BugCheck 1E, {ffffffffc0000005, fffff80002f09ec3, 0, ffffffffffffffff}
BugCheck 1E, {ffffffffc0000005, fffff80002f05ec3, 0, ffffffffffffffff}
X64_0x1E_c0000005_nt!MiAllocateWsle
memory_corruption
1. I'm not sure there's no conflict between MagicISO and Virtual CloneDrive - do not use these two products to emulate disks at the same time. I'd recommend uninstalling one of them.
2. Update drivers:
hamachi.sys Thu Feb 19 12:36:41 2009
Hamachi - update or uninstall
NETw5s64.sys Tue Sep 15 22:40:39 2009
Intel® Wireless WiFi Link Adapter
igdkmd64.sys Wed Sep 02 21:54:15 2009
Intel GMA
iaStor dump_iaStor.sys Fri Jun 05 04:53:40 2009
Intel Matrix Storage
DKbFltr.sys Thu Mar 26 05:15:42 2009
Dritek 64-bit PS/2 Keyboard
RTKVHD64.sys Wed Aug 05 12:46:28 2009
Realtek Audio
agrsm64.sys Tue Apr 07 00:31:06 2009
Agere Modem - update or disable
speedfan.sys Sun Sep 24 16:26:48 2006
Speedfan
mwlPSDFilter.sys Tue Jun 02 13:07:30 2009
EgisTec PrivateSafe
mcdbus.sys Tue Feb 24 12:34:07 2009
MagicISO
ElbyCDIO.sys Tue Feb 17 19:11:23 2009
CDRTools Elaborate Bytes AG
VClone.sys Sat May 23 02:08:37 2009
Virtual CloneDrive Elaborate Bytes AG
k57nd60a.sys Sat Jun 20 14:34:49 2009
Broadcom NetLink (TM) Gigabit Ethernet
NTIDrvr.sys Wed Mar 25 05:09:39 2009
NewTech Infosystems, Inc.
SynTP.sys Fri Jun 19 05:33:58 2009
Synaptics Touchpad
3. Run memtest overnight:
RAM - Test with Memtest86+
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101710-18189-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`0309ee50
Debug session time: Sun Oct 17 16:07:37.536 2010 (UTC - 5:00)
System Uptime: 2 days 13:13:12.494
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002f09ec3, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiAllocateWsle+11b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002f09ec3, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiAllocateWsle+11b
fffff800`02f09ec3 4c894c2470 mov qword ptr [rsp+70h],r9
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031090e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88007ba87f8 -- (.exr 0xfffff88007ba87f8)
ExceptionAddress: fffff80002f09ec3 (nt!MiAllocateWsle+0x000000000000011b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88007ba88a0 -- (.trap 0xfffff88007ba88a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8000000044335867 rbx=0000000000000000 rcx=0000000000003602
rdx=0000000005927000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f09ec3 rsp=fffff88007ba8a30 rbp=0000000000000000
r8=fffff70001080000 r9=d660000044335867 r10=0000000000000008
r11=fffff70001080488 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiAllocateWsle+0x11b:
fffff800`02f09ec3 4c894c2470 mov qword ptr [rsp+70h],r9 ss:fffff880`07ba8aa0=8000000044335867
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f0ba39 to fffff80002ed1740
STACK_TEXT:
fffff880`07ba8028 fffff800`02f0ba39 : 00000000`0000001e ffffffff`c0000005 fffff800`02f09ec3 00000000`00000000 : nt!KeBugCheckEx
fffff880`07ba8030 fffff800`02ed0d82 : fffff880`07ba87f8 00000000`00001566 fffff880`07ba88a0 fffff680`0002c938 : nt!KiDispatchException+0x1b9
fffff880`07ba86c0 fffff800`02ecf68a : 00000000`00000000 fffff8a0`00000001 00000000`00000246 fffff800`02edf9fd : nt!KiExceptionDispatch+0xc2
fffff880`07ba88a0 fffff800`02f09ec3 : fffff680`0002c938 fffff680`0002c938 00000000`00000001 fffff680`0002c938 : nt!KiGeneralProtectionFault+0x10a
fffff880`07ba8a30 fffff800`02eec04c : fffff680`0002c938 fffff880`07ba8b00 00000000`00000000 ffffffff`ffffffff : nt!MiAllocateWsle+0x11b
fffff880`07ba8a80 fffff800`02ecf82e : 00000000`00000001 00000000`069df641 00000000`05bdd701 00000000`0034e73c : nt!MmAccessFault+0xc4c
fffff880`07ba8be0 00000000`6fb3183c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0034e56c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6fb3183c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAllocateWsle+11b
fffff800`02f09ec3 4c894c2470 mov qword ptr [rsp+70h],r9
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiAllocateWsle+11b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiAllocateWsle+11b
BUCKET_ID: X64_0x1E_c0000005_nt!MiAllocateWsle+11b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\101710-30264-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e5d000 PsLoadedModuleList = 0xfffff800`0309ae50
Debug session time: Sun Oct 17 18:18:27.889 2010 (UTC - 5:00)
System Uptime: 0 days 2:10:24.824
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002f05ec3, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiAllocateWsle+11b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002f05ec3, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiAllocateWsle+11b
fffff800`02f05ec3 4c894c2470 mov qword ptr [rsp+70h],r9
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031050e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff880090117f8 -- (.exr 0xfffff880090117f8)
ExceptionAddress: fffff80002f05ec3 (nt!MiAllocateWsle+0x000000000000011b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880090118a0 -- (.trap 0xfffff880090118a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=80000000a5e8b867 rbx=0000000000000000 rcx=0000000000003d5f
rdx=0000000005023000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f05ec3 rsp=fffff88009011a30 rbp=0000000000000000
r8=fffff70001080000 r9=fae00000a5e8b867 r10=fffffa8003c014b0
