Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
Debug session time: Fri Jan 21 08:32:13.917 2011 (GMT-5)
System Uptime: 0 days 5:24:40.699
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa7fffffd008, 2, 1, fffff80002aa33a4}
Probably caused by : memory_corruption ( nt!MiUnlinkFreeOrZeroedPage+1ca )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa7fffffd008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002aa33a4, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cba0e0
fffffa7fffffd008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkFreeOrZeroedPage+1ca
fffff800`02aa33a4 48893cc2 mov qword ptr [rdx+rax*8],rdi
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880009a9a10 -- (.trap 0xfffff880009a9a10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffffffa00 rbx=0000000000000000 rcx=0000000000000008
rdx=fffffa8000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa33a4 rsp=fffff880009a9ba0 rbp=0000000000000055
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003903568
r11=fffff880009a9c08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiUnlinkFreeOrZeroedPage+0x1ca:
fffff800`02aa33a4 48893cc2 mov qword ptr [rdx+rax*8],rdi ds:fffffa7f`ffffd008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a81ca9 to fffff80002a82740
STACK_TEXT:
fffff880`009a98c8 fffff800`02a81ca9 : 00000000`0000000a fffffa7f`ffffd008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009a98d0 fffff800`02a80920 : fffffa80`01e6efd0 fffffa80`00180ff0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009a9a10 fffff800`02aa33a4 : 00000000`00000000 00000000`00000000 fffffa80`039d2040 fffff800`02ac9985 : nt!KiPageFault+0x260
fffff880`009a9ba0 fffff800`02ac94c6 : 00000000`000000ff 00000000`00000055 00000000`00000000 00000000`00000000 : nt!MiUnlinkFreeOrZeroedPage+0x1ca
fffff880`009a9c10 fffff800`02d26c06 : fffffa80`039d2040 00000000`00000080 fffffa80`03973b30 fffff800`02a60c19 : nt!MmZeroPageThread+0x551
fffff880`009a9d40 fffff800`02a60c26 : fffff800`02bfce80 fffffa80`039d2040 fffff800`02c0ac40 00002640`e8000000 : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkFreeOrZeroedPage+1ca
fffff800`02aa33a4 48893cc2 mov qword ptr [rdx+rax*8],rdi
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiUnlinkFreeOrZeroedPage+1ca
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiUnlinkFreeOrZeroedPage+1ca
BUCKET_ID: X64_0xA_nt!MiUnlinkFreeOrZeroedPage+1ca
Followup: MachineOwner
---------
Debug session time: Fri Jan 21 13:40:10.218 2011 (GMT-5)
System Uptime: 0 days 0:00:15.968
Loading Kernel Symbols
...............................................................
...................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff88002c37d24, 2, 8, fffff88002c37d24}
Unable to load image \SystemRoot\system32\DRIVERS\dtsoftbus01.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+37d24 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88002c37d24, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff88002c37d24, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbe0e0
fffff88002c37d24
CURRENT_IRQL: 2
FAULTING_IP:
dtsoftbus01+37d24
fffff880`02c37d24 41b801000000 mov r8d,1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880031c3700 -- (.trap 0xfffff880031c3700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffdfffd001b38 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002c37d24 rsp=fffff880031c3890 rbp=fffffa8005cd7110
r8=0000000000000000 r9=0000000000000000 r10=fffff88002c37d24
r11=fffffa80061c1c78 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dtsoftbus01+0x37d24:
fffff880`02c37d24 41b801000000 mov r8d,1
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a85ca9 to fffff80002a86740
FAILED_INSTRUCTION_ADDRESS:
dtsoftbus01+37d24
fffff880`02c37d24 41b801000000 mov r8d,1
STACK_TEXT:
fffff880`031c35b8 fffff800`02a85ca9 : 00000000`0000000a fffff880`02c37d24 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`031c35c0 fffff800`02a84920 : fffffa80`03977700 fffffa80`05cd7110 00000000`00000001 00000000`00000005 : nt!KiBugCheckDispatch+0x69
fffff880`031c3700 fffff880`02c37d24 : 00000000`00000010 fffffa80`05cd7110 fffffa80`05cd7110 00000000`00000018 : nt!KiPageFault+0x260
fffff880`031c3890 00000000`00000010 : fffffa80`05cd7110 fffffa80`05cd7110 00000000`00000018 fffff980`05f5eee0 : dtsoftbus01+0x37d24
fffff880`031c3898 fffffa80`05cd7110 : fffffa80`05cd7110 00000000`00000018 fffff980`05f5eee0 fffff880`02c39235 : 0x10
fffff880`031c38a0 fffffa80`05cd7110 : 00000000`00000018 fffff980`05f5eee0 fffff880`02c39235 fffff980`05f22fa0 : 0xfffffa80`05cd7110
fffff880`031c38a8 00000000`00000018 : fffff980`05f5eee0 fffff880`02c39235 fffff980`05f22fa0 fffffa80`05cd7110 : 0xfffffa80`05cd7110
fffff880`031c38b0 fffff980`05f5eee0 : fffff880`02c39235 fffff980`05f22fa0 fffffa80`05cd7110 fffff980`05f5efb0 : 0x18
fffff880`031c38b8 fffff880`02c39235 : fffff980`05f22fa0 fffffa80`05cd7110 fffff980`05f5efb0 fffff800`02f28631 : 0xfffff980`05f5eee0
fffff880`031c38c0 fffff980`05f22fa0 : fffffa80`05cd7110 fffff980`05f5efb0 fffff800`02f28631 fffffa80`061cb010 : dtsoftbus01+0x39235
fffff880`031c38c8 fffffa80`05cd7110 : fffff980`05f5efb0 fffff800`02f28631 fffffa80`061cb010 fffff980`05f5efb0 : 0xfffff980`05f22fa0
