Code:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0264b000 PsLoadedModuleList = 0xfffff800`02888e50
Debug session time: Sat Jan 1 14:59:44.641 2011 (GMT-5)
System Uptime: 0 days 0:11:04.141
Loading Kernel Symbols
...............................................................
.....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff88002940748, 2, 0, fffff88000daec50}
Probably caused by : ataport.SYS ( ataport!IdeLogCrbActive+bc )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88002940748, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000daec50, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800028f30e0
fffff88002940748
CURRENT_IRQL: 2
FAULTING_IP:
ataport!IdeLogCrbActive+bc
fffff880`00daec50 f30f6f4148 movdqu xmm0,xmmword ptr [rcx+48h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88001fec4b0 -- (.trap 0xfffff88001fec4b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003a4fb00 rbx=0000000000000000 rcx=fffff88002940700
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000daec50 rsp=fffff88001fec640 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffffa800448c1b0
r11=fffff88001fec770 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ataport!IdeLogCrbActive+0xbc:
fffff880`00daec50 f30f6f4148 movdqu xmm0,xmmword ptr [rcx+48h] ds:0202:fffff880`02940748=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800026baca9 to fffff800026bb740
STACK_TEXT:
fffff880`01fec368 fffff800`026baca9 : 00000000`0000000a fffff880`02940748 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01fec370 fffff800`026b9920 : 00000000`00000202 fffffa80`0448f258 fffffa80`039351a0 fffff880`00dc31a0 : nt!KiBugCheckDispatch+0x69
fffff880`01fec4b0 fffff880`00daec50 : fffffa80`03937d90 00000000`00000000 fffffa80`0448e1b0 00000000`00000001 : nt!KiPageFault+0x260
fffff880`01fec640 fffff880`00db8c71 : fffffa80`04795a98 fffffa80`039351a0 fffffa80`047959b0 fffffa80`039351a0 : ataport!IdeLogCrbActive+0xbc
fffff880`01fec670 fffff800`026069ce : fffffa80`04795a98 00000000`00000018 00000000`00000000 00000000`00000001 : ataport!IdeStartIoCallBack+0xc9
fffff880`01fec7e0 fffff800`0260713d : fffffa80`04478bf0 fffffa80`04485ea0 fffffa80`04485e00 00000000`00000000 : hal!HalpAllocateAdapterCallback+0x146
fffff880`01fec880 fffff800`0260671f : fffffa80`04795a50 00000000`00000200 fffffa80`04485ea0 fffffa80`05f354c0 : hal!HalAllocateAdapterChannel+0x101
fffff880`01fec8c0 fffff880`00cc10d3 : fffffa80`047959b0 fffff880`00cc112c fffffa80`000000a0 fffffa80`04485ea0 : hal!HalBuildScatterGatherList+0x2f3
fffff880`01fec930 fffff880`00db8b3b : fffffa80`047959b0 fffffa80`0448e1b0 fffffa80`039351a0 fffffa80`047959b0 : PCIIDEX!BmSetup+0x6b
fffff880`01fec990 fffff880`00db77eb : fffffa80`03936500 fffffa80`0448e1b0 fffffa80`03936500 fffffa80`039351a0 : ataport!IdeDispatchChannelRequest+0xef
fffff880`01fec9c0 fffff880`00db731e : 00000000`00000001 fffffa80`047959b0 00000000`00000001 fffffa80`047959b0 : ataport!IdeStartChannelRequest+0x113
fffff880`01feca40 fffff880`00db9582 : fffff880`01fc4180 00000000`00000000 fffffa80`0448e1b0 fffffa80`05d2e010 : ataport!IdeStartNextDeviceRequest+0x18e
fffff880`01fecae0 fffff880`00db90ec : fffffa80`039351a0 00000000`00000000 fffffa80`039351a0 fffffa80`05d2e010 : ataport!IdeProcessCompletedRequests+0x26a
fffff880`01fecc10 fffff800`026c6bfc : fffff880`01fc4180 fffff880`0000a637 fffffa80`03935050 fffffa80`03935118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`01feccd0 fffff800`026c3eea : fffff880`01fc4180 fffff880`01fcf0c0 00000000`00000000 fffff880`00db8f44 : nt!KiRetireDpcList+0x1bc
