Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101110-17035-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a53000 PsLoadedModuleList = 0x82b9b810
Debug session time: Mon Oct 11 12:09:23.371 2010 (GMT-5)
System Uptime: 0 days 0:31:34.322
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041284, A PTE or the working set list is corrupt.
Arg2: 01364001
Arg3: 0000391e
Arg4: c0802000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82ac9806 to 82b2fd10
STACK_TEXT:
821bda84 82ac9806 0000001a 00041284 01364001 nt!KeBugCheckEx+0x1e
821bdaac 82b0c8b8 c0c05d90 013cffff 01350002 nt!MiLocateWsle+0xc1
821bdba8 82b063fe 01350002 013cffff 89713690 nt!MiDeleteVirtualAddresses+0x1b5
821bdc78 82afa708 89713690 859c1600 851a2b80 nt!MiRemoveMappedView+0x325
821bdca0 82ccd4c8 851a2b80 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
821bdd04 82cced31 89713690 01350000 00000000 nt!MiUnmapViewOfSection+0x265
821bdd24 82a9642a ffffffff 01350000 001af6dc nt!NtUnmapViewOfSection+0x55
821bdd24 77a264f4 ffffffff 01350000 001af6dc nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
001af6dc 00000000 00000000 00000000 00000000 0x77a264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiLocateWsle+c1
82ac9806 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiLocateWsle+c1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x1a_41284_nt!MiLocateWsle+c1
BUCKET_ID: 0x1a_41284_nt!MiLocateWsle+c1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101110-21980-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0d000 PsLoadedModuleList = 0x82b55810
Debug session time: Mon Oct 11 10:20:06.704 2010 (GMT-5)
System Uptime: 0 days 0:02:13.280
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82aac873, 8d38f9bc, 8d38f5a0}
Probably caused by : memory_corruption ( nt!MiGetNextNode+b )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82aac873, The address that the exception occurred at
Arg3: 8d38f9bc, Exception Record Address
Arg4: 8d38f5a0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiGetNextNode+b
82aac873 394804 cmp dword ptr [eax+4],ecx
EXCEPTION_RECORD: 8d38f9bc -- (.exr 0xffffffff8d38f9bc)
ExceptionAddress: 82aac873 (nt!MiGetNextNode+0x0000000b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000004
Attempt to read from address 00000004
CONTEXT: 8d38f5a0 -- (.cxr 0xffffffff8d38f5a0)
eax=00000000 ebx=891f7f38 ecx=891f7f38 edx=00000025 esi=851c7a70 edi=976e2008
eip=82aac873 esp=8d38fa84 ebp=8d38fabc iopl=0 nv up ei pl nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010213
nt!MiGetNextNode+0xb:
82aac873 394804 cmp dword ptr [eax+4],ecx ds:0023:00000004=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: PdtWzd.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000004
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b75718
Unable to read MiSystemVaType memory at 82b55160
00000004
FOLLOWUP_IP:
nt!MiGetNextNode+b
82aac873 394804 cmp dword ptr [eax+4],ecx
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 82c8b22c to 82aac873
STACK_TEXT:
8d38fa80 82c8b22c 00002000 8d38fb50 00000002 nt!MiGetNextNode+0xb
8d38fabc 82bce720 976e2008 891e9920 8d38fb50 nt!MmEnumerateAndReferenceImages+0x11c
8d38fae4 82bcf07a 891e9920 00000000 891e9920 nt!EtwpEnumerateImages+0x41
8d38fb28 82bce531 891e9920 8d38fb50 00000000 nt!EtwpProcessEnumCallback+0x1c1
8d38fb40 82bceeac 82bceeb7 8d38fb50 8d38fbb4 nt!PsEnumProcesses+0x12
8d38fb64 82bcedbd 8d38fbb4 00000000 82b46b18 nt!EtwpProcessThreadImageRundown+0x43
8d38fb78 82bced3d 00000002 00000001 82b4c320 nt!EtwpKernelTraceRundown+0x28
8d38fc34 82bf65c1 00000000 00000000 00000002 nt!EtwpUpdateLoggerGroupMasks+0x1a4
8d38fc48 82bf6322 000000b4 00000000 000000b4 nt!EtwpStopLoggerInstance+0x39
8d38fc78 82c5f462 9c954848 00000000 a99c0903 nt!EtwpStopTrace+0xf8
8d38fcd0 82bcea6d 00000002 82b4cac0 000000b4 nt!NtTraceControl+0x219
8d38fd00 82a7af2b 897dc048 00000000 851c7a70 nt!PerfDiagpProxyWorker+0x15a