fffff880`031c38d0 fffff980`05f5efb0 : fffff800`02f28631 fffffa80`061cb010 fffff980`05f5efb0 fffff880`00c0e0c2 : 0xfffffa80`05cd7110
fffff880`031c38d8 fffff800`02f28631 : fffffa80`061cb010 fffff980`05f5efb0 fffff880`00c0e0c2 fffffa80`05ecbdd0 : 0xfffff980`05f5efb0
fffff880`031c38e0 fffff800`02f28bcc : 00000000`05060000 fffff880`031c3988 fffff880`031c3988 fffff980`05f5eee0 : nt!VfIrpLogRecordEvent+0x211
fffff880`031c3980 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`05dfaa00 fffffa80`05ecbc80 : nt!IovpCallDriver1+0x51c
STACK_COMMAND: kb
FOLLOWUP_IP:
dtsoftbus01+37d24
fffff880`02c37d24 41b801000000 mov r8d,1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dtsoftbus01+37d24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dtsoftbus01
IMAGE_NAME: dtsoftbus01.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d11d0b0
FAILURE_BUCKET_ID: X64_0xD1_VRF_CODE_AV_BAD_IP_dtsoftbus01+37d24
BUCKET_ID: X64_0xD1_VRF_CODE_AV_BAD_IP_dtsoftbus01+37d24
Followup: MachineOwner
---------
Debug session time: Fri Jan 21 09:31:50.012 2011 (GMT-5)
System Uptime: 0 days 0:58:38.747
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff88072158180, 2, 1, fffff80002a7c91d}
Probably caused by : ntkrnlmp.exe ( nt!KiCommitThreadWait+15d )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff88072158180, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a7c91d, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cad0e0
fffff88072158180
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+15d
fffff800`02a7c91d 4c89af40470000 mov qword ptr [rdi+4740h],r13
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: iw4mp.dat
TRAP_FRAME: fffff8800b4c88f0 -- (.trap 0xfffff8800b4c88f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000003d5a8b60696
rdx=0000000000003d82 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a7c91d rsp=fffff8800b4c8a80 rbp=fffffa800400e060
r8=fffffa800400e140 r9=00000000000000af r10=fffff88002dd4180
r11=fffff88002dd4100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiCommitThreadWait+0x15d:
fffff800`02a7c91d 4c89af40470000 mov qword ptr [rdi+4740h],r13 ds:00000000`00004740=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a74ca9 to fffff80002a75740
STACK_TEXT:
fffff880`0b4c87a8 fffff800`02a74ca9 : 00000000`0000000a fffff880`72158180 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0b4c87b0 fffff800`02a73920 : 00000000`00000000 fffffa80`0400e060 fffffa80`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0b4c88f0 fffff800`02a7c91d : fffffa80`0400e060 fffffa80`0400e060 00000000`00000000 fffff800`00000003 : nt!KiPageFault+0x260
fffff880`0b4c8a80 fffff800`02a7ecff : 00000000`00000188 ffffd89a`9c9a2516 00000000`000000af 00000000`0fb0f170 : nt!KiCommitThreadWait+0x15d
fffff880`0b4c8b10 fffff800`02d701d2 : fffff880`0b4c8c00 fffffa80`00000006 00000000`00000001 fffff800`02d94000 : nt!KeWaitForSingleObject+0x19f
fffff880`0b4c8bb0 fffff800`02a74993 : fffffa80`0400e060 00000000`00000188 fffff880`0b4c8bf8 fffffa80`061c2c60 : nt!NtWaitForSingleObject+0xb2
fffff880`0b4c8c20 00000000`73c82dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0fb0f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73c82dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiCommitThreadWait+15d
fffff800`02a7c91d 4c89af40470000 mov qword ptr [rdi+4740h],r13
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiCommitThreadWait+15d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiCommitThreadWait+15d
BUCKET_ID: X64_0xA_nt!KiCommitThreadWait+15d
Followup: MachineOwner
---------
3: kd> lmtsmn
start end module name
fffff880`00ee7000 fffff880`00f3e000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b41000 fffff880`02bcb000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0796c000 fffff880`07982000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03fea000 fffff880`03ffe000 amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03f10000 fffff880`03f25000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ff5000 fffff880`01000000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fec000 fffff880`00ff5000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02bcb000 fffff880`02beb000 AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`07043000 fffff880`0793f000 atikmdag atikmdag.sys Wed Jan 12 22:59:28 2011 (4D2E78A0)
fffff880`03f25000 fffff880`03f73000 atikmpag atikmpag.sys Wed Jan 12 22:20:37 2011 (4D2E6F85)
fffff960`00810000 fffff960`00871000 ATMFD ATMFD.DLL Tue Oct 19 23:05:45 2010 (4CBE5C89)