r11=fffff70001080488 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiAllocateWsle+0x11b:
fffff800`02f05ec3 4c894c2470 mov qword ptr [rsp+70h],r9 ss:fffff880`09011aa0=80000000a5e8b867
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f07a39 to fffff80002ecd740
STACK_TEXT:
fffff880`09011028 fffff800`02f07a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02f05ec3 00000000`00000000 : nt!KeBugCheckEx
fffff880`09011030 fffff800`02eccd82 : fffff880`090117f8 00000000`00003fae fffff880`090118a0 fffff680`00028118 : nt!KiDispatchException+0x1b9
fffff880`090116c0 fffff800`02ecb68a : 00000000`00000000 fffff880`000020a0 fffff880`090118e4 fffff880`00000004 : nt!KiExceptionDispatch+0xc2
fffff880`090118a0 fffff800`02f05ec3 : fffff680`00028118 fffff680`00028118 fffff680`00028dc8 00000000`00000111 : nt!KiGeneralProtectionFault+0x10a
fffff880`09011a30 fffff800`02ee804c : fffff680`00028118 fffff880`09011b00 00000000`00000000 ffffffff`ffffffff : nt!MiAllocateWsle+0x11b
fffff880`09011a80 fffff800`02ecb82e : 00000000`00000001 00000000`0000000c 00000000`03a03201 00000000`00000002 : nt!MmAccessFault+0xc4c
fffff880`09011be0 00000000`6f9d3298 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0038ec88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6f9d3298
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAllocateWsle+11b
fffff800`02f05ec3 4c894c2470 mov qword ptr [rsp+70h],r9
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiAllocateWsle+11b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiAllocateWsle+11b
BUCKET_ID: X64_0x1E_c0000005_nt!MiAllocateWsle+11b
Followup: MachineOwner
fffff800`00ba2000 fffff800`00bac000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02e14000 fffff800`02e5d000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02e5d000 fffff800`03439000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00c5c000 fffff880`00c76000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00cb6000 fffff880`00cfa000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00cfa000 fffff880`00d0e000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00d0e000 fffff880`00d6c000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d6c000 fffff880`00d9f000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00d9f000 fffff880`00da8000 compbatt compbatt.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`00da8000 fffff880`00db4000 BATTC BATTC.SYS Tue Jul 14 02:31:01 2009 (4A5BC3B5)
fffff880`00db4000 fffff880`00dc9000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e57000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00e57000 fffff880`00e60000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e60000 fffff880`00f20000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00f20000 fffff880`00fc4000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00fc4000 fffff880`00fd3000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fd3000 fffff880`00fdd000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fdd000 fffff880`00fea000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00fea000 fffff880`00fff000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01000000 fffff880`0104c000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`0104c000 fffff880`01060000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`0106d000 fffff880`01189000 iaStor iaStor.sys Fri Jun 05 04:53:40 2009 (4A287AA4)
fffff880`01189000 fffff880`01192000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01192000 fffff880`011bc000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`011bc000 fffff880`011c7000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`01228000 fffff880`013cb000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0140b000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0140b000 fffff880`0141c000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`01430000 fffff880`0148e000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`0148e000 fffff880`014a8000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`014a8000 fffff880`0151b000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`0151b000 fffff880`0152c000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0152c000 fffff880`01536000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01536000 fffff880`01570000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01570000 fffff880`015aa000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`015aa000 fffff880`015c0000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`015c0000 fffff880`015f0000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01600000 fffff880`01660000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`01660000 fffff880`0168b000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`0168b000 fffff880`01692000 speedfan speedfan.sys Sun Sep 24 16:26:48 2006 (45168798)