fffff880`01fecd80 00000000`00000000 : fffff880`01fed000 fffff880`01fe7000 fffff880`01fecd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeLogCrbActive+bc
fffff880`00daec50 f30f6f4148 movdqu xmm0,xmmword ptr [rcx+48h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport!IdeLogCrbActive+bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xD1_ataport!IdeLogCrbActive+bc
BUCKET_ID: X64_0xD1_ataport!IdeLogCrbActive+bc
Followup: MachineOwner
---------
Debug session time: Sat Jan 1 15:06:35.509 2011 (GMT-5)
System Uptime: 0 days 0:00:34.009
Loading Kernel Symbols
...............................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80002657d29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002657d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800028b30e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`02657d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88001fec650 -- (.trap 0xfffff88001fec650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8005865088 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002657d29 rsp=fffff88001fec7e0 rbp=fffff88001fc4180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02657d29 488b5108 mov rdx,qword ptr [rcx+8] ds:3650:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000267aca9 to fffff8000267b740
STACK_TEXT:
fffff880`01fec508 fffff800`0267aca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01fec510 fffff800`02679920 : fffffa80`00000002 fffffa80`058e0760 fffffa80`0548f3a0 fffff880`00dcbe92 : nt!KiBugCheckDispatch+0x69
fffff880`01fec650 fffff800`02657d29 : fffffa80`0548f470 00000000`00000200 00000000`00000000 fffff800`0272f0e4 : nt!KiPageFault+0x260
fffff880`01fec7e0 fffff800`0265afec : fffffa80`058e0760 00000000`00000002 00000000`00000000 fffffa80`05865088 : nt!KiInsertQueueApc+0x1e9
fffff880`01fec810 fffff800`0267e55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`01fec870 fffff880`00dc941a : 00000000`00000200 00000000`00000001 fffffa80`05495b80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`01fec950 fffff880`00dc9242 : fffffa80`05495b80 fffff880`00dcbb3b fffffa80`0548f3a0 fffffa80`044971b0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`01fec980 fffff880`00dc3e32 : 00000000`00000000 00000000`00000000 fffffa80`03936500 fffffa80`044971b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`01fec9b0 fffff880`00dcc7ed : fffffa80`039351a0 fffffa80`05495b80 00000000`00000000 fffffa80`05495b80 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`01fecae0 fffff880`00dcc0ec : fffffa80`039351a0 00000000`00000000 fffffa80`039351a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`01fecc10 fffff800`02686bfc : fffff880`01fc4180 fffff800`0278526e fffffa80`03935050 fffffa80`03935118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`01feccd0 fffff800`02683eea : fffff880`01fc4180 fffff880`01fcf0c0 00000000`00000000 fffff880`00dcbf44 : nt!KiRetireDpcList+0x1bc
fffff880`01fecd80 00000000`00000000 : fffff880`01fed000 fffff880`01fe7000 fffff880`01fecd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00dc941a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Debug session time: Mon Jan 3 00:55:29.310 2011 (GMT-5)
System Uptime: 0 days 0:00:22.450
Loading Kernel Symbols
...............................................................
