Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0285e000 PsLoadedModuleList = 0xfffff800`02a9be50
Debug session time: Thu Jan 21 12:13:18.605 2010 (GMT-5)
System Uptime: 0 days 0:01:14.511
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8801981e5b8, 0, fffff8800160727b, 2}
Could not read faulting driver name
Probably caused by : rdyboost.sys ( rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8801981e5b8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800160727b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b060e0
fffff8801981e5b8
FAULTING_IP:
rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3
fffff880`0160727b 488b4cc308 mov rcx,qword ptr [rbx+rax*8+8]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880037ac930 -- (.trap 0xfffff880037ac930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000002c0e35a rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800160727b rsp=fffff880037acac0 rbp=fffff880037acb10
r8=fffffa8003648000 r9=fffffa8003648010 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+0xb3:
fffff880`0160727b 488b4cc308 mov rcx,qword ptr [rbx+rax*8+8] ds:cb00:00000000`16071ad8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000294dbc2 to fffff800028cff00
STACK_TEXT:
fffff880`037ac7c8 fffff800`0294dbc2 : 00000000`00000050 fffff880`1981e5b8 00000000`00000000 fffff880`037ac930 : nt!KeBugCheckEx
fffff880`037ac7d0 fffff800`028cdfee : 00000000`00000000 fffff880`037acae0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40f90
fffff880`037ac930 fffff880`0160727b : fffff880`037acae0 00000000`047177a6 fffff880`037acb10 fffff880`016071af : nt!KiPageFault+0x16e
fffff880`037acac0 fffff880`01606858 : fffffa80`03362bd0 fffffa80`0578fff3 fffffa80`03310118 fffffa80`03648000 : rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+0xb3
fffff880`037acb50 fffff880`0160f607 : 00000000`0000000a 00000000`00000001 fffffa80`0518db10 fffffa80`033100b0 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageRemove+0x2d0
fffff880`037acc80 fffff880`0160e3fe : fffffa80`0518db10 00000000`00000080 00000000`00000080 fffffa80`03310f88 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x22f
fffff880`037acce0 fffff800`02b73166 : 00000000`00000000 fffff880`00000000 fffffa80`0330ab60 fffffa80`018439e0 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152
fffff880`037acd40 fffff800`028ae486 : fffff880`009ee180 fffffa80`0330ab60 fffff880`009f8f40 fffff8a0`001fbd98 : nt!PspSystemThreadStartup+0x5a
fffff880`037acd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3
fffff880`0160727b 488b4cc308 mov rcx,qword ptr [rbx+rax*8+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeIteratorCleanup+b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc48a
FAILURE_BUCKET_ID: X64_0x50_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeIteratorCleanup+b3
BUCKET_ID: X64_0x50_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeIteratorCleanup+b3
Followup: MachineOwner
---------
Debug session time: Thu Jan 21 12:19:26.156 2010 (GMT-5)
System Uptime: 0 days 0:05:24.062
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3D, {fffff80000b9bf60, 0, 0, fffff800028d0e10}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff80000b9bf60
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff800028d0e10
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: d
EXCEPTION_RECORD: fffff80000b9c708 -- (.exr 0xfffff80000b9c708)
Cannot read Exception record @ fffff80000b9c708
TRAP_FRAME: fffff80000b9c7b0 -- (.trap 0xfffff80000b9c7b0)
Unable to read trap frame at fffff800`00b9c7b0
LAST_CONTROL_TRANSFER: from fffff800028c9469 to fffff800028c9f00
STACK_TEXT:
fffff800`00b9b6a8 fffff800`028c9469 : 00000000`0000003d fffff800`00b9bf60 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9b6b0 fffff800`028c57a9 : 00000000`0000efc0 fffff880`040af253 fffff800`00b9bf60 fffff800`028f6e28 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b7f0 fffff800`028efbed : fffff800`0283c2fc fffff800`02831580 fffff800`0280f000 fffff800`00b9c708 : nt!KiInterruptHandler+0x29
fffff800`00b9b820 fffff800`028f7250 : fffff800`02a1799c fffff800`00b9b898 fffff800`00b9c708 fffff800`02858000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b850 fffff800`029041b5 : fffff800`00b9c708 fffff800`00b9bf60 fffff800`00000000 00000000`00000001 : nt!RtlDispatchException+0x410
fffff800`00b9bf30 fffff800`028c9542 : fffff800`00b9c708 fffff800`02a42e80 fffff800`00b9c7b0 fffff800`02a50c40 : nt!KiDispatchException+0x135
fffff800`00b9c5d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800028d0e11 - nt!KeAccumulateTicks+3b1
[ 8b:cb ]
1 error : !nt (fffff800028d0e11)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Debug session time: Thu Jan 21 03:06:24.825 2010 (GMT-5)
System Uptime: 0 days 1:13:28.731
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa810384e010, 5, 1, fffff80002892a13}
Probably caused by : ntkrnlmp.exe ( nt!KeAcquireSpinLockAtDpcLevel+43 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa810384e010, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002892a13, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac20e0
fffffa810384e010
CURRENT_IRQL: 5
FAULTING_IP:
nt!KeAcquireSpinLockAtDpcLevel+43
fffff800`02892a13 f0480fba2900 lock bts qword ptr [rcx],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80003cf38d0 -- (.trap 0xfffff80003cf38d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000db00 rbx=0000000000000000 rcx=fffffa810384e010
rdx=00000cc700000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002892a13 rsp=fffff80003cf3a60 rbp=fffffa80039ed380
r8=fffff80002a12c40 r9=0000000000000000 r10=0000000000012040
r11=00000000001f0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeAcquireSpinLockAtDpcLevel+0x43:
fffff800`02892a13 f0480fba2900 lock bts qword ptr [rcx],0 ds:5e00:fffffa81`0384e010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000288b469 to fffff8000288bf00
STACK_TEXT:
fffff800`03cf3788 fffff800`0288b469 : 00000000`0000000a fffffa81`0384e010 00000000`00000005 00000000`00000001 : nt!KeBugCheckEx
fffff800`03cf3790 fffff800`0288a0e0 : fffffa80`023c6c68 fffff800`02a04e80 fffff800`03cf3960 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`03cf38d0 fffff800`02892a13 : 00000000`00000000 00000000`00000000 fffffa80`02994da8 fffff880`010e006b : nt!KiPageFault+0x260
fffff800`03cf3a60 fffff800`02887aec : fffffa80`01895b48 fffffa80`039ed380 fffffa80`01895b40 fffff800`02e0b090 : nt!KeAcquireSpinLockAtDpcLevel+0x43
fffff800`03cf3ab0 fffff800`028878d8 : 00000000`00000000 fffff800`02e263c0 fffffa80`04202000 00000000`00000000 : nt!KiScanInterruptObjectList+0x5c
fffff800`03cf3b00 fffff880`014109c2 : fffff800`02899a3a 00000000`002fb2a7 fffffa80`03a01a78 fffffa80`026a67e8 : nt!KiChainedDispatch+0x128