fffff880`01692000 fffff880`016a4000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`016a4000 fffff880`016ad000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`016b4000 fffff880`017a6000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`017a6000 fffff880`017f2000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`017f2000 fffff880`017fa000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`02604000 fffff880`026cc000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`026cc000 fffff880`026ea000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`026ea000 fffff880`02702000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`02702000 fffff880`0272f000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`0272f000 fffff880`0277d000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`0277d000 fffff880`027a0000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`02a00000 fffff880`02a10000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02a10000 fffff880`02a19000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02a19000 fffff880`02a22000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02a22000 fffff880`02a2b000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02a2b000 fffff880`02b47000 dump_iaStor dump_iaStor.sys Fri Jun 05 04:53:40 2009 (4A287AA4)
fffff880`02b5d000 fffff880`02b87000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02b87000 fffff880`02bb4000 MpFilter MpFilter.sys Sat Mar 20 07:58:08 2010 (4BA463F0)
fffff880`02bb4000 fffff880`02bbd000 mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 13:07:30 2009 (4A24F9E2)
fffff880`02bbd000 fffff880`02bc6000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02bc6000 fffff880`02bd4000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02bd4000 fffff880`02bf9000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`03284000 fffff880`0332a000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`0332a000 fffff880`03335000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`03335000 fffff880`03362000 srvnet srvnet.sys Fri Aug 27 06:37:24 2010 (4C7732F4)
fffff880`03362000 fffff880`03374000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`03374000 fffff880`033db000 srv2 srv2.sys Fri Aug 27 06:37:46 2010 (4C77330A)
fffff880`03803000 fffff880`03a00000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`03a00000 fffff880`03a16000 vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
fffff880`03a16000 fffff880`03a25000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03a25000 fffff880`03a40000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03a40000 fffff880`03a54000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03a88000 fffff880`03ad2000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`03ad2000 fffff880`03af0000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`03af0000 fffff880`03afd000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`03afd000 fffff880`03b87000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`03b87000 fffff880`03bcc000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`03bcc000 fffff880`03bd5000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03bd5000 fffff880`03bfb000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03c00000 fffff880`03c3c880 mcdbus mcdbus.sys Tue Feb 24 12:34:07 2009 (49A3CD1F)
fffff880`03c3d000 fffff880`03c80000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`03cb4000 fffff880`03d05000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03d05000 fffff880`03d11000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03d11000 fffff880`03d24000 mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 13:15:29 2009 (4A24FBC1)
fffff880`03d24000 fffff880`03d2c000 mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 13:07:39 2009 (4A24F9EB)
fffff880`03d2c000 fffff880`03d37000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03d37000 fffff880`03d41000 ElbyCDIO ElbyCDIO.sys Tue Feb 17 19:11:23 2009 (499AEFBB)
fffff880`03d41000 fffff880`03d50000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03d50000 fffff880`03d6e000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03d6e000 fffff880`03d7f000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03d7f000 fffff880`03da5000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03da5000 fffff880`03dd4000 SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`03e00000 fffff880`03e46000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`03e46000 fffff880`03e53000 usbuhci usbuhci.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`03e53000 fffff880`03ea9000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`03ea9000 fffff880`03eba000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`03eba000 fffff880`03ed5000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`03eda000 fffff880`03fce000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`03fce000 fffff880`03ff2000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04200000 fffff880`04223000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`04223000 fffff880`04244000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`04244000 fffff880`04259000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`04259000 fffff880`042ac000 nwifi nwifi.sys Tue Jul 14 03:07:23 2009 (4A5BCC3B)
fffff880`042ac000 fffff880`042bf000 ndisuio ndisuio.sys Tue Jul 14 03:09:25 2009 (4A5BCCB5)
fffff880`042c8000 fffff880`04322000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`04322000 fffff880`04337000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`04337000 fffff880`04374000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`04374000 fffff880`04396000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`04396000 fffff880`043a3000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`043a3000 fffff880`043b3000 point64 point64.sys Tue Jun 29 11:54:31 2010 (4C29B4C7)
