Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101310-21933-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a4f000 PsLoadedModuleList = 0x82b97810
Debug session time: Wed Oct 13 22:02:26.869 2010 (GMT-5)
System Uptime: 0 days 1:40:05.914
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, 82ab6964}
Probably caused by : hardware ( win32k!RawInputThread+486 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82ab6964, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bb7718
Unable to read MiSystemVaType memory at 82b97160
00000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSwapContext+24
82ab6964 0000 add byte ptr [eax],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: 8bcb2a50 -- (.trap 0xffffffff8bcb2a50)
ErrCode = 00000002
eax=00000000 ebx=807d7000 ecx=00000000 edx=8001003b esi=86756678 edi=807dc800
eip=82ab6964 esp=8bcb2ac4 ebp=86702388 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KiSwapContext+0x24:
82ab6964 0000 add byte ptr [eax],al ds:0023:00000000=??
Resetting default scope
MISALIGNED_IP:
nt!KiSwapContext+24
82ab6964 0000 add byte ptr [eax],al
LAST_CONTROL_TRANSFER: from 82ab6964 to 82a9582b
STACK_TEXT:
8bcb2a50 82ab6964 badb0d00 8001003b 000000e1 nt!KiTrap0E+0x2cf
8bcb2ad0 82abdb25 86756678 00000000 807d7120 nt!KiSwapContext+0x24
8bcb2b08 82abc423 8673fb90 86756678 86753b14 nt!KiSwapThread+0x266
8bcb2b30 82ab86ef 86756678 86753aa8 00000000 nt!KiCommitThreadWait+0x1df
8bcb2ca8 820382a3 00000004 8670c5f8 00000001 nt!KeWaitForMultipleObjects+0x535
8bcb2d04 82038586 00000004 00000002 8bcaa400 win32k!RawInputThread+0x486
8bcb2d18 820fc340 00000004 0134fae8 8bcb2d34 win32k!xxxCreateSystemThreads+0x4a
8bcb2d28 82a9244a 00000004 0134fb28 771064f4 win32k!NtUserCallNoParam+0x1b
8bcb2d28 771064f4 00000004 0134fb28 771064f4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0134fb28 00000000 00000000 00000000 00000000 0x771064f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!RawInputThread+486
820382a3 8945f8 mov dword ptr [ebp-8],eax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!RawInputThread+486
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101210-27346-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a04000 PsLoadedModuleList = 0x82b4c810
Debug session time: Tue Oct 12 08:17:13.907 2010 (GMT-5)
System Uptime: 0 days 1:13:16.951
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
......
Unable to load image \SystemRoot\system32\DRIVERS\bcmwl6.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for bcmwl6.sys
*** ERROR: Module load completed but symbols could not be loaded for bcmwl6.sys
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: 80000003, The exception code that was not handled
Arg2: 8ff24770, The address that the exception occurred at
Arg3: 82b2aa80, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - <Unable to get error code text>
FAULTING_IP:
bcmwl6+63770
8ff24770 cc int 3
TRAP_FRAME: 82b2aa80 -- (.trap 0xffffffff82b2aa80)
ErrCode = 00000000
eax=ffffff00 ebx=862a6390 ecx=82b30e02 edx=862bea50 esi=862a6438 edi=862a61d8
eip=8ff24771 esp=82b2aaf4 ebp=82b2ab08 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000202
bcmwl6+0x63771:
8ff24771 cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 8aa04774 to 8ff24771
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
82b2ab08 8aa04774 00000000 862a6438 00000000 bcmwl6+0x63771
82b2ab38 82a6e04d 862bea78 002bea40 bad6c4d8 ndis!ndisMTimerObjectDpc+0xbc
82b2ab7c 82a6dff1 82b2dd20 82b2aca8 00000001 nt!KiProcessTimerDpcTable+0x50
82b2ac68 82a6deae 82b2dd20 82b2aca8 00000000 nt!KiProcessExpiredTimerList+0x101
82b2acdc 82a6c20e 00044cfe 85622488 82b37280 nt!KiTimerExpiration+0x25c
82b2ad20 82a6c038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82b2ad24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
bcmwl6+63770
8ff24770 cc int 3
SYMBOL_NAME: bcmwl6+63770
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: bcmwl6
IMAGE_NAME: bcmwl6.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49cc24c8
FAILURE_BUCKET_ID: 0x8E_bcmwl6+63770
BUCKET_ID: 0x8E_bcmwl6+63770
Followup: MachineOwner
---------
0: kd> lmvm bcmwl6
start end module name
8fec1000 8ffd9000 bcmwl6 T (no symbols)
Loaded symbol image file: bcmwl6.sys
Image path: \SystemRoot\system32\DRIVERS\bcmwl6.sys
Image name: bcmwl6.sys
Timestamp: Fri Mar 27 02:58:48 2009 (49CC24C8)
CheckSum: 0011A306
ImageSize: 00118000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100710-21824-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82843000 PsLoadedModuleList = 0x8298b810
Debug session time: Fri Oct 8 07:06:23.011 2010 (GMT-5)
System Uptime: 0 days 0:14:21.056
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {d, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : atikmdag.sys ( atikmdag+2d70c0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 9010d0c0 to 82889f6b
STACK_TEXT:
93fd7c14 9010d0c0 badb0d00 902bdce8 865ffe08 nt!KiSystemFatalException+0xf
WARNING: Stack unwind information not available. Following frames may be wrong.