fffff800`03cf3c98 fffff800`02899a3a : 00000000`002fb2a7 fffffa80`03a01a78 fffffa80`026a67e8 00000000`00000001 : intelppm!C1Halt+0x2
fffff800`03cf3ca0 fffff800`028946cc : fffff800`02a04e80 fffff800`00000000 00000000`00000000 fffff880`0112c908 : nt!PoIdle+0x53a
fffff800`03cf3d80 00000000`00000000 : fffff800`03cf4000 fffff800`03cee000 fffff800`03cf3d40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeAcquireSpinLockAtDpcLevel+43
fffff800`02892a13 f0480fba2900 lock bts qword ptr [rcx],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeAcquireSpinLockAtDpcLevel+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KeAcquireSpinLockAtDpcLevel+43
BUCKET_ID: X64_0xA_nt!KeAcquireSpinLockAtDpcLevel+43
Followup: MachineOwner
---------
Debug session time: Thu Jan 21 03:10:14.062 2010 (GMT-5)
System Uptime: 0 days 0:03:24.968
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff800028efbe5}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800028efbe5
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800028d5469 to fffff800028d5f00
STACK_TEXT:
fffff880`009f4c68 fffff800`028d5469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009f4c70 fffff800`028d3932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f4db0 fffff800`028efbe5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x5
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800028efbf9 - nt!MmAccessFault+19
[ ac:bd ]
1 error : !nt (fffff800028efbf9)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BYTE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BYTE
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BYTE
Followup: memory_corruption
---------
1: kd> lmtsmn
start end module name
fffff880`051be000 fffff880`051fc000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f87000 fffff880`00fde000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03c5b000 fffff880`03ce5000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045cd000 fffff880`045e3000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04411000 fffff880`04533000 agrsm64 agrsm64.sys Mon Nov 10 10:01:35 2008 (49184CCF)
fffff880`01033000 fffff880`0103e000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`059b4000 fffff880`059bf000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`01000000 fffff880`01009000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01009000 fffff880`01033000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0427e000 fffff880`043d6000 athrx athrx.sys Tue Jun 09 14:06:49 2009 (4A2EA4B9)
fffff880`03e6f000 fffff880`03e8f000 AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`048b9000 fffff880`050ca000 atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`03eb4000 fffff880`03f00000 atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`02df2000 fffff880`02df9000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c44000 fffff880`03c55000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03991000 fffff880`039af000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00610000 fffff960`00637000 cdd cdd.dll Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`02d8e000 fffff880`02db8000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d25000 fffff880`00de5000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013a9000 fffff880`013d9000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cc7000 fffff880`00d25000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014db000 fffff880`0154e000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`045bd000 fffff880`045cd000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0568a000 fffff880`05698000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04200000 fffff880`0421e800 cxfalcon_IBV64 cxfalcon_IBV64.sys Mon May 11 04:18:10 2009 (4A07DF42)
fffff880`03c26000 fffff880`03c44000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c17000 fffff880`03c26000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03e8f000 fffff880`03eb1000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`057b6000 fffff880`057c9000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05698000 fffff880`057b6000 dump_iaStorV dump_iaStorV.sys Wed Apr 08 12:57:17 2009 (49DCD76D)
fffff880`0567e000 fffff880`0568a000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`050ca000 fffff880`051be000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`04800000 fffff880`04846000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`04544000 fffff880`04572f00 efe5b32e efe5b32e.sys Fri Nov 16 13:59:04 2007 (473DE878)
fffff880`0108a000 fffff880`0109e000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0103e000 fffff880`0108a000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0155f000 fffff880`01569000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01600000 fffff880`0164a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0281b000 fffff800`02864000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04846000 fffff880`0486a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05622000 fffff880`0567e000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`057d7000 fffff880`057f0000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`057f0000 fffff880`057f8080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`057c9000 fffff880`057d7000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`038c9000 fffff880`03991000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017ec000 fffff880`017f5000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04590000 fffff880`045ae000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010dc000 fffff880`011fa000 iaStorV iaStorV.sys Wed Apr 08 12:57:17 2009 (49DCD76D)
fffff880`00ec6000 fffff880`00ece000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`00c1a000 fffff880`00c30000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`045ae000 fffff880`045bd000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00b9b000 fffff800`00ba5000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0421f000 fffff880`04262000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`014c1000 fffff880`014db000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`017af000 fffff880`017da000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`04262000 fffff880`04267200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02cb4000 fffff880`02cc9000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c70000 fffff880`02c93000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c6f000 fffff880`00cb3000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04535000 fffff880`04544000 modem modem.sys Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`0560d000 fffff880`0561b000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`045ef000 