Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\122709-15678-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x8340e000 PsLoadedModuleList = 0x83556810
Debug session time: Sun Dec 27 18:23:47.376 2009 (UTC - 5:00)
System Uptime: 0 days 1:31:02.000
Loading Kernel Symbols
..................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 0, 8d717b70, 8d717750}
Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 00000000, The address that the exception occurred at
Arg3: 8d717b70, Exception Record Address
Arg4: 8d717750, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+19
00000000 ?? ???
EXCEPTION_RECORD: 8d717b70 -- (.exr 0xffffffff8d717b70)
ExceptionAddress: 00000000
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 00000000
Attempt to execute non-executable address 00000000
CONTEXT: 8d717750 -- (.cxr 0xffffffff8d717750)
eax=86921320 ebx=867009e0 ecx=0000000f edx=867009e0 esi=863a2030 edi=86700b20
eip=00000000 esp=8d717c38 ebp=8d717c4c iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: 00000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 83576718
Unable to read MiSystemVaType memory at 83556160
00000000
FOLLOWUP_IP:
nt!IofCallDriver+63
8344a4bc 5e pop esi
FAILED_INSTRUCTION_ADDRESS:
+63
00000000 ?? ???
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 8344a4bc to 00000000
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8d717c34 8344a4bc 863a2030 867009e0 91fef8a0 0x0
8d717c64 8344a4bc 000002fb 867009e0 8d717cd4 nt!IofCallDriver+0x63
8d717cec 8362e7b5 860f9bf8 860f9bf8 85b67d48 nt!IofCallDriver+0x63
8d717d00 8347bf2b 8608e810 00000000 85b67d48 nt!IopProcessWorkItem+0x23
8d717d50 8361c66d 00000001 a4777f1b 00000000 nt!ExpWorkerThread+0x10d
8d717d90 834ce0d9 8347be1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!IofCallDriver+63
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
STACK_COMMAND: .cxr 0xffffffff8d717750 ; kb
FAILURE_BUCKET_ID: 0x7E_NULL_IP_nt!IofCallDriver+63
BUCKET_ID: 0x7E_NULL_IP_nt!IofCallDriver+63
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\122409-14586-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x83410000 PsLoadedModuleList = 0x83558810
Debug session time: Thu Dec 24 16:42:37.378 2009 (UTC - 5:00)
System Uptime: 0 days 1:11:15.001
Loading Kernel Symbols
..................................................
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 8344c4b8, 8d713b74, 8d713750}
Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+5f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8344c4b8, The address that the exception occurred at
Arg3: 8d713b74, Exception Record Address
Arg4: 8d713750, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IofCallDriver+5f
8344c4b8 ff548838 call dword ptr [eax+ecx*4+38h]
EXCEPTION_RECORD: 8d713b74 -- (.exr 0xffffffff8d713b74)
ExceptionAddress: 8344c4b8 (nt!IofCallDriver+0x0000005f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000074
Attempt to read from address 00000074
CONTEXT: 8d713750 -- (.cxr 0xffffffff8d713750)
eax=00000000 ebx=86072bc8 ecx=0000000f edx=86072bc8 esi=860eb6a8 edi=86072d08
eip=8344c4b8 esp=8d713c3c ebp=8d713c4c iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
nt!IofCallDriver+0x5f:
8344c4b8 ff548838 call dword ptr [eax+ecx*4+38h] ds:0023:00000074=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000074
READ_ADDRESS: GetPointerFromAddress: unable to read from 83578718
Unable to read MiSystemVaType memory at 83558160
00000074
FOLLOWUP_IP:
nt!IofCallDriver+5f
8344c4b8 ff548838 call dword ptr [eax+ecx*4+38h]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 91a399fb to 8344c4b8
STACK_TEXT:
8d713c4c 91a399fb 895d69b8 86170ed0 00000000 nt!IofCallDriver+0x5f
WARNING: Frame IP not in any known module. Following frames may be wrong.
8d713c64 8344c4bc 00000339 86072bc8 8d713cd4 0x91a399fb
8d713cec 836307b5 85f57100 85f57100 85b77a70 nt!IofCallDriver+0x63
8d713d00 8347df2b 8636f0c0 00000000 85b77a70 nt!IopProcessWorkItem+0x23
8d713d50 8361e66d 00000001 a47637e2 00000000 nt!ExpWorkerThread+0x10d
8d713d90 834d00d9 8347de1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IofCallDriver+5f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
STACK_COMMAND: .cxr 0xffffffff8d713750 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!IofCallDriver+5f
BUCKET_ID: 0x7E_nt!IofCallDriver+5f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\122709-28641-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x83449000 PsLoadedModuleList = 0x83591810
Debug session time: Sun Dec 27 12:02:25.753 2009 (UTC - 5:00)
System Uptime: 0 days 1:47:15.000
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 0, 8d713b70, 8d713750}
*** WARNING: Unable to verify timestamp for mpfilt.sys
*** ERROR: Module load completed but symbols could not be loaded for mpfilt.sys
*** WARNING: Unable to verify timestamp for usbaapl.sys
*** ERROR: Module load completed but symbols could not be loaded for usbaapl.sys
Probably caused by : mpfilt.sys ( mpfilt+9fb )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 00000000, The address that the exception occurred at
Arg3: 8d713b70, Exception Record Address
Arg4: 8d713750, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+19
00000000 ?? ???