fffff880`02a70000 fffff880`02a77000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ed9000 fffff880`03eea000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06117000 fffff880`06135000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007b0000 fffff960`007d7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`0a50f000 fffff880`0a52c000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`02a3d000 fffff880`02a67000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cbc000 fffff880`00d7c000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00c00000 fffff880`00c30000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c5e000 fffff880`00cbc000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010be000 fffff880`01131000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0795c000 fffff880`0796c000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`061eb000 fffff880`061f4000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`085f0000 fffff880`085fe000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e38000 fffff880`03ebb000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03ebb000 fffff880`03ed9000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01200000 fffff880`01216000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`082a9000 fffff880`082cb000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`03d89000 fffff880`03dcc000 dtsoftbus01 dtsoftbus01.sys Wed Dec 22 05:19:28 2010 (4D11D0B0)
fffff880`0840c000 fffff880`08415000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`08400000 fffff880`0840c000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`08415000 fffff880`08428000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`085e4000 fffff880`085f0000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`06a09000 fffff880`06afd000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`06afd000 fffff880`06b43000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03861000 fffff880`03939000 eamonm eamonm.sys Fri Aug 13 08:38:55 2010 (4C653CDF)
fffff880`02a77000 fffff880`02a9c000 ehdrv ehdrv.sys Wed Jul 14 04:14:21 2010 (4C3D71DD)
fffff880`06000000 fffff880`06021000 epfwwfpr epfwwfpr.sys Wed Jul 14 04:10:34 2010 (4C3D70FA)
fffff880`0104c000 fffff880`01060000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013ee000 fffff880`013f8000 Fs_Rec Fs_Rec.sys unavailable (00000000)
fffff880`011b7000 fffff880`011f1000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02fe1000 fffff800`0302a000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03f73000 fffff880`03f7e000 hamachi hamachi.sys Thu Feb 19 05:36:41 2009 (499D3639)
fffff880`06b43000 fffff880`06b67000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`082d1000 fffff880`082ea000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`08436000 fffff880`0843e080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`08428000 fffff880`08436000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0604f000 fffff880`06117000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f2000 fffff880`015fb000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03f89000 fffff880`03f98000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08339000 fffff880`08347000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bd3000 fffff800`00bdd000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03fa7000 fffff880`03fea000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013c3000 fffff880`013dd000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`082cb000 fffff880`082d0200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`08324000 fffff880`08339000 LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`03939000 fffff880`0394e000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`08355000 fffff880`08378000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`08314000 fffff880`08324000 LUsbFilt LUsbFilt.Sys Tue Aug 24 13:21:47 2010 (4C73FFAB)
fffff880`00c3d000 fffff880`00c4a000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`08347000 fffff880`08355000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03f98000 fffff880`03fa7000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`082ea000 fffff880`082f7000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd2000 fffff880`00fec000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`06135000 fffff880`0614d000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0614d000 fffff880`0617a000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0617a000 fffff880`061c8000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`061c8000 fffff880`061eb000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02afa000 fffff880`02b05000 Msfs Msfs.SYS unavailable (00000000)
fffff880`00f47000 fffff880`00f51000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01060000 fffff880`010be000 msrpc msrpc.sys unavailable (00000000)
fffff880`03c5d000 fffff880`03c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e0000 fffff880`015f2000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01486000 fffff880`01578000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`079a6000 fffff880`079b2000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`079b2000 fffff880`079e1000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e12000 fffff880`03e27000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03d5d000 fffff880`03d6c000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ce9000 fffff880`03d2e000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01578000 fffff880`015d8000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02b05000 fffff880`02b16000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a05000 fffff800`02fe1000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01220000 fffff880`013c3000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02a67000 fffff880`02a70000 Null Null.SYS unavailable (00000000)
