa80`07641a10 fffff880`009bd0c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`033d2d80 00000000`00000000 : fffff880`033d3000 fffff880`033cd000 fffff880`033d25f0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`02d85ab7 480fb328 btr qword ptr [rax],rbp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102510-21559-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
Debug session time: Mon Oct 25 19:55:25.977 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:04.241
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88007c171e8, fffff88007c16a50, fffff80002c8b920}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushVolume+436 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88007c171e8
Arg3: fffff88007c16a50
Arg4: fffff80002c8b920
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88007c171e8 -- (.exr 0xfffff88007c171e8)
ExceptionAddress: fffff80002c8b920 (nt!RtlRealSuccessor+0x0000000000000030)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000048a5f6f0
Attempt to read from address 0000000048a5f6f0
CONTEXT: fffff88007c16a50 -- (.cxr 0xfffff88007c16a50)
rax=0000000048a5f6e8 rbx=0000000000000000 rcx=0000000048a5f6e8
rdx=fffff88007c174f0 rsi=0000000000000001 rdi=fffffa800bc9f600
rip=fffff80002c8b920 rsp=fffff88007c17428 rbp=fffff88007c17720
r8=0000000000000000 r9=0000000000000000 r10=fffff88007c174f0
r11=fffff88007c17410 r12=fffff8a0012166e0 r13=fffff8a001216890
r14=fffffa80087a1180 r15=0000000000000702
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!RtlRealSuccessor+0x30:
fffff800`02c8b920 488b4908 mov rcx,qword ptr [rcx+8] ds:002b:00000000`48a5f6f0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000048a5f6f0
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f100e0
0000000048a5f6f0
FOLLOWUP_IP:
Ntfs!NtfsFlushVolume+436
fffff880`012a5b56 483bc3 cmp rax,rbx
FAULTING_IP:
nt!RtlRealSuccessor+30
fffff800`02c8b920 488b4908 mov rcx,qword ptr [rcx+8]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80002cad38c to fffff80002c8b920
STACK_TEXT:
fffff880`07c17428 fffff800`02cad38c : 00000000`00000001 fffffa80`0bc9f600 fffffa80`0bc9f600 00000000`00000001 : nt!RtlRealSuccessor+0x30
fffff880`07c17430 fffff880`012a5b56 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : nt!RtlEnumerateGenericTableWithoutSplayingAvl+0x24
fffff880`07c17460 fffff880`012f6bbd : fffffa80`0bc9f600 fffffa80`087a1180 00000000`00000001 fffff880`07c17600 : Ntfs!NtfsFlushVolume+0x436
fffff880`07c17590 fffff880`012f75f0 : fffffa80`0bc9f600 fffffa80`0ae67010 fffffa80`0b4ecf20 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`07c17670 fffff880`0119323f : fffffa80`0ae67368 fffffa80`0ae67010 fffffa80`0bc9f600 fffff880`07c17698 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`07c176e0 fffff880`011916df : fffffa80`086048e0 00000000`00000000 fffffa80`08604800 fffffa80`0ae67010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`07c17770 fffff800`02feeca9 : 00000000`00000002 fffffa80`0b4ecf20 00000000`00000000 fffffa80`0ae67010 : fltmgr!FltpDispatch+0xcf
fffff880`07c177d0 fffff800`02f7b331 : fffffa80`0ae67010 fffffa80`0b83db60 fffffa80`0b4ecf20 fffff800`02e52e80 : nt!IopSynchronousServiceTail+0xf9
fffff880`07c17840 fffff800`02cd7993 : fffffa80`0b83db60 fffffa80`075b5b30 fffffa80`086048e0 fffffa80`0b4ecf20 : nt!NtFlushBuffersFile+0x171
fffff880`07c178d0 fffff800`02cd3f30 : fffff800`02f1e82d 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`07c17a68 fffff800`02f1e82d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`07c17a70 fffff800`02f7cc06 : 00000000`00000000 fffffa80`0b83db60 00000000`00000080 00000000`00000001 : nt!PopFlushVolumeWorker+0x1bd
fffff880`07c17d40 fffff800`02cb6c26 : fffff800`02e52e80 fffffa80`0b83db60 fffff800`02e60c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`07c17d80 00000000`00000000 : fffff880`07c18000 fffff880`07c12000 fffff880`07c165b0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: Ntfs!NtfsFlushVolume+436
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88007c16a50 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFlushVolume+436
BUCKET_ID: X64_0x24_Ntfs!NtfsFlushVolume+436
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102510-24882-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
Debug session time: Mon Oct 25 18:33:43.365 2010 (UTC - 5:00)
System Uptime: 5 days 12:56:19.950
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960000f7c24, fffff88009372660, 0}
Probably caused by : win32k.sys ( win32k!MAPPER::bNearMatch+90 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000f7c24, Address of the instruction which caused the bugcheck
Arg3: fffff88009372660, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32k!MAPPER::bNearMatch+90
fffff960`000f7c24 48398880000000 cmp qword ptr [rax+80h],rcx
CONTEXT: fffff88009372660 -- (.cxr 0xfffff88009372660)
rax=0000000000000000 rbx=fffff880093731c0 rcx=0000000000000000
rdx=fffff880093730e0 rsi=fffff88009373160 rdi=fffff900c01ecec0
rip=fffff960000f7c24 rsp=fffff88009373030 rbp=0000000000000000
r8=fffff88009373160 r9=0000000000000000 r10=0000000000000000
r11=fffff900c0084b00 r12=0000000000000000 r13=fffff900c01fb820
r14=0000000000000000 r15=fffff880093730e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!MAPPER::bNearMatch+0x90:
fffff960`000f7c24 48398880000000 cmp qword ptr [rax+80h],rcx ds:002b:00000000`00000080=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960000f7c24
STACK_TEXT:
fffff880`09373030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!MAPPER::bNearMatch+0x90
FOLLOWUP_IP:
win32k!MAPPER::bNearMatch+90
fffff960`000f7c24 48398880000000 cmp qword ptr [rax+80h],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!MAPPER::bNearMatch+90
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
STACK_COMMAND: .cxr 0xfffff88009372660 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!MAPPER::bNearMatch+90