EXCEPTION_RECORD: 8d713b70 -- (.exr 0xffffffff8d713b70)
ExceptionAddress: 00000000
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 00000000
Attempt to execute non-executable address 00000000
CONTEXT: 8d713750 -- (.cxr 0xffffffff8d713750)
eax=00095652 ebx=85ecbbf8 ecx=0000000f edx=85ecbbf8 esi=86035030 edi=85ecbd38
eip=00000000 esp=8d713c38 ebp=8d713c4c iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: 00000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 835b1718
Unable to read MiSystemVaType memory at 83591160
00000000
FOLLOWUP_IP:
mpfilt+9fb
91fd39fb ?? ???
FAILED_INSTRUCTION_ADDRESS:
+9fb
00000000 ?? ???
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 834854bc to 00000000
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8d713c34 834854bc 86035030 85ecbbf8 91fd38a0 0x0
8d713c4c 91fd39fb 867586b8 85fc9ed0 00000000 nt!IofCallDriver+0x63
8d713c64 834854bc 000004fa 85ecbbf8 8d713cd4 mpfilt+0x9fb
8d713c7c c12738f2 85ff3030 85ff30e8 835835bc nt!IofCallDriver+0x63
8d713cac c1279ac8 867586b8 8d713cc8 85ff35bd usbaapl+0x18f2
8d713cd8 c127607c 85ff3030 866d43a8 85ff3030 usbaapl+0x7ac8
8d713cec 836697b5 8654c420 8654c420 85b77a70 usbaapl+0x407c
8d713d00 834b6f2b 866d43a8 00000000 85b77a70 nt!IopProcessWorkItem+0x23
8d713d50 8365766d 00000001 c3912940 00000000 nt!ExpWorkerThread+0x10d
8d713d90 835090d9 834b6e1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: mpfilt+9fb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mpfilt
IMAGE_NAME: mpfilt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 43670416
STACK_COMMAND: .cxr 0xffffffff8d713750 ; kb
FAILURE_BUCKET_ID: 0x7E_NULL_IP_mpfilt+9fb
BUCKET_ID: 0x7E_NULL_IP_mpfilt+9fb
Followup: MachineOwner
---------
start end module name
91fd3000 91fd4100 mpfilt T (no symbols)
Loaded symbol image file: mpfilt.sys
Image path: \??\C:\Windows\system32\drivers\mpfilt.sys
Image name: mpfilt.sys
Timestamp: Tue Nov 01 07:58:46 2005 (43670416)
97229000 97255000 1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
8b4ac000 8b4f4000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
9133f000 91399000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
972f2000 97304000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
972a5000 972ad000 Alidevice Alidevice.SYS Sun Jul 13 11:10:10 2008 (4879B862)
83bb2000 83bbb000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
8b400000 8b409000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b409000 8b42c000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
8b553000 8b55e000 BATTC BATTC.SYS Tue Jul 14 02:19:15 2009 (4A5BC0F3)
90863000 9086a000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8b7ea000 8b7f8000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
83a98000 83aa0000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
96d31000 96d4a000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
82021000 8202e000 BthEnum BthEnum.sys Tue Jul 14 02:51:35 2009 (4A5BC887)
81e00000 81e12000 bthmodem bthmodem.sys Tue Jul 14 02:51:34 2009 (4A5BC886)
81fda000 81ff5000 bthpan bthpan.sys Tue Jul 14 02:51:43 2009 (4A5BC88F)
81f76000 81fda000 bthport bthport.sys Tue Jul 14 02:51:30 2009 (4A5BC882)
821e4000 821f6000 BTHUSB BTHUSB.sys Tue Jul 14 02:51:36 2009 (4A5BC888)
82950000 8296e000 cdd cdd.dll unavailable (00000000)
8b9d6000 8b9f5000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
83ae2000 83b8d000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8b97e000 8b9a3000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
83aa0000 83ae2000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
90042000 90045700 CmBatt CmBatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
8b776000 8b7d3000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
8b54b000 8b553000 compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
972e5000 972f2000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
82100000 8210d000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
90979000 909dd000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
909dd000 909f5000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
9096d000 90979000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8b96d000 8b97e000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
901d3000 901ec000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
8210d000 82118000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
82122000 82133000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
82118000 82122000 dump_msahci dump_msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
82133000 8213d000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
91f1c000 91fd3000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
90053000 9008c000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
9008c000 900c5000 e1y6032 e1y6032.sys Tue Aug 19 00:44:37 2008 (48A9ED45)
83bef000 83c00000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
83bbb000 83bef000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
8b7e1000 8b7ea000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
8b93b000 8b96d000 fvevol fvevol.sys Tue Jul 14 02:13:01 2009 (4A5BBF7D)
8bb81000 8bbb2000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
972d6000 972db280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:16:53 2009 (4A1151B5)