8d38fd50 82c1b66d 00000001 a99c0843 00000000 nt!ExpWorkerThread+0x10d
8d38fd90 82acd0d9 82a7ae1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetNextNode+b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
STACK_COMMAND: .cxr 0xffffffff8d38f5a0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x7E_nt!MiGetNextNode+b
BUCKET_ID: 0x7E_nt!MiGetNextNode+b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101110-22510-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a37000 PsLoadedModuleList = 0x82b7f810
Debug session time: Mon Oct 11 10:15:21.659 2010 (GMT-5)
System Uptime: 0 days 0:06:55.235
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e991210c, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 82acb5e3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b9f718
Unable to read MiSystemVaType memory at 82b7f160
e991210c
FAULTING_IP:
nt!MiFindNodeOrParent+17
82acb5e3 3b510c cmp edx,dword ptr [ecx+0Ch]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: 97da1bac -- (.trap 0xffffffff97da1bac)
ErrCode = 00000000
eax=e9912100 ebx=0358c000 ecx=e9912100 edx=0000358c esi=891c27f0 edi=0358dfff
eip=82acb5e3 esp=97da1c20 ebp=97da1c20 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
nt!MiFindNodeOrParent+0x17:
82acb5e3 3b510c cmp edx,dword ptr [ecx+0Ch] ds:0023:e991210c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a7d5f8 to 82abc8e3
STACK_TEXT:
97da1b94 82a7d5f8 00000000 e991210c 00000000 nt!MmAccessFault+0x106
97da1b94 82acb5e3 00000000 e991210c 00000000 nt!KiTrap0E+0xdc
97da1c20 82ade91e 97da1c30 88393438 88f9b248 nt!MiFindNodeOrParent+0x17
97da1c34 82ca51e9 b36ecbc5 0358cfb8 fe763160 nt!MiLocateAddress+0x41
97da1c74 82cbab64 0358cfe8 00000100 00000004 nt!MiSecureVirtualMemory+0x85
97da1c94 96030a9a 0358cfe8 00000100 00000004 nt!MmSecureVirtualMemory+0x1a
97da1d08 82a7a42a 070101a3 be050d29 00000000 win32k!NtGdiGetDIBitsInternal+0x109
97da1d08 77d964f4 070101a3 be050d29 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0224e850 00000000 00000000 00000000 00000000 0x77d964f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!NtGdiGetDIBitsInternal+109
96030a9a 8945dc mov dword ptr [ebp-24h],eax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!NtGdiGetDIBitsInternal+109
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc2a2
FAILURE_BUCKET_ID: 0x50_win32k!NtGdiGetDIBitsInternal+109
BUCKET_ID: 0x50_win32k!NtGdiGetDIBitsInternal+109
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101110-18954-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a43000 PsLoadedModuleList = 0x82b8b810
Debug session time: Mon Oct 11 13:56:41.627 2010 (GMT-5)
System Uptime: 0 days 0:04:31.578
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 98d5c000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 96b58db3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bab718
Unable to read MiSystemVaType memory at 82b8b160
98d5c000
FAULTING_IP:
win32k!memcpy+33
96b58db3 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: SynTPEnh.exe
CURRENT_IRQL: 0
TRAP_FRAME: 98d5b940 -- (.trap 0xffffffff98d5b940)
ErrCode = 00000002
eax=fe5f2f96 ebx=98d5ba70 ecx=00000124 edx=00000002 esi=fe5f2b04 edi=98d5c000
eip=96b58db3 esp=98d5b9b4 ebp=98d5b9bc iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
win32k!memcpy+0x33:
96b58db3 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a895f8 to 82ac88e3
STACK_TEXT:
98d5b928 82a895f8 00000001 98d5c000 00000000 nt!MmAccessFault+0x106
98d5b928 96b58db3 00000001 98d5c000 00000000 nt!KiTrap0E+0xdc
98d5b9bc 96b66606 98d5ba70 fe5f2574 00000a22 win32k!memcpy+0x33
98d5b9e0 96b62eaf fe5f2574 98d5ba70 98d5ba0c win32k!GreGetCannonicalName+0x51
98d5ba04 96b619d0 98d5bc98 98d5bc64 98d5bc3c win32k!MAPPER::MAPPER+0x40
98d5bb64 00595e6d 0009101a 001a1f27 0042464d win32k!ppfeGetAMatch+0x4e
WARNING: Frame IP not in any known module. Following frames may be wrong.