fffff880`03d37000 fffff880`03d5d000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f91000 fffff880`00fa6000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f51000 fffff880`00f84000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fbb000 fffff880`00fc2000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc2000 fffff880`00fd2000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013dd000 fffff880`013ee000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08200000 fffff880`082a6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`02a00000 fffff880`02a3d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c4a000 fffff880`00c5e000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`07982000 fffff880`079a6000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`079e1000 fffff880`079fc000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`07000000 fffff880`07021000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`07021000 fffff880`0703b000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c00000 fffff880`03c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03f7e000 fffff880`03f89000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02adf000 fffff880`02ae8000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ae8000 fffff880`02af1000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02af1000 fffff880`02afa000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0117d000 fffff880`011b7000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0394e000 fffff880`03966000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06b67000 fffff880`06b99000 Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`0a509000 fffff880`0a50f000 RTCore64 RTCore64.sys Wed May 25 02:39:12 2005 (42941D90)
fffff880`06021000 fffff880`0602c000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`07950000 fffff880`0795c000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03d6c000 fffff880`03d89000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015d8000 fffff880`015e0000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0a473000 fffff880`0a509000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`03993000 fffff880`039fa000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`03966000 fffff880`03993000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`06bfa000 fffff880`06bfb480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0602c000 fffff880`0603e000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b34000 fffff880`02b41000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b16000 fffff880`02b34000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03de7000 fffff880`03dfb000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004b0000 fffff960`004ba000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03eea000 fffff880`03f10000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03e00000 fffff880`03e12000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`082f7000 fffff880`08314000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0843f000 fffff880`08440f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0793f000 fffff880`07950000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03c77000 fffff880`03cd1000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`06b99000 fffff880`06ba4000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`06ba4000 fffff880`06bfa000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f84000 fffff880`00f91000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02a9c000 fffff880`02aaa000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`08445000 fffff880`085e4000 viahduaa viahduaa.sys Thu Sep 17 07:04:15 2009 (4AB217AF)
fffff880`02aaa000 fffff880`02acf000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys unavailable (00000000)
fffff880`00fa6000 fffff880`00fbb000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d7c000 fffff880`00dd8000 volmgrx volmgrx.sys unavailable (00000000)
fffff880`01131000 fffff880`0117d000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03dcc000 fffff880`03de7000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02acf000 fffff880`02adf000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e34000 fffff880`00ed8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed8000 fffff880`00ee7000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d2e000 fffff880`03d37000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d0000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`06a00000 fffff880`06a09000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f3e000 fffff880`00f47000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
Unloaded modules:
fffff880`0a52c000 fffff880`0a59d000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`011f1000 fffff880`011ff000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`00c30000 fffff880`00c3c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01216000 fffff880`0121f000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`00dd8000 fffff880`00deb000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000