83412000 83449000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
91a00000 91a1f000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
90154000 901a4000 HdAudio HdAudio.sys Tue Jul 14 02:51:46 2009 (4A5BC892)
ad78f000 ad7aa000 hidbth hidbth.sys Tue Jul 14 02:51:33 2009 (4A5BC885)
ad7aa000 ad7bd000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
8202e000 82034480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
96cac000 96d31000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
8b933000 8b93b000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
97280000 97298000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
91a1f000 91f1c000 igdkmd32 igdkmd32.sys Wed May 06 21:13:40 2009 (4A01D354)
90030000 90042000 intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
97298000 972a5000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
80bb3000 80bbb000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
90e1f000 9133f000 kl1 kl1.sys Tue Sep 01 14:29:07 2009 (4A9D0583)
83b8d000 83b9a000 klbg klbg.sys Wed Oct 14 20:18:07 2009 (4AD607CF)
9080b000 9085c000 klif klif.sys Wed Nov 11 15:32:39 2009 (4AFABCF7)
913f1000 913f8000 klim6 klim6.sys Mon Sep 14 13:46:22 2009 (4AAE1EFE)
972ad000 972b6000 klmouflt klmouflt.sys Fri Oct 02 18:38:31 2009 (4AC61E77)
973a2000 973d6000 ks ks.sys Tue Jul 14 02:45:13 2009 (4A5BC709)
8b763000 8b776000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b8fe000 8b923000 ksecpkg ksecpkg.sys Tue Jul 14 02:34:00 2009 (4A5BC468)
ad7bd000 ad7c4080 LHidFilt LHidFilt.Sys Fri Dec 19 09:37:23 2008 (494B4F33)
91fef000 91fff000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
ad7d0000 ad7d7800 LMouFilt LMouFilt.Sys Fri Dec 19 09:37:27 2008 (494B4F37)
821af000 821ca000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
ad78e000 ad78ea00 mchInjDrv mchInjDrv.sys Wed Jan 11 09:07:52 2006 (43C4AEC8)
83a0f000 83a87000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
820f3000 82100000 modem modem.sys Tue Jul 14 02:55:24 2009 (4A5BC96C)
8213d000 82148000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
972b6000 972c3000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
ad7c5000 ad7d0000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
8b5e7000 8b5fd000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
91fd3000 91fd4100 mpfilt mpfilt.sys Tue Nov 01 07:58:46 2005 (43670416)
96d4a000 96d5c000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
96d5c000 96d7f000 mrxsmb mrxsmb.sys Tue Jul 14 02:14:24 2009 (4A5BBFD0)
96d7f000 96dba000 mrxsmb10 mrxsmb10.sys Tue Jul 14 02:14:34 2009 (4A5BBFDA)
96dba000 96dd5000 mrxsmb20 mrxsmb20.sys Tue Jul 14 02:14:29 2009 (4A5BBFD5)
83b9a000 83ba4000 msahci msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
908bc000 908c7000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
8b4fd000 8b505000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
c1282000 c1283700 MSPCLOCK MSPCLOCK.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
c1280000 c1281580 MSPQM MSPQM.sys Tue Jul 14 02:45:07 2009 (4A5BC703)
8b738000 8b763000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
90963000 9096d000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8b923000 8b933000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8b809000 8b8c0000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
9731c000 97327000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
96c89000 96c99000 ndisuio ndisuio.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
97327000 97349000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
973e4000 973f5000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
90e00000 90e0e000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
91399000 913cb000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
8b8c0000 8b8fe000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
96e16000 97229000 netw5v32 netw5v32.sys Thu Mar 26 18:10:37 2009 (49CBA8FD)
908c7000 908d5000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
90959000 90963000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
83449000 83859000 nt ntkrpamp.exe Tue Jul 14 02:15:19 2009 (4A5BC007)
8b609000 8b738000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
9085c000 90863000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
96c30000 96c76000 nwifi nwifi.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
913d2000 913f1000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
8b53a000 8b54b000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
8b505000 8b52f000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
83ba4000 83bb2000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b5b9000 8b5e7000 pcmcia pcmcia.sys Tue Jul 14 02:19:29 2009 (4A5BC101)
8b7d3000 8b7e1000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
ad61f000 ad6b6000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
901a4000 901d3000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
83a87000 83a98000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
97304000 9731c000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
97349000 97361000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
97361000 97378000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