fffff880`043b3000 fffff880`043c1000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`043c1000 fffff880`043d4000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`043d4000 fffff880`043e2000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`043e2000 fffff880`043fa000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0444c000 fffff880`04482000 fastfat fastfat.SYS Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`0449a000 fffff880`04530000 srv srv.sys Fri Aug 27 06:38:00 2010 (4C773318)
fffff880`04530000 fffff880`04540000 MpNWMon MpNWMon.sys Sat Mar 20 07:58:00 2010 (4BA463E8)
fffff880`04571000 fffff880`04582000 usbaapl64 usbaapl64.sys Thu Apr 01 06:20:15 2010 (4BB410EF)
fffff880`04582000 fffff880`04593000 WinUsb WinUsb.sys Tue Jul 14 03:06:28 2009 (4A5BCC04)
fffff880`04593000 fffff880`045c4000 WUDFRd WUDFRd.sys Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff880`04600000 fffff880`0461a000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`0461a000 fffff880`04629000 VClone VClone.sys Sat May 23 02:08:37 2009 (4A173075)
fffff880`04629000 fffff880`0463b000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`0464d000 fffff880`04d54400 igdkmd64 igdkmd64.sys Wed Sep 02 21:54:15 2009 (4A9EBF57)
fffff880`04d55000 fffff880`04da6000 k57nd60a k57nd60a.sys Sat Jun 20 14:34:49 2009 (4A3CC959)
fffff880`04da6000 fffff880`04dd5000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04dd5000 fffff880`04df6000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`05400000 fffff880`05449000 SynTP SynTP.sys Fri Jun 19 05:33:58 2009 (4A3AF916)
fffff880`05449000 fffff880`0544af00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`0544b000 fffff880`0545a000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0545a000 fffff880`05462000 UBHelper UBHelper.sys Mon Apr 27 11:48:19 2009 (49F57153)
fffff880`05462000 fffff880`0546a000 NTIDrvr NTIDrvr.sys Wed Mar 25 05:09:39 2009 (49C9A073)
fffff880`0546a000 fffff880`05477000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`05477000 fffff880`05480000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`05480000 fffff880`05496000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`05496000 fffff880`054a6000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`054a6000 fffff880`054bc000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`054bc000 fffff880`054c8000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`054c8000 fffff880`054d3000 hamachi hamachi.sys Thu Feb 19 12:36:41 2009 (499D3639)
fffff880`054d3000 fffff880`054d4480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`054da000 fffff880`05b87000 NETw5s64 NETw5s64.sys Tue Sep 15 22:40:39 2009 (4AAFEDB7)
fffff880`05b87000 fffff880`05b94000 vwifibus vwifibus.sys Tue Jul 14 03:07:21 2009 (4A5BCC39)
fffff880`05b94000 fffff880`05b98500 CmBatt CmBatt.sys Tue Jul 14 02:31:03 2009 (4A5BC3B7)
fffff880`05b99000 fffff880`05bb7000 i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`05bb7000 fffff880`05bc3000 DKbFltr DKbFltr.sys Thu Mar 26 05:15:42 2009 (49CAF35E)
fffff880`05bc3000 fffff880`05bd2000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`05bd2000 fffff880`05bf6000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`07200000 fffff880`07205200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`07206000 fffff880`07214000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`0721e000 fffff880`073fe880 RTKVHD64 RTKVHD64.sys Wed Aug 05 12:46:28 2009 (4A7954F4)
fffff880`07400000 fffff880`0740f000 modem modem.sys Tue Jul 14 03:10:48 2009 (4A5BCD08)
fffff880`0740f000 fffff880`07436000 IntcHdmi IntcHdmi.sys Tue May 26 14:13:09 2009 (4A1BCEC5)
fffff880`07436000 fffff880`07442000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`07442000 fffff880`0745f000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`0745f000 fffff880`0748c200 usbvideo usbvideo.sys Thu Mar 04 06:40:57 2010 (4B8F39D9)
fffff880`0748d000 fffff880`0749b000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`0749b000 fffff880`074b4000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`074b4000 fffff880`074bc080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`074c6000 fffff880`075f7000 agrsm64 agrsm64.sys Tue Apr 07 00:31:06 2009 (49DA749A)
fffff960`000f0000 fffff960`003ff000 win32k win32k.sys Wed Sep 01 05:58:04 2010 (4C7DC13C)
fffff960`00490000 fffff960`0049a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00750000 fffff960`00777000 cdd cdd.dll Wed May 19 22:48:26 2010 (4BF4408A)
fffff960`008e0000 fffff960`00941000 ATMFD ATMFD.DLL Thu May 27 07:11:31 2010 (4BFDF0F3)
Unloaded modules:
fffff880`04540000 fffff880`04571000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`04431000 fffff880`0444c000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`045b1000 fffff880`045c2000 usbaapl64.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`04400000 fffff880`04431000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`045c2000 fffff880`045d3000 WinUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`04540000 fffff880`045b1000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`015f0000 fffff880`015fe000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`02a2e000 fffff880`02b4a000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0011C000
fffff880`02b4a000 fffff880`02b5d000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000