93fd7c84 93fd7d20 00000020 00000000 902bdce8 atikmdag+0x2d70c0
93fd7ca0 8ff7bfec 00000003 93fd7d20 00000000 0x93fd7d20
93fd7d50 82a516d3 902bdc90 beba27e8 00000000 atikmdag+0x145fec
93fd7d90 829030f9 8ff7be30 902bdc90 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+2d70c0
9010d0c0 ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: atikmdag+2d70c0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a8a1a1e
FAILURE_BUCKET_ID: 0x7f_d_atikmdag+2d70c0
BUCKET_ID: 0x7f_d_atikmdag+2d70c0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101310-24226-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a47000 PsLoadedModuleList = 0x82b8f810
Debug session time: Thu Oct 14 05:23:59.190 2010 (GMT-5)
System Uptime: 0 days 1:21:09.234
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
......
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 95126340, The address that the exception occurred at
Arg3: 00000000, Parameter 0 of the exception
Arg4: 00000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+0
95126340 5c pop esp
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000000
READ_ADDRESS: GetPointerFromAddress: unable to read from 82baf718
Unable to read MiSystemVaType memory at 82b8f160
00000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82b233b1 to 82b23d10
STACK_TEXT:
951262f4 82b233b1 0000001e c0000005 95126340 nt!KeBugCheckEx+0x1e
95126310 82ad6fba 0000001e 82ab1494 00000001 nt!KipFatalFilter+0x16
95126990 8ac9c210 8ac9c407 951269b8 00000000 nt!KeExpandKernelStackAndCalloutEx+0x142
951269d0 8e819783 8557de30 95126a04 85fcbf80 tcpip!UdpTlProviderSendMessages+0x67
951269e8 8e83972f 853e1838 95126a04 853e1838 afd!AfdTLSendMessages+0x27
95126a40 8e839398 853e1838 85fcbf80 1b90e9e0 afd!AfdTLFastDgramSend+0x7d
95126ab0 8e8293e1 853e1838 95126b6c 00000043 afd!AfdFastDatagramSend+0x5d3
95126c28 82ca1985 85c69301 00000001 0e15e99c afd!AfdFastIoDeviceControl+0x3dc
95126cd0 82ca453a 86122600 00000b34 00000000 nt!IopXxxControlFile+0x2d0
95126d04 82a8a448 00000758 00000b34 00000000 nt!NtDeviceIoControlFile+0x2a
95126d04 772b64f4 00000758 00000b34 00000000 nt!KiFastCallEntry+0x128
WARNING: Frame IP not in any known module. Following frames may be wrong.