BUCKET_ID: X64_0x3B_win32k!MAPPER::bNearMatch+90
Followup: MachineOwner
---------
fffff800`00bc9000 fffff800`00bd3000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02c0b000 fffff800`031e7000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`031e7000 fffff800`03230000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cdc000 fffff880`00d20000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00d20000 fffff880`00d34000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00d34000 fffff880`00d92000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d92000 fffff880`00df0000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`00e00000 fffff880`00e0a000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00e0a000 fffff880`00e3d000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e3d000 fffff880`00e4a000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e4a000 fffff880`00e5f000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e5f000 fffff880`00e74000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00ee6000 fffff880`00f8a000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f8a000 fffff880`00f99000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f99000 fffff880`00ff0000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00ff0000 fffff880`00ff9000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`01000000 fffff880`0101d000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`01027000 fffff880`01143000 iaStor iaStor.sys Fri Jun 05 04:53:40 2009 (4A287AA4)
fffff880`01143000 fffff880`01161000 jraid jraid.sys Fri Jul 17 18:31:50 2009 (4A609966)
fffff880`01161000 fffff880`01190000 SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`01190000 fffff880`0119b000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`0119b000 fffff880`011e7000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`011e7000 fffff880`011fb000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01200000 fffff880`01224000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`01224000 fffff880`013c7000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013c7000 fffff880`013e1000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`013e1000 fffff880`013f7000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`0143a000 fffff880`01450000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01450000 fffff880`01480000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01480000 fffff880`0149e000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`0149e000 fffff880`014af000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`014b9000 fffff880`0152c000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`0152c000 fffff880`0153d000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0153d000 fffff880`01547000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01547000 fffff880`01593000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`01593000 fffff880`015cd000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`015cd000 fffff880`015f3000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`01600000 fffff880`0164a000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0164a000 fffff880`01652000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01652000 fffff880`01664000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`0166a000 fffff880`0175c000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0175c000 fffff880`017bc000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`017bc000 fffff880`017e7000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`017e7000 fffff880`017f0000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01800000 fffff880`019fd000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01e00000 fffff880`01ea6000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`01eb9000 fffff880`01ed2000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`01ed2000 fffff880`01eda080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`01edb000 fffff880`01ee9000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`01ee9000 fffff880`01ef6000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`01ef6000 fffff880`01f04000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`01f04000 fffff880`01f27000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`01f27000 fffff880`01f48000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`01f48000 fffff880`01f5d000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`01f5d000 fffff880`01fb0000 nwifi nwifi.sys Tue Jul 14 03:07:23 2009 (4A5BCC3B)
fffff880`01fb0000 fffff880`01fc3000 ndisuio ndisuio.sys Tue Jul 14 03:09:25 2009 (4A5BCCB5)
fffff880`01fc3000 fffff880`01fdb000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`02c00000 fffff880`02c09000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02c09000 fffff880`02c14000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02c14000 fffff880`02c25000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02c25000 fffff880`02c32000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02c32000 fffff880`02d4e000 dump_iaStor dump_iaStor.sys Fri Jun 05 04:53:40 2009 (4A287AA4)