98d5bb8c 00b4b7b9 00c6c8ca 00c4c5c7 00a7a9ac 0x595e6d
98d5bb90 00c6c8ca 00c4c5c7 00a7a9ac 007a7a7c 0xb4b7b9
98d5bb94 00c4c5c7 00a7a9ac 007a7a7c 006c7176 0xc6c8ca
98d5bb98 00a7a9ac 007a7a7c 006c7176 009599a3 0xc4c5c7
98d5bb9c 007a7a7c 006c7176 009599a3 00b6bac2 0xa7a9ac
98d5bba0 006c7176 009599a3 00b6bac2 00ccd0d8 0x7a7a7c
98d5bba4 009599a3 00b6bac2 00ccd0d8 00f5f5f5 0x6c7176
98d5bba8 00b6bac2 00ccd0d8 00f5f5f5 00838486 0x9599a3
98d5bbac 00ccd0d8 00f5f5f5 00838486 00ff00ff 0xb6bac2
98d5bbb0 00f5f5f5 00838486 00ff00ff 00ff00ff 0xccd0d8
98d5bbb4 00838486 00ff00ff 00ff00ff 00ff00ff 0xf5f5f5
98d5bbb8 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0x838486
98d5bbbc 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbc0 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbc4 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbc8 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbcc 00ff00ff 00ff00ff 00ff00ff 00838486 0xff00ff
98d5bbd0 00ff00ff 00ff00ff 00838486 007a828f 0xff00ff
98d5bbd4 00ff00ff 00838486 007a828f 00313b45 0xff00ff
98d5bbd8 00838486 007a828f 00313b45 002a343d 0xff00ff
98d5bbdc 007a828f 00313b45 002a343d 00222b36 0x838486
98d5bbe0 00313b45 002a343d 00222b36 001e242d 0x7a828f
98d5bbe4 002a343d 00222b36 001e242d 00161c23 0x313b45
98d5bbe8 00222b36 001e242d 00161c23 002d333b 0x2a343d
98d5bbec 001e242d 00161c23 002d333b 007e838b 0x222b36
98d5bbf0 00161c23 002d333b 007e838b 00919aa6 0x1e242d
98d5bbf4 002d333b 007e838b 00919aa6 0084909e 0x161c23
98d5bbf8 007e838b 00919aa6 0084909e 006e7b8c 0x2d333b
98d5bbfc 00919aa6 0084909e 006e7b8c 00536376 0x7e838b
98d5bc00 0084909e 006e7b8c 00536376 00404e64 0x919aa6
98d5bc04 006e7b8c 00536376 00404e64 002e3d52 0x84909e
98d5bc08 00536376 00404e64 002e3d52 00243142 0x6e7b8c
98d5bc0c 00404e64 002e3d52 00243142 001e2a3a 0x536376
98d5bc10 002e3d52 00243142 001e2a3a 00182331 0x404e64
98d5bc14 00243142 001e2a3a 00182331 0027303a 0x2e3d52
98d5bc18 001e2a3a 00182331 0027303a 00989fb4 0x243142
98d5bc1c 00182331 0027303a 00989fb4 00a0a7bd 0x1e2a3a
98d5bc20 0027303a 00989fb4 00a0a7bd 00969db3 0x182331
98d5bc24 00989fb4 00a0a7bd 00969db3 001f2732 0x27303a
98d5bc28 00a0a7bd 00969db3 001f2732 0009101a 0x989fb4
98d5bc2c 00969db3 001f2732 0009101a 0010171f 0xa0a7bd
98d5bc30 001f2732 0009101a 0010171f 00343c42 0x969db3
98d5bc34 0009101a 0010171f 00343c42 00595e65 0x1f2732
98d5bc38 0010171f 00343c42 00595e65 0061676c 0x9101a
98d5bc3c 00343c42 00595e65 0061676c 006f7379 0x10171f
98d5bc40 00595e65 0061676c 006f7379 007c8186 0x343c42
98d5bc44 0061676c 006f7379 007c8186 008e9196 0x595e65
98d5bc48 006f7379 007c8186 008e9196 00a0a2a5 0x61676c
98d5bc4c 007c8186 008e9196 00a0a2a5 00b4b7b9 0x6f7379
98d5bc50 008e9196 00a0a2a5 00b4b7b9 00bfc0c1 0x7c8186
98d5bc54 00a0a2a5 00b4b7b9 00bfc0c1 00a7a9ac 0x8e9196
98d5bc58 00b4b7b9 00bfc0c1 00a7a9ac 008b8b8d 0xa0a2a5
98d5bc5c 00bfc0c1 00a7a9ac 008b8b8d 00626367 0xb4b7b9
98d5bc60 00a7a9ac 008b8b8d 00626367 007e8189 0xbfc0c1
98d5bc64 008b8b8d 00626367 007e8189 00a1a6af 0xa7a9ac
98d5bc68 00626367 007e8189 00a1a6af 00b9bec6 0x8b8b8d
98d5bc6c 007e8189 00a1a6af 00b9bec6 00ccd0d8 0x626367
98d5bc70 00a1a6af 00b9bec6 00ccd0d8 00f5f5f5 0x7e8189
98d5bc74 00b9bec6 00ccd0d8 00f5f5f5 00838486 0xa1a6af
98d5bc78 00ccd0d8 00f5f5f5 00838486 00ff00ff 0xb9bec6
98d5bc7c 00f5f5f5 00838486 00ff00ff 00ff00ff 0xccd0d8
98d5bc80 00838486 00ff00ff 00ff00ff 00ff00ff 0xf5f5f5
98d5bc84 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0x838486
98d5bc88 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc8c 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc90 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc94 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc98 00ff00ff 00ff00ff 00ff00ff 00838486 0xff00ff
98d5bc9c 00ff00ff 00ff00ff 00838486 007a828f 0xff00ff
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!memcpy+33
96b58db3 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!memcpy+33
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc2a2
FAILURE_BUCKET_ID: 0x50_win32k!memcpy+33
BUCKET_ID: 0x50_win32k!memcpy+33