0e15ea58 00000000 00000000 00000000 00000000 0x772b64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!UdpTlProviderSendMessages+67
8ac9c210 33c9 xor ecx,ecx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!UdpTlProviderSendMessages+67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c15a3db
FAILURE_BUCKET_ID: 0x1E_tcpip!UdpTlProviderSendMessages+67
BUCKET_ID: 0x1E_tcpip!UdpTlProviderSendMessages+67
Followup: MachineOwner
80bc8000 80bd0000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
822d0000 8251a000 win32k win32k.sys Sat Jun 19 07:06:50 2010 (4C1C425A)
82530000 82539000 TSDDD TSDDD.dll unavailable (00000000)
82560000 8257e000 cdd cdd.dll Tue Jul 14 04:04:18 2009 (4A5BD992)
82a10000 82a47000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
82a47000 82e57000 nt ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
8a400000 8a41c000 avipbb avipbb.sys Tue Mar 24 17:47:23 2009 (49C9008B)
8a434000 8a43f000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
8a43f000 8a450000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8a450000 8a458000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
8a458000 8a49a000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8a49a000 8a545000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8a545000 8a5b6000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
8a5b6000 8a5c4000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8a5c4000 8a5cf000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
8a5cf000 8a5dd000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
8a5dd000 8a5f4000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8a5f4000 8a5ff000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8a603000 8a64b000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
8a64b000 8a654000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
8a654000 8a65c000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8a65c000 8a686000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
8a686000 8a691000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
8a691000 8a6a2000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
8a6a2000 8a6aa000 compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
8a6aa000 8a6b5000 BATTC BATTC.SYS Tue Jul 14 02:19:15 2009 (4A5BC0F3)
8a6b5000 8a6c5000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8a6c5000 8a710000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8a710000 8a717000 pciide pciide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
8a717000 8a725000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
8a725000 8a73b000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
8a73b000 8a744000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8a744000 8a767000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
8a767000 8a771000 msahci msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
8a771000 8a77a000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
8a77a000 8a7ae000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
8a7ae000 8a7bf000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
8a7bf000 8a7de000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8a7de000 8a7ff000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8a800000 8a80e000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8a80e000 8a817000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
8a817000 8a824000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
8a824000 8a82c000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8a82c000 8a834000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8a835000 8a964000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
8a964000 8a98f000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8a98f000 8a9a2000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8a9a2000 8a9ff000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
8aa00000 8aa0c000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
8aa0c000 8aa14000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
8aa15000 8aacc000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
8aacc000 8ab0a000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
8ab0a000 8ab2f000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6)
8ab2f000 8ab5c000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
8ab5c000 8ab8e000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55)
8ab8e000 8ab9f000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
8ab9f000 8abc4000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
8abf7000 8abfe000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8ac00000 8ac10000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8ac10000 8ac18000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
8ac18000 8ac21000 hpdskflt hpdskflt.sys Fri Jul 16 18:02:49 2010 (4C407499)
8ac21000 8ac28000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
8ac28000 8ad71000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB)
8ad71000 8ada2000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8ada2000 8adaa380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8adab000 8adea000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
8adea000 8adf2000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
8adf2000 8adfa000 AtiPcie AtiPcie.sys Tue May 05 18:00:16 2009 (4A005480)
8e817000 8e871000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
8e871000 8e8a3000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
8e8a3000 8e8aa000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
8e8aa000 8e8c9000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
8e8c9000 8e8da000 vwififlt vwififlt.sys Tue Jul 14 02:52:03 2009 (4A5BC8A3)
8e8da000 8e8e8000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
8e8e8000 8e8fb000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
8e8fb000 8e90b000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
8e90b000 8e910a00 ssmdrv ssmdrv.sys Tue May 05 13:05:18 2009 (4A000F5E)
8e911000 8e952000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8e952000 8e95c000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8e95c000 8e966000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8e966000 8e972000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8e972000 8e9d6000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
8e9d6000 8e9ee000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