97378000 9738f000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
90918000 90959000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
97396000 973a0000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
908a4000 908ac000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
908ac000 908b4000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
908b4000 908bc000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8ba08000 8ba35000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
82148000 8216c000 rfcomm rfcomm.sys Tue Jul 14 02:51:41 2009 (4A5BC88D)
97266000 97280000 rimsptsk rimsptsk.sys Wed Mar 12 12:43:06 2008 (47D7B3BA)
97255000 97266000 risdptsk risdptsk.sys Fri Feb 22 14:35:52 2008 (47BEC1A8)
96c99000 96cac000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
9090a000 90917a60 SCDEmu SCDEmu.SYS Mon Nov 09 05:21:19 2009 (4AF78AAF)
ad6b6000 ad6c0000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
972d3000 972d5480 SFEP SFEP.sys Fri Aug 03 08:36:08 2007 (46B2BEC8)
972c3000 972c6980 SonyPI SonyPI.sys Fri Aug 03 08:41:08 2007 (46B2BFF4)
8ba00000 8ba08000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
ad73d000 ad78e000 srv srv.sys Tue Jul 14 02:15:10 2009 (4A5BBFFE)
ad6ee000 ad73d000 srv2 srv2.sys Tue Jul 14 02:14:52 2009 (4A5BBFEC)
ad6c0000 ad6e1000 srvnet srvnet.sys Tue Jul 14 02:14:45 2009 (4A5BBFE5)
973a0000 973a1380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
9738f000 97395600 taphss taphss.sys Wed Sep 09 23:55:14 2009 (4AA81632)
8ba38000 8bb81000 tcpip tcpip.sys Tue Jul 14 02:13:18 2009 (4A5BBF8E)
ad6e1000 ad6ee000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
908ec000 908f7000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
908d5000 908ec000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
90e0e000 90e1e000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
972c7000 972d3000 tpm tpm.sys Tue Jul 14 02:12:52 2009 (4A5BBF74)
82920000 82929000 TSDDD TSDDD.dll unavailable (00000000)
9000f000 90030000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
973d6000 973e4000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
c1272000 c1280000 usbaapl usbaapl.sys Fri Jul 17 21:57:03 2009 (4A60C97F)
82172000 82189000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883)
82189000 8218a700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
91fe0000 91fef000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
90110000 90154000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
900c5000 90110000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
91fd5000 91fe0000 usbuhci usbuhci.sys Tue Jul 14 02:51:10 2009 (4A5BC86E)
8218b000 821aeb00 usbvideo usbvideo.sys Tue Jul 14 02:51:51 2009 (4A5BC897)
8b52f000 8b53a000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
9086a000 90876000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
90046000 90053000 vgapnp vgapnp.sys Tue Jul 14 02:25:49 2009 (4A5BC27D)
90876000 90897000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8bbb2000 8bbba380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8b55e000 8b56e000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8b56e000 8b5b9000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8bbbb000 8bbfa000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
81e37000 81e74000 VSTAZL3 VSTAZL3.SYS Thu Oct 16 03:30:03 2008 (48F68B0B)
8203e000 820f3000 VSTCNXT3 VSTCNXT3.SYS Thu Oct 16 03:29:13 2008 (48F68AD9)
81e74000 81f76000 VSTDPV3 VSTDPV3.SYS Thu Oct 16 03:32:04 2008 (48F68B84)
908f7000 9090a000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
90897000 908a4000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
8b42d000 8b49e000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
8b49e000 8b4ac000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
913cb000 913d2000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
826c0000 8290a000 win32k win32k.sys unavailable (00000000)
821f6000 821fe880 WinUSB WinUSB.sys Tue Jul 14 02:51:11 2009 (4A5BC86F)
972dc000 972e5000 wmiacpi wmiacpi.sys Tue Jul 14 02:19:16 2009 (4A5BC0F4)
8b4f4000 8b4fd000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
821ca000 821e4000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
82000000 82020480 WUDFRd WUDFRd.sys Tue Jul 14 02:50:44 2009 (4A5BC854)
Unloaded modules:
c1208000 c1272000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0006A000
82035000 8203d000 LHidFilt.Sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
96c81000 96c89000 LMouFilt.Sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
96e00000 96e13000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
81e12000 81e2d000 hidbth.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
96c76000 96c81000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
96dd5000 96ded000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
82148000 82151000 WinUSB.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
82151000 82172000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00021000
8b9a3000 8b9b0000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
8b9b0000 8b9bb000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
8b9bb000 8b9c5000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
8b9c5000 8b9d6000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000