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101110-22900-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a4b000 PsLoadedModuleList = 0x82b93810
Debug session time: Mon Oct 11 10:17:28.682 2010 (GMT-5)
System Uptime: 0 days 0:01:41.259
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, 82abd3ca}
*** WARNING: Unable to verify timestamp for yk62x86.sys
*** ERROR: Module load completed but symbols could not be loaded for yk62x86.sys
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
*** WARNING: Unable to verify timestamp for amdxata.sys
*** ERROR: Module load completed but symbols could not be loaded for amdxata.sys
*** WARNING: Unable to verify timestamp for spldr.sys
*** ERROR: Module load completed but symbols could not be loaded for spldr.sys
*** WARNING: Unable to verify timestamp for dump_iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for dump_iaStor.sys
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for nvBridge.kmd
*** ERROR: Module load completed but symbols could not be loaded for nvBridge.kmd
*** WARNING: Unable to verify timestamp for netw5v32.sys
*** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
*** WARNING: Unable to verify timestamp for o2sd.sys
*** ERROR: Module load completed but symbols could not be loaded for o2sd.sys
*** WARNING: Unable to verify timestamp for o2media.sys
*** ERROR: Module load completed but symbols could not be loaded for o2media.sys
*** WARNING: Unable to verify timestamp for SynTP.sys
*** ERROR: Module load completed but symbols could not be loaded for SynTP.sys
*** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
*** WARNING: Unable to verify timestamp for mdmxsdk.sys
*** ERROR: Module load completed but symbols could not be loaded for mdmxsdk.sys
*** WARNING: Unable to verify timestamp for RTKVHDA.sys
*** ERROR: Module load completed but symbols could not be loaded for RTKVHDA.sys
*** WARNING: Unable to verify timestamp for drmk.sys
*** ERROR: Module load completed but symbols could not be loaded for drmk.sys
*** WARNING: Unable to verify timestamp for HSXHWAZL.sys
*** ERROR: Module load completed but symbols could not be loaded for HSXHWAZL.sys
*** WARNING: Unable to verify timestamp for HSX_DPV.sys
*** ERROR: Module load completed but symbols could not be loaded for HSX_DPV.sys
*** WARNING: Unable to verify timestamp for HSX_CNXT.sys
*** ERROR: Module load completed but symbols could not be loaded for HSX_CNXT.sys
*** WARNING: Unable to verify timestamp for cdd.dll
*** ERROR: Module load completed but symbols could not be loaded for cdd.dll
*** WARNING: Unable to verify timestamp for peauth.sys
*** ERROR: Module load completed but symbols could not be loaded for peauth.sys
*** WARNING: Unable to verify timestamp for secdrv.SYS
*** ERROR: Module load completed but symbols could not be loaded for secdrv.SYS
*** WARNING: Unable to verify timestamp for XAudio32.sys
*** ERROR: Module load completed but symbols could not be loaded for XAudio32.sys
*** WARNING: Unable to verify timestamp for spsys.sys
*** ERROR: Module load completed but symbols could not be loaded for spsys.sys
Probably caused by : ntkrpamp.exe ( nt!KiActivateWaiterQueue+3c )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82abd3ca, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bb3718
Unable to read MiSystemVaType memory at 82b93160
00000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiActivateWaiterQueue+3c
82abd3ca 890a mov dword ptr [edx],ecx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: 8d3fda2c -- (.trap 0xffffffff8d3fda2c)
ErrCode = 00000002
eax=88f7a030 ebx=807c2120 ecx=00000000 edx=00000000 esi=8800a040 edi=88f7cd48
eip=82abd3ca esp=8d3fdaa0 ebp=8d3fdab4 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!KiActivateWaiterQueue+0x3c:
82abd3ca 890a mov dword ptr [edx],ecx ds:0023:00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82abd3ca to 82a917eb
STACK_TEXT:
8d3fda2c 82abd3ca badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
8d3fdab4 82ab8360 88f7a030 88f7ce08 88f7cd48 nt!KiActivateWaiterQueue+0x3c
8d3fdae0 82b019d2 88f7cd48 88f7ce08 00000000 nt!KiCommitThreadWait+0x13c