fffff880`045fe000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05600000 fffff880`0560d000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c00000 fffff880`00c1a000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02db8000 fffff880`02de9000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0591e000 fffff880`0592e000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`039af000 fffff880`039c7000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`039c7000 fffff880`039f3000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`03800000 fffff880`0384d000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`0384d000 fffff880`03870000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`01652000 fffff880`0165d000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fe7000 fffff880`00ff1000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01463000 fffff880`014c1000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c0c000 fffff880`03c17000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017da000 fffff880`017ec000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0165d000 fffff880`0174f000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045e3000 fffff880`045ef000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02d1c000 fffff880`02d2f000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03f56000 fffff880`03f85000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e5a000 fffff880`03e6f000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d6f000 fffff880`03d7e000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ce5000 fffff880`03d2a000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0174f000 fffff880`017af000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0592e000 fffff880`05943000 NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`015ef000 fffff880`01600000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c00000 fffff880`03c0c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02864000 fffff800`02e41000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01206000 fffff880`013a9000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02de9000 fffff880`02df2000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02cc9000 fffff880`02d1c000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03d33000 fffff880`03d59000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04573000 fffff880`04590000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e40000 fffff880`00e55000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00de5000 fffff880`00df5000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0154e000 fffff880`0155f000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05467000 fffff880`0550d000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`03fc0000 fffff880`03ffd000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cb3000 fffff880`00cc7000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04888000 fffff880`048ac000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043e3000 fffff880`043fe000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03f85000 fffff880`03fa6000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03fa6000 fffff880`03fc0000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03dad000 fffff880`03dfe000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02c43000 fffff880`02c4c000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c4c000 fffff880`02c55000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`017f5000 fffff880`017fe000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015b5000 fffff880`015ef000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02d2f000 fffff880`02d47000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0550d000 fffff880`05518000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0164a000 fffff880`01652000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05943000 fffff880`059b4000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`05855000 fffff880`058ed000 srv srv.sys Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`05557000 fffff880`055c0000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`05518000 fffff880`05545000 srvnet srvnet.sys Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`045fe000 fffff880`045ff480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000 tcpip tcpip.sys Thu Apr 08 22:45:54 2010 (4BBE94E2)
fffff880`05545000 fffff880`05557000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0109e000 fffff880`010ab000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`013d9000 fffff880`013f7000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03d99000 fffff880`03dad000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00570000 fffff960`0057a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`010ab000 fffff880`010d1000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04268000 fffff880`0427a000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04533000 fffff880`04534f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04877000 fffff880`04888000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e00000 fffff880`03e5a000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03f00000 fffff880`03f56000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`02c55000 fffff880`02c70000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0486a000 fffff880`04877000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02c00000 fffff880`02c0e000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02c0e000 fffff880`02c33000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00ec6000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01569000 fffff880`015b5000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`043d6000 fffff880`043e3000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`03d59000 fffff880`03d6f000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03d7e000 fffff880`03d99000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c33000 fffff880`02c43000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ed4000 fffff880`00f78000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f78000 fffff880`00f87000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d2a000 fffff880`03d33000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00fde000 fffff880`00fe7000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02c93000 fffff880`02cb4000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`058ed000 fffff880`0591e000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`01450000 fffff880`0145e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`02c5d000 fffff880`02d7b000 dump_iaStorV
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`02d7b000 fffff880`02d8e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000