............................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003498998, fffff88002632b10, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003498998, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88002632b10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IopCompleteRequest+c85
fffff800`03498998 488908 mov qword ptr [rax],rcx
CONTEXT: fffff88002632b10 -- (.cxr 0xfffff88002632b10)
rax=f88b41b7eb07e783 rbx=fffffa8004248680 rcx=30245c8b48f30348
rdx=fffff8000348dcff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003498998 rsp=fffff880026334e0 rbp=fffff88002633630
r8=0000000000000000 r9=fffff880026335e0 r10=0000000000000002
r11=fffffa800433a610 r12=fffff88002633420 r13=0000000000000000
r14=fffffa8003e12b60 r15=fffff88003113180
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!IopCompleteRequest+0xc85:
fffff800`03498998 488908 mov qword ptr [rax],rcx ds:002b:f88b41b7`eb07e783=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AtBroker.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003498998
STACK_TEXT:
fffff880`02632248 fffff800`03474ae9 : 00000000`0000003b 00000000`c0000005 fffff800`03498998 fffff880`02632b10 : nt!KeBugCheckEx
fffff880`02632250 fffff800`0347443c : fffff880`026332a8 fffff880`02632b10 00000000`00000000 fffff800`034a94b0 : nt!KiBugCheckDispatch+0x69
fffff880`02632390 fffff800`034a023d : fffff800`03681420 fffff800`035c66b0 fffff800`0340f000 fffff880`026332a8 : nt!KiSystemServiceHandler+0x7c
fffff880`026323d0 fffff800`034a82b0 : fffff800`035c6d24 fffff880`02632448 fffff880`026332a8 fffff800`0340f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02632400 fffff800`034b673f : fffff880`026332a8 fffff880`02632b10 fffff880`00000000 00000000`00000004 : nt!RtlDispatchException+0x410
fffff880`02632ae0 fffff800`03474bc2 : fffff880`026332a8 fffffa80`04248680 fffff880`02633350 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`02633170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`0347443c b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c42e3
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
Debug session time: Mon Jan 3 01:12:26.356 2011 (GMT-5)
System Uptime: 0 days 0:01:04.496
Loading Kernel Symbols
...............................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 6f8, fffff80003471510}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80003471510
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MpCmdRun.exe
CURRENT_IRQL: 2
TRAP_FRAME: fffff87ffffffef0 -- (.trap 0xfffff87ffffffef0)
Unable to read trap frame at fffff87f`fffffef0
LAST_CONTROL_TRANSFER: from fffff80003472ae9 to fffff80003473580
STACK_TEXT:
fffff880`02f06de8 fffff800`03472ae9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02f06df0 fffff800`03470fb2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f06f30 fffff800`03471510 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff87f`fffffef0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`03470fb2 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c42e3
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
fffff880`019b2000 fffff880`019f0000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed0000 fffff880`00f27000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cfa000 fffff880`02d84000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`042d7000 fffff880`042ed000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dcd000 fffff880`00dd8000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00cda000 fffff880`00ce3000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da3000 fffff880`00dcd000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01906000 fffff880`0190d000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0438f000 fffff880`043a0000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`026f5000 fffff880`02713000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`018a6000 fffff880`018d0000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01840000 fffff880`01870000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d45000 fffff880`00da3000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01144000 fffff880`011b7000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`042c7000 fffff880`042d7000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04d5a000 fffff880`04d68000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`042ee000 fffff880`04371000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`04371000 fffff880`0438f000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02cba000 fffff880`02cc9000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`00dd8000 fffff880`00dee000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04d26000 fffff880`04d48000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04d74000 fffff880`04d7d000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04d68000 fffff880`04d74000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04d7d000 fffff880`04d90000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04d4e000 fffff880`04d5a000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00550000 fffff960`0056e000 dxg dxg.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04200000 fffff880`0424a000 e1y62x64 e1y62x64.sys Wed Apr 07 18:58:49 2010 (4BBD0E29)
fffff880`010d2000 fffff880`010e6000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01086000 fffff880`010d2000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`00980000 fffff960`00989000 framebuf framebuf.dll unavailable (00000000)
fffff880`013d9000 fffff880`013e3000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011b7000 fffff880`011f1000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`039e0000 fffff800`03a29000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`043dc000 fffff880`04400000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04dbd000 fffff880`04dd6000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04dd6000 fffff880`04dde080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04daf000 fffff880`04dbd000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0262d000 fffff880`026f5000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`013e3000 fffff880`013ec000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`043c6000 fffff880`043dc000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`048c2000 fffff880`048d1000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04ddf000 fffff880`04ded000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bbd000 fffff800`00bc0000 kdcom kdcom.dll Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`048e2000 fffff880`04925000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013ae000 fffff880`013c8000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015bb000 fffff880`015e6000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04d48000 fffff880`04d4d200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04a44000 