8d3fdb24 82a803f3 00000000 8513d144 8513d298 nt!KeWaitForGate+0x158
8d3fdb40 82b6af6c 00120010 8d3fdc80 00000010 nt!KiAcquireGuardedMutex+0x5e
8d3fdb94 82c9ebc4 00000001 00000018 73556553 nt!ExAllocatePoolWithTag+0x3bc
8d3fdbe0 82c9bd09 00ccf164 8d3fdc80 a9837902 nt!SepProbeAndCaptureString_U+0x7b
8d3fdcb4 82c56e7f 00ccf15c 00000000 00000000 nt!SepAccessCheckAndAuditAlarm+0x2d2
8d3fdd00 82a8e42a 00ccf15c 00000000 00ccf164 nt!NtAccessCheckAndAuditAlarm+0x31
8d3fdd00 771c64f4 00ccf15c 00000000 00ccf164 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
00ccf178 00000000 00000000 00000000 00000000 0x771c64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiActivateWaiterQueue+3c
82abd3ca 890a mov dword ptr [edx],ecx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiActivateWaiterQueue+3c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
FAILURE_BUCKET_ID: 0xA_nt!KiActivateWaiterQueue+3c
BUCKET_ID: 0xA_nt!KiActivateWaiterQueue+3c
Followup: MachineOwner
---------
1: kd> lmtn
start end module name
80bc6000 80bce000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
82a14000 82a4b000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
82a4b000 82e5b000 nt ntkrpamp.exe Tue Jul 14 02:15:19 2009 (4A5BC007)
8ac2a000 8aca2000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
8aca2000 8acb3000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8acb3000 8acbb000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
8acbb000 8acfd000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8acfd000 8ada8000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8ada8000 8adf8000 yk62x86 yk62x86.sys Mon Feb 23 16:44:18 2009 (49A2B642)
8ae0e000 8ae7f000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
8ae7f000 8ae8d000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8ae8d000 8aed5000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
8aed5000 8aede000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
8aede000 8aee6000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8aee6000 8af10000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
8af10000 8af1b000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
8af1b000 8af2c000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
8af2c000 8af34000 compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
8af34000 8af3f000 BATTC BATTC.SYS Tue Jul 14 02:19:15 2009 (4A5BC0F3)
8af3f000 8af4f000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8af4f000 8af9a000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8af9a000 8afb0000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
8afb0000 8aff1000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8b030000 8b10a000 iaStor iaStor.sys Fri Jun 05 04:42:33 2009 (4A287809)
8b10a000 8b113000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b113000 8b136000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
8b136000 8b140000 msahci msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
8b140000 8b14e000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b14e000 8b157000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
8b157000 8b18b000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
8b18b000 8b19c000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
8b19c000 8b1f6000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
8b200000 8b20e000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8b20e000 8b217000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
8b217000 8b223000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8b229000 8b358000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
8b358000 8b383000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8b383000 8b396000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b396000 8b3f3000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
8b400000 8b40a000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8b412000 8b4c9000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
8b4c9000 8b507000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
8b507000 8b52c000 ksecpkg ksecpkg.sys Tue Jul 14 02:34:00 2009 (4A5BC468)