8e9ee000 8e9fc000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
8e9fc000 8e9fd800 avgio avgio.sys Thu Feb 22 16:57:32 2007 (45DDAF5C)
8fe00000 8fe0e000 circlass circlass.sys Tue Jul 14 02:51:17 2009 (4A5BC875)
8fe0e000 8fe1c000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
8fe3c000 8fe5d000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
8fe5d000 8fe6e000 amdppm amdppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
8fe6e000 8ff25000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
8ff25000 8ff37000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
8ff37000 8ff4f000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
8ff4f000 8ff71000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
8ff71000 8ff89000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
8ff89000 8ffa0000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
8ffa0000 8ffb7000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
8ffb7000 8ffc1000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
8ffc1000 8fff5000 ks ks.sys Thu Mar 04 05:57:52 2010 (4B8F2FC0)
90000000 90019000 enecir enecir.sys Wed May 20 09:08:38 2009 (4A139E66)
90019000 90022000 wmiacpi wmiacpi.sys Tue Jul 14 02:19:16 2009 (4A5BC0F4)
90022000 9002f000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
90037000 9054c000 atikmdag atikmdag.sys Wed Aug 05 07:12:22 2009 (4A7906A6)
9054c000 90585000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
90585000 905a4000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
905a4000 905bd000 sdbus sdbus.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
905bd000 905f3000 Apfiltr Apfiltr.sys Tue May 12 12:35:38 2009 (4A0942EA)
905f3000 905fe000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
90600000 90618000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
90618000 90621000 HpqKbFiltr HpqKbFiltr.sys Wed Apr 29 16:46:51 2009 (49F85A4B)
90621000 9062e000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
9062e000 9063b000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
9063d000 90755000 bcmwl6 bcmwl6.sys Fri Mar 27 02:58:48 2009 (49CC24C8)
90755000 9075f000 vwifibus vwifibus.sys Tue Jul 14 02:52:02 2009 (4A5BC8A2)
9075f000 90784000 Rt86win7 Rt86win7.sys Thu Feb 26 11:04:22 2009 (49A65B16)
90784000 9078e000 usbohci usbohci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
9078e000 907d9000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
907d9000 907de080 usbfilter usbfilter.sys Fri Apr 03 14:39:45 2009 (49D5F581)
907df000 907ee000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
907ee000 907f1700 CmBatt CmBatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
907f2000 907fe000 Accelerometer Accelerometer.sys Fri Jul 16 18:02:49 2010 (4C407499)
907fe000 907ff380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
94a07000 94a4b000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
94a4b000 94a5c000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
94a5c000 94a79000 AtiHdmi AtiHdmi.sys Fri Jul 24 09:32:52 2009 (4A695594)
94a79000 94aa8000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
94aa8000 94ac1000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
94ac1000 94b11000 HdAudio HdAudio.sys Tue Jul 14 02:51:46 2009 (4A5BC892)
94b11000 94b25000 avgntflt avgntflt.sys Thu Nov 19 13:44:09 2009 (4B052F89)
94b25000 94b3f000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
94b3f000 94b4f000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
94b4f000 94b95000 nwifi nwifi.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
94b95000 94ba5000 ndisuio ndisuio.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
94ba5000 94bb8000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
95a01000 95b07000 AGRSM AGRSM.sys Mon Nov 10 16:56:37 2008 (49184BA5)
95b07000 95b08700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
95b09000 95b16000 modem modem.sys Tue Jul 14 02:55:24 2009 (4A5BC96C)
95b16000 95b25000 hidir hidir.sys Tue Jul 14 02:51:04 2009 (4A5BC868)
95b25000 95b38000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
95b38000 95b3e480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
95b3f000 95b4b000 kbdhid kbdhid.sys Tue Jul 14 02:45:09 2009 (4A5BC705)
95b4b000 95b56000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
95b56000 95b60000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
95b60000 95b6d000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
95b6d000 95b78000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
95b78000 95b82000 dump_msahci dump_msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
95b82000 95b93000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
95b93000 95b9e000 hidusb hidusb.sys Tue Jul 14 02:51:04 2009 (4A5BC868)
95b9e000 95bb5000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883)
95bb5000 95bd8b80 usbvideo usbvideo.sys Thu Mar 04 06:04:40 2010 (4B8F3158)
95bd9000 95be4000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
95be4000 95bff000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
97200000 97221000 srvnet srvnet.sys Tue Jun 22 05:47:09 2010 (4C20242D)
97229000 972ae000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
972ae000 972c7000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
972c7000 972d9000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
972d9000 972fc000 mrxsmb mrxsmb.sys Sat Feb 27 09:32:02 2010 (4B88CA72)
972fc000 97337000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
97337000 97352000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
97352000 973e9000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
973e9000 973f3000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
973f3000 97400000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
9847e000 984cd000 srv2 srv2.sys Tue Jun 22 05:47:19 2010 (4C202437)
984cd000 9851e000 srv srv.sys Tue Jun 22 05:47:32 2010 (4C202444)
9851e000 98521080 mbam mbam.sys Wed May 13 18:20:33 2009 (4A0AE541)
Unloaded modules:
98414000 9847e000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
97352000 9736a000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8abc4000 8abd1000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8abd1000 8abdc000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
8abdc000 8abe6000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
8abe6000 8abf7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000