fffff880`04a59000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04a00000 fffff880`04a23000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ced000 fffff880`00d31000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`048d1000 fffff880`048e0000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04ded000 fffff880`04dfa000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`018d0000 fffff880`018fd000 MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`02713000 fffff880`0272b000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0272b000 fffff880`02758000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02758000 fffff880`027a6000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`027a6000 fffff880`027c9000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0196b000 fffff880`01976000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f30000 fffff880`00f3a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010e6000 fffff880`01144000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02caf000 fffff880`02cba000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e6000 fffff880`015f8000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01469000 fffff880`0155b000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02ced000 fffff880`02cf9000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`01800000 fffff880`0182f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04991000 fffff880`049a6000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02c00000 fffff880`02c0f000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d84000 fffff880`02dc9000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0155b000 fffff880`015bb000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01976000 fffff880`01987000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02ca3000 fffff880`02caf000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0340d000 fffff800`039e0000 nt ntkrnlmp.exe Sat Jun 19 00:09:07 2010 (4C1C42E3)
fffff880`0120b000 fffff880`013ae000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018fd000 fffff880`01906000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02dd2000 fffff880`02df8000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f7a000 fffff880`00f8f000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f47000 fffff880`00f7a000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e00000 fffff880`00e07000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e07000 fffff880`00e17000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c8000 fffff880`013d9000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`03c77000 fffff880`03d1d000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04ce9000 fffff880`04d26000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d31000 fffff880`00d45000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02cc9000 fffff880`02ced000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04861000 fffff880`0487c000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0487c000 fffff880`0489d000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0489d000 fffff880`048b7000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c52000 fffff880`02ca3000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`048b7000 fffff880`048c2000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01950000 fffff880`01959000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01959000 fffff880`01962000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01962000 fffff880`0196b000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04a59000 fffff880`04a71000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04a8b000 fffff880`04ce8a00 RTKVHD64 RTKVHD64.sys Tue Sep 14 05:17:43 2010 (4C8F3DB7)
fffff880`02c48000 fffff880`02c52000 SASDIFSV64 SASDIFSV64.SYS Mon Feb 08 19:11:52 2010 (4B70A848)
fffff880`02c3e000 fffff880`02c48000 SASKUTIL64 SASKUTIL64.SYS Tue Feb 09 17:27:34 2010 (4B71E156)
fffff880`03d1d000 fffff880`03d28000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0145a000 fffff880`01462000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`044f3000 fffff880`04589000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`03d67000 fffff880`03dce000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`03d28000 fffff880`03d55000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`048e0000 fffff880`048e1480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`03d55000 fffff880`03d67000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019a5000 fffff880`019b2000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01987000 fffff880`019a5000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c2a000 fffff880`02c3e000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`006a0000 fffff960`006aa000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`043a0000 fffff880`043c6000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04925000 fffff880`04937000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04d90000 fffff880`04dad000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04dad000 fffff880`04daef00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`042ad000 fffff880`042be000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04937000 fffff880`04991000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04257000 fffff880`042ad000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0424a000 fffff880`04257000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00f3a000 fffff880`00f47000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0190d000 fffff880`0191b000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0191b000 fffff880`01940000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0144a000 fffff880`0145a000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f8f000 fffff880`00fa4000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fa4000 fffff880`01000000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c0f000 fffff880`02c2a000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01940000 fffff880`01950000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e1d000 fffff880`00ec1000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec1000 fffff880`00ed0000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dc9000 fffff880`02dd2000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003f0000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`042be000 fffff880`042c7000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f27000 fffff880`00f30000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04a23000 fffff880`04a44000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`01870000 fffff880`0187e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0187e000 fffff880`0188a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0188a000 fffff880`01893000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01893000 fffff880`018a6000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000