8b52c000 8b559000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
8b559000 8b58b000 fvevol fvevol.sys Tue Jul 14 02:13:01 2009 (4A5BBF7D)
8b58b000 8b5b0000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
8b5bd000 8b5cb000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
8b5cb000 8b5de000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
8b5de000 8b5ee000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
8b5ee000 8b5f8000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8b600000 8b611000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
8b618000 8b761000 tcpip tcpip.sys Tue Jul 14 02:13:18 2009 (4A5BBF8E)
8b761000 8b792000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8b792000 8b79a380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8b79b000 8b7da000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
8b7da000 8b7e2000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
8b7e2000 8b7f2000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8b7f2000 8b7fa000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
8fc00000 8fc32000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
8fc32000 8fc39000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
8fc39000 8fd13000 dump_iaStor dump_iaStor.sys Fri Jun 05 04:42:33 2009 (4A287809)
8fd27000 8fd46000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8fd46000 8fd4d000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
8fd4d000 8fd54000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8fd54000 8fd60000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
8fd60000 8fd81000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8fd81000 8fd8e000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
8fd8e000 8fd96000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
8fd96000 8fd9e000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8fd9e000 8fda6000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8fda6000 8fdb1000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
8fdb1000 8fdbf000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
8fdbf000 8fdd6000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8fdd6000 8fde1000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8fde1000 8fe00000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
9000c000 90070000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
90070000 90088000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
90088000 90096000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
90096000 900b7000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
900b7000 9016e000 dxgkrnl dxgkrnl.sys Tue Jul 14 02:26:15 2009 (4A5BC297)
9016e000 901b9000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
901b9000 901fd000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
90823000 91179840 nvlddmkm nvlddmkm.sys Tue Jul 28 17:21:09 2009 (4A6F0955)
9117a000 9117b080 nvBridge nvBridge.kmd Tue Jul 28 17:05:43 2009 (4A6F05B7)
9117c000 911b5000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
911b5000 911c0000 usbuhci usbuhci.sys Tue Jul 14 02:51:10 2009 (4A5BC86E)
911c0000 911cf000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
911cf000 911ee000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
911ee000 911ff000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
91600000 91634000 ks ks.sys Tue Jul 14 02:45:13 2009 (4A5BC709)
91639000 91a4c000 netw5v32 netw5v32.sys Thu May 14 18:40:33 2009 (4A0C3B71)
91a4c000 91a78000 1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
91a78000 91a80a80 o2sd o2sd.sys Thu May 07 04:54:54 2009 (4A023F6E)
91a81000 91aa7000 SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733)
91aa7000 91ab2180 o2media o2media.sys Thu May 07 04:22:32 2009 (4A0237D8)
91ab3000 91ab6700 CmBatt CmBatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
91ab7000 91acf000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
91acf000 91adc000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91adc000 91b0e380 SynTP SynTP.sys Fri Jun 19 05:33:00 2009 (4A3AF8DC)
91b0f000 91b10700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