fffff880`02d4e000 fffff880`02d69000 USBSTOR USBSTOR.SYS Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`02d6f000 fffff880`02d99000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02d99000 fffff880`02da2000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02da2000 fffff880`02da9000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02da9000 fffff880`02db7000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02db7000 fffff880`02ddc000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`02ddc000 fffff880`02dec000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02dec000 fffff880`02df5000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02df5000 fffff880`02dfe000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`03c00000 fffff880`03c1b000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03c1b000 fffff880`03c2f000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03c2f000 fffff880`03c80000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03c80000 fffff880`03c8c000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03c8c000 fffff880`03c97000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03c97000 fffff880`03ca6000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03ca6000 fffff880`03cc4000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03cd3000 fffff880`03d5d000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`03d5d000 fffff880`03da2000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`03da2000 fffff880`03dab000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03dab000 fffff880`03dd1000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03dd1000 fffff880`03de7000 vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
fffff880`03de7000 fffff880`03df6000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`04200000 fffff880`04249000 e1y62x64 e1y62x64.sys Sat Jun 13 04:16:42 2009 (4A32FDFA)
fffff880`04249000 fffff880`04256000 usbuhci usbuhci.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`04256000 fffff880`04267000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04267000 fffff880`0428b000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0428b000 fffff880`04298000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`04298000 fffff880`042a8000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`042a8000 fffff880`0439c000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`0439c000 fffff880`043e2000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`043e2000 fffff880`043f8000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04800000 fffff880`0485a000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`0485a000 fffff880`0486f000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0486f000 fffff880`048ac000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`048ac000 fffff880`048ce000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`048ce000 fffff880`048e1000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`048e1000 fffff880`048ed000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`048ed000 fffff880`048fb000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`048fb000 fffff880`0492a000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`0492a000 fffff880`04945000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04945000 fffff880`04966000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04966000 fffff880`04980000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04980000 fffff880`0498f000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0498f000 fffff880`0499e000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0499e000 fffff880`0499f480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`049a0000 fffff880`049e3000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`049e3000 fffff880`049f5000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`05200000 fffff880`05205200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`05206000 fffff880`05214000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05214000 fffff880`05215f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`05217000 fffff880`053fea80 RTKVHD64 RTKVHD64.sys Tue Sep 15 14:02:10 2009 (4AAF7432)
fffff880`06600000 fffff880`06618000 adfs adfs.SYS Mon Nov 03 18:48:14 2008 (490F2B4E)
fffff880`06618000 fffff880`06623000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`06623000 fffff880`06650000 srvnet srvnet.sys Fri Aug 27 06:37:24 2010 (4C7732F4)
fffff880`06650000 fffff880`06662000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0666a000 fffff880`06732000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`06732000 fffff880`06750000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`06750000 fffff880`0677d000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`0677d000 fffff880`067cb000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`067cb000 fffff880`067ee000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`06c00000 fffff880`06c11000 usbaapl64 usbaapl64.sys Thu Apr 01 06:20:15 2010 (4BB410EF)
fffff880`06c11000 fffff880`06c47000 fastfat fastfat.SYS Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`06c58000 fffff880`06cbf000 srv2 srv2.sys Fri Aug 27 06:37:46 2010 (4C77330A)
fffff880`06cbf000 fffff880`06d55000 srv srv.sys Fri Aug 27 06:38:00 2010 (4C773318)
fffff880`06d55000 fffff880`06d86000 WUDFRd WUDFRd.sys Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff880`0fe00000 fffff880`0fe3e000 1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`0fe3e000 fffff880`0fe4a000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`0fe5f000 fffff880`10ba3780 nvlddmkm nvlddmkm.sys Sat May 22 04:14:23 2010 (4BF72FEF)
fffff880`10ba4000 fffff880`10ba5180 nvBridge nvBridge.kmd Sat May 22 03:57:09 2010 (4BF72BE5)
fffff880`10ba6000 fffff880`10bfc000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff960`00080000 fffff960`0038f000 win32k win32k.sys Wed Sep 01 05:58:04 2010 (4C7DC13C)
fffff960`00480000 fffff960`0048a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00620000 fffff960`00647000 cdd cdd.dll Wed May 19 22:48:26 2010 (4BF4408A)
fffff960`00980000 fffff960`009e1000 ATMFD ATMFD.DLL Thu May 27 07:11:31 2010 (4BFDF0F3)
Unloaded modules:
fffff880`06d86000 fffff880`06df7000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`017f0000 fffff880`017fe000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`02c40000 fffff880`02d5c000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0011C000
fffff880`02d5c000 fffff880`02d6f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000