Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02863000 PsLoadedModuleList = 0xfffff800`02aa0e50
Debug session time: Thu Apr 21 13:28:44.243 2011 (GMT-4)
System Uptime: 0 days 0:15:43.946
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {e, 2, 1, fffff800028ea312}
Probably caused by : ntkrnlmp.exe ( nt!KeReleaseSemaphore+a2 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800028ea312, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0b0e0
000000000000000e
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeReleaseSemaphore+a2
fffff800`028ea312 48894108 mov qword ptr [rcx+8],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff880043b0790 -- (.trap 0xfffff880043b0790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880046474e8 rbx=0000000000000000 rcx=0000000000000006
rdx=fffffa80064a1b58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028ea312 rsp=fffff880043b0920 rbp=0000000000000006
r8=0000000000000100 r9=0000000000000000 r10=0000000000000000
r11=fffff8a008380e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KeReleaseSemaphore+0xa2:
fffff800`028ea312 48894108 mov qword ptr [rcx+8],rax ds:0001:00000000`0000000e=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028d2ca9 to fffff800028d3740
STACK_TEXT:
fffff880`043b0648 fffff800`028d2ca9 : 00000000`0000000a 00000000`0000000e 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`043b0650 fffff800`028d1920 : 00000000`00000001 fffffa80`064a1dd0 fffff8a0`06db15c0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`043b0790 fffff800`028ea312 : fffffa80`064a1dd0 fffffa80`064a1a10 fffffa80`064a1b58 00000000`00000001 : nt!KiPageFault+0x260
fffff880`043b0920 fffff800`02bd7066 : fffff8a0`00000000 00000000`00000001 fffffa80`05d37a60 fffff8a0`08380d00 : nt!KeReleaseSemaphore+0xa2
fffff880`043b09a0 fffff800`02bd119d : 00000000`0044fb40 fffffa80`05d43b60 fffffa80`064a1a10 00000000`0044fb40 : nt!AlpcpDispatchReplyToWaitingThread+0x2d6
fffff880`043b0a00 fffff800`02bd2bd9 : fffffa80`05d43b00 fffff800`00000001 00000000`00000000 fffffa80`04e6db01 : nt!AlpcpSendMessage+0x66b
fffff880`043b0b00 fffff800`028d2993 : fffffa80`05d43b60 fffff880`043b0ca0 00000000`0044fa98 fffff800`02be7254 : nt!NtAlpcSendWaitReceivePort+0xb9
fffff880`043b0bb0 00000000`774dff0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0044fa78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774dff0a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeReleaseSemaphore+a2
fffff800`028ea312 48894108 mov qword ptr [rcx+8],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeReleaseSemaphore+a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0xA_nt!KeReleaseSemaphore+a2
BUCKET_ID: X64_0xA_nt!KeReleaseSemaphore+a2
Followup: MachineOwner
---------
Debug session time: Thu Apr 21 13:12:17.468 2011 (GMT-4)
System Uptime: 0 days 0:02:47.171
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960000fa36b, fffff88003c12040, 0}
Probably caused by : win32k.sys ( win32k!ThreadUnlock1+b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000fa36b, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88003c12040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!ThreadUnlock1+b
fffff960`000fa36b 488b8a50010000 mov rcx,qword ptr [rdx+150h]
CONTEXT: fffff88003c12040 -- (.cxr 0xfffff88003c12040)
rax=0000000055555598 rbx=0000000000000021 rcx=00000000000000c8
rdx=0000000000000000 rsi=fffff900c00e93d0 rdi=000000000000000d
rip=fffff960000fa36b rsp=fffff88003c12a10 rbp=0000000000000000
r8=00000000fffffff7 r9=0000000000000000 r10=000000000000001c
r11=fffff900c01c3af0 r12=0000000000000000 r13=fffff960003122c0
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32k!ThreadUnlock1+0xb:
fffff960`000fa36b 488b8a50010000 mov rcx,qword ptr [rdx+150h] ds:002b:00000000`00000150=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff96000145dc5 to fffff960000fa36b
STACK_TEXT:
fffff880`03c12a10 fffff960`00145dc5 : 00000000`00000001 00000000`00000000 fffff900`c00e93d0 00000000`0000000d : win32k!ThreadUnlock1+0xb
fffff880`03c12a40 fffff960`000f2f5d : fffff900`c302cb70 00000000`0000000f 00000000`7fffffff fffff800`028921e3 : win32k!zzzAnimateCursor+0xed
fffff880`03c12aa0 fffff960`000f39e4 : 00000000`00000000 fffff960`00312a90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0xf1
fffff880`03c12af0 fffff960`0008455c : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`80000390 : win32k!RawInputThread+0x9b4
fffff880`03c12bc0 fffff960`0010419a : fffffa80`00000002 fffff880`02ef4f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`03c12bf0 fffff800`02885993 : fffffa80`05f55b60 00000000`00000004 000007ff`fffd4000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`03c12c20 000007fe`fd8b3d5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`017afec8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd8b3d5a
FOLLOWUP_IP:
win32k!ThreadUnlock1+b
fffff960`000fa36b 488b8a50010000 mov rcx,qword ptr [rdx+150h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!ThreadUnlock1+b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f11c9
STACK_COMMAND: .cxr 0xfffff88003c12040 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!ThreadUnlock1+b
BUCKET_ID: X64_0x3B_win32k!ThreadUnlock1+b
Followup: MachineOwner
---------
Debug session time: Thu Apr 21 01:46:23.224 2011 (GMT-4)
System Uptime: 0 days 0:05:58.943
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1206, 2, 1, fffff8800886cdda}
Unable to load image \SystemRoot\system32\DRIVERS\athurx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athurx.sys
*** ERROR: Module load completed but symbols could not be loaded for athurx.sys
Probably caused by : hardware ( athurx+60dda )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001206, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800886cdda, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'nvmf6264' and 'nvm62x64.sys' overlap
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b010e0
0000000000001206
CURRENT_IRQL: 2
FAULTING_IP:
athurx+60dda
fffff880`0886cdda 800000 add byte ptr [rax],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88004365160 -- (.trap 0xfffff88004365160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000001206 rbx=0000000000000000 rcx=fffffa80056cc3b0
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800886cdda rsp=fffff880043652f0 rbp=0000000000000080
r8=fffffa8003daa050 r9=0000000000000001 r10=fffff880089c03c8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
athurx+0x60dda:
fffff880`0886cdda 800000 add byte ptr [rax],0 ds:dd70:00000000`00001206=??
Resetting default scope
MISALIGNED_IP:
athurx+60dda
fffff880`0886cdda 800000 add byte ptr [rax],0
LAST_CONTROL_TRANSFER: from fffff800028c8ca9 to fffff800028c9740
STACK_TEXT:
fffff880`04365018 fffff800`028c8ca9 : 00000000`0000000a 00000000`00001206 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`04365020 fffff800`028c7920 : fffff880`0176e9a0 00000000`00057a19 fffffa80`046ad000 fffffa80`046ad000 : nt!KiBugCheckDispatch+0x69
fffff880`04365160 fffff880`0886cdda : fffffa80`037d7720 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`043652f0 fffffa80`037d7720 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : athurx+0x60dda
fffff880`043652f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`037d7720
STACK_COMMAND: kb
FOLLOWUP_IP:
athurx+60dda
fffff880`0886cdda 800000 add byte ptr [rax],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athurx+60dda
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_athurx.sys
BUCKET_ID: X64_IP_MISALIGNED_athurx.sys
Followup: MachineOwner
---------
Debug session time: Wed Apr 20 17:54:48.687 2011 (GMT-4)
System Uptime: 0 days 0:00:58.250
Loading Kernel Symbols
...............................................................