91b11000 91b1e000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91b1e000 91b27000 wmiacpi wmiacpi.sys Tue Jul 14 02:19:16 2009 (4A5BC0F4)
91b27000 91b39000 intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
91b39000 91b46000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
91b46000 91b58000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
91b58000 91b70000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
91b70000 91b7b000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
91b7b000 91b9d000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
91b9d000 91bb5000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
91bb5000 91bcc000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
91bcc000 91be3000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
91be3000 91bed000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
91bed000 91bee380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
91bef000 91bfd000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
9222e000 92274000 nwifi nwifi.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
92274000 92284000 ndisuio ndisuio.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
92284000 92297000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
92297000 9231c000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
9231c000 92335000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
92335000 92347000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
92347000 9236a000 mrxsmb mrxsmb.sys Tue Jul 14 02:14:24 2009 (4A5BBFD0)
9236a000 923a5000 mrxsmb10 mrxsmb10.sys Tue Jul 14 02:14:34 2009 (4A5BBFDA)
923a5000 923c0000 mrxsmb20 mrxsmb20.sys Tue Jul 14 02:14:29 2009 (4A5BBFD5)
923d8000 923db180 mdmxsdk mdmxsdk.sys Tue Jun 20 00:26:59 2006 (449716A3)
93a2c000 93cc8b80 RTKVHDA RTKVHDA.sys Wed Aug 05 12:41:49 2009 (4A7953DD)
93cc9000 93cf8000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
93cf8000 93d11000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
93d11000 93d4e000 HSXHWAZL HSXHWAZL.sys Fri Feb 13 22:58:15 2009 (4995DEE7)
93d4e000 93d65000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883)
93d65000 93d88b00 usbvideo usbvideo.sys Tue Jul 14 02:51:51 2009 (4A5BC897)
93d89000 93da4000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
93da4000 93dbe000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
93dbe000 93dce000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
94003000 94105000 HSX_DPV HSX_DPV.sys Fri Feb 13 23:00:17 2009 (4995DF61)
94105000 941ba000 HSX_CNXT HSX_CNXT.sys Fri Feb 13 22:57:25 2009 (4995DEB5)
941ba000 941c7000 modem modem.sys Tue Jul 14 02:55:24 2009 (4A5BC96C)
941c7000 941d1000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
941d1000 941de000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
941de000 941ef000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
941ef000 941fa000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
96300000 9654a000 win32k win32k.sys Tue Jul 14 02:26:26 2009 (4A5BC2A2)
96560000 96569000 TSDDD TSDDD.dll Tue Jul 14 03:01:40 2009 (4A5BCAE4)
96590000 965ae000 cdd cdd.dll unavailable (00000000)
9880f000 988a6000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
988a6000 988b0000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
988b0000 988d1000 srvnet srvnet.sys Tue Jul 14 02:14:45 2009 (4A5BBFE5)
988d1000 988de000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
988de000 988e6000 XAudio32 XAudio32.sys Wed Apr 29 21:20:55 2009 (49F89A87)
988e6000 98935000 srv2 srv2.sys Tue Jul 14 02:14:52 2009 (4A5BBFEC)
98935000 98986000 srv srv.sys Tue Jul 14 02:15:10 2009 (4A5BBFFE)
98986000 989f0000 spsys spsys.sys Mon May 11 19:37:10 2009 (4A085436)
989f0000 989f1580 MSPQM MSPQM.sys Tue Jul 14 02:45:07 2009 (4A5BC703)
Unloaded modules:
923c0000 923d8000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8b5b0000 8b5bd000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8fc3c000 8fd16000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
8fd16000 8fd27000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000