........................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88003330194, fffff88001f87f38, fffff88001f877a0}
Unable to load image \SystemRoot\system32\DRIVERS\usbhub.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for usbhub.sys
*** ERROR: Module load completed but symbols could not be loaded for usbhub.sys
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_ProcessURB+914 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003330194, The address that the exception occurred at
Arg3: fffff88001f87f38, Exception Record Address
Arg4: fffff88001f877a0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
USBPORT!USBPORT_ProcessURB+914
fffff880`03330194 ff15fee00000 call qword ptr [USBPORT!_imp_MmBuildMdlForNonPagedPool (fffff880`0333e298)]
EXCEPTION_RECORD: fffff88001f87f38 -- (.exr 0xfffff88001f87f38)
ExceptionAddress: fffff88003330194 (USBPORT!USBPORT_ProcessURB+0x0000000000000914)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88001f877a0 -- (.cxr 0xfffff88001f877a0)
rax=fffffa80056e07d0 rbx=fffffa8004f01010 rcx=fffffa80056e07d0
rdx=fffffa80056e07d1 rsi=fffffa8004f69050 rdi=fffffa80058eef70
rip=fffff88003330194 rsp=fffff88001f88170 rbp=0000000000000000
r8=fffffa80056e07d0 r9=0000000000000000 r10=fffff80001e4d700
r11=0000000000000000 r12=00000000c000000d r13=fffffa8005900a10
r14=0000000000000000 r15=fffffa8005841db8
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
USBPORT!USBPORT_ProcessURB+0x914:
fffff880`03330194 ff15fee00000 call qword ptr [USBPORT!_imp_MmBuildMdlForNonPagedPool (fffff880`0333e298)] ds:002b:fffff880`0333e298=0000000000038b20
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001f010e0
ffffffffffffffff
FOLLOWUP_IP:
USBPORT!USBPORT_ProcessURB+914
fffff880`03330194 ff15fee00000 call qword ptr [USBPORT!_imp_MmBuildMdlForNonPagedPool (fffff880`0333e298)]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88003338d44 to fffff88003330194
STACK_TEXT:
fffff880`01f88170 fffff880`03338d44 : fffffa80`0505ab20 fffffa80`05020009 fffffa80`0505ab20 fffffa80`058eef70 : USBPORT!USBPORT_ProcessURB+0x914
fffff880`01f88220 fffff880`03312ad4 : 00000000`00000000 fffffa80`05025050 fffffa80`05f7a220 fffffa80`0505ab20 : USBPORT!USBPORT_PdoInternalDeviceControlIrp+0x138
fffff880`01f88260 fffff880`03692566 : fffffa80`0502e050 fffffa80`04f1b060 fffffa80`0505ab20 fffffa80`0502e1a0 : USBPORT!USBPORT_Dispatch+0x1dc
fffff880`01f882a0 fffffa80`0502e050 : fffffa80`04f1b060 fffffa80`0505ab20 fffffa80`0502e1a0 fffffa80`0505ab20 : usbhub+0x3566
fffff880`01f882a8 fffffa80`04f1b060 : fffffa80`0505ab20 fffffa80`0502e1a0 fffffa80`0505ab20 fffff880`036c2cab : 0xfffffa80`0502e050
fffff880`01f882b0 fffffa80`0505ab20 : fffffa80`0502e1a0 fffffa80`0505ab20 fffff880`036c2cab 00000000`00000000 : 0xfffffa80`04f1b060
fffff880`01f882b8 fffffa80`0502e1a0 : fffffa80`0505ab20 fffff880`036c2cab 00000000`00000000 00000000`00000000 : 0xfffffa80`0505ab20
fffff880`01f882c0 fffffa80`0505ab20 : fffff880`036c2cab 00000000`00000000 00000000`00000000 fffffa80`04f1b060 : 0xfffffa80`0502e1a0
fffff880`01f882c8 fffff880`036c2cab : 00000000`00000000 00000000`00000000 fffffa80`04f1b060 fffffa80`05904b30 : 0xfffffa80`0505ab20
fffff880`01f882d0 00000000`00000000 : 00000000`00000000 fffffa80`04f1b060 fffffa80`05904b30 00000000`00000000 : usbhub+0x33cab
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: USBPORT!USBPORT_ProcessURB+914
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
STACK_COMMAND: .cxr 0xfffff88001f877a0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_USBPORT!USBPORT_ProcessURB+914
BUCKET_ID: X64_0x7E_USBPORT!USBPORT_ProcessURB+914
Followup: MachineOwner
---------
2: kd> lmtsmn
start end module name
fffff880`00f94000 fffff880`00feb000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c6c000 fffff880`02cf6000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02c0b000 fffff880`02c21000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010d6000 fffff880`010e1000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00cda000 fffff880`00ce3000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d76000 fffff880`00da0000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03e37000 fffff880`03fff000 athurx athurx.sys Mon Jan 04 22:23:16 2010 (4B42B0A4)
fffff880`0181c000 fffff880`01823000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0322a000 fffff880`0323b000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04564000 fffff880`04582000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff880`0370a000 fffff880`03727000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`03200000 fffff880`0322a000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01987000 fffff880`019b7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d18000 fffff880`00d76000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`02dec000 fffff880`02dfc000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0377b000 fffff880`03789000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0323c000 fffff880`032bf000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03727000 fffff880`03739000 dc3d dc3d.sys Fri Apr 08 18:58:20 2011 (4D9F930C)
fffff880`032bf000 fffff880`032dd000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`01971000 fffff880`01987000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03789000 fffff880`03793000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`037be000 fffff880`037d1000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03793000 fffff880`037be000 dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`036fe000 fffff880`0370a000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00490000 fffff960`004ae000 dxg dxg.sys unavailable (00000000)
fffff880`0112d000 fffff880`01141000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e1000 fffff880`0112d000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`00830000 fffff960`00839000 framebuf framebuf.dll unavailable (00000000)
fffff880`013e8000 fffff880`013f2000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01937000 fffff880`01971000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`01c10000 fffff800`01c59000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03375000 fffff880`03399000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`03747000 fffff880`03760000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`03e2c000 fffff880`03e34080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`03739000 fffff880`03747000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0192e000 fffff880`01937000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0145a000 fffff880`01469000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03760000 fffff880`0376e000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bbf000 fffff800`00bc9000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`0363a000 fffff880`0367d000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013bd000 fffff880`013d7000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015bd000 fffff880`015e8000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00cf7000 fffff880`00d04000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`011eb000 fffff880`011fa000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0376e000 fffff880`0377b000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04582000 fffff880`0459a000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0459a000 fffff880`045c7000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`04400000 fffff880`0444e000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`0444e000 fffff880`04471000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0186f000 fffff880`0187a000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ff4000 fffff880`00ffe000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01141000 fffff880`0119f000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c00000 fffff880`02c0b000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0191c000 fffff880`0192e000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0146b000 fffff880`0155d000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02c45000 fffff880`02c51000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04551000 fffff880`04564000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`00dcb000 fffff880`00dfa000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`036e9000 fffff880`036fe000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d80000 fffff880`02d8f000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cf6000 fffff880`02d3b000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0155d000 fffff880`015bd000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0187a000 fffff880`0188b000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02de0000 fffff880`02dec000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`01c59000 fffff800`02236000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0121a000 fffff880`013bd000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01813000 fffff880`0181c000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03399000 fffff880`033fcd80 nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
fffff880`00da0000 fffff880`00dcb000 nvstor nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`044fe000 fffff880`04551000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d44000 fffff880`02d6a000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ec6000 fffff880`00ecd000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ecd000 fffff880`00edd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d7000 fffff880`013e8000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00d04000 fffff880`00d18000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02c21000 fffff880`02c45000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`02c51000 fffff880`02c6c000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`018b6000 fffff880`018d7000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`01200000 fffff880`0121a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d8f000 fffff880`02de0000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`018d7000 fffff880`018e2000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01866000 fffff880`0186f000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`018e2000 fffff880`0191c000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01074000 fffff880`010d6000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`033fd000 fffff880`033fe480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`018a9000 fffff880`018b6000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0188b000 fffff880`018a9000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`015e8000 fffff880`015fc000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00650000 fffff960`0065a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`032dd000 fffff880`03303000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0367d000 fffff880`0368f000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`03e0d000 fffff880`03e2a000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`03e2a000 fffff880`03e2bf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03364000 fffff880`03375000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0368f000 fffff880`036e9000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03303000 fffff880`0330e000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0330e000 fffff880`03364000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01823000 fffff880`01831000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01831000 fffff880`01856000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0144a000 fffff880`0145a000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e55000 fffff880`00e6a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00ec6000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0119f000 fffff880`011eb000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03e00000 fffff880`03e0d000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d6a000 fffff880`02d80000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`01856000 fffff880`01866000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ee1000 fffff880`00f85000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f85000 fffff880`00f94000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d3b000 fffff880`02d44000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003c2000 win32k win32k.sys unavailable (00000000)
fffff880`00feb000 fffff880`00ff4000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`037d1000 fffff880`037f2000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`019b7000 fffff880`019c5000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`019c5000 fffff880`019cf000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`019cf000 fffff880`019fa000 dump_nvstor.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01800000 fffff880`01813000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0145a000 fffff880`01462000 spldr.sys
Timestamp: unavailable (00000000)
Checksum: 00000000