Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\110810-18267-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
Debug session time: Mon Nov 8 11:50:49.606 2010 (UTC - 4:00)
System Uptime: 0 days 0:25:44.636
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff88008e54b10, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+147d2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88008e54b10, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+6566386232313737
fffff880`08e54b10 285ae5 sub byte ptr [rdx-1Bh],bl
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efc0e0
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88008e55a28 -- (.exr 0xfffff88008e55a28)
ExceptionAddress: fffff80002c85d71 (nt!RtlGetNextEntryHashTable+0x000000000000001d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88008e55ad0 -- (.trap 0xfffff88008e55ad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffbfa80065cf4d0 rbx=0000000000000000 rcx=00000000ffd7dbcc
rdx=fffff88008e55dd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c85d71 rsp=fffff88008e55c68 rbp=0000000000000010
r8=fffffa8007787818 r9=0000000000000000 r10=fffff88008e55dd8
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlGetNextEntryHashTable+0x1d:
fffff800`02c85d71 48394810 cmp qword ptr [rax+10h],rcx ds:8be6:fffbfa80`065cf4e0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d56bdb to fffff80002cc4740
STACK_TEXT:
fffff880`08e54a58 fffff800`02d56bdb : 00000000`0000001e ffffffff`c0000005 fffff880`08e54b10 00000000`00000000 : nt!KeBugCheckEx
fffff880`08e54a60 fffff800`02d15d30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`08e54aa0 fffff800`02cf2d1c : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`08e54ae0 fffff800`02cea40d : fffff800`02e10bc4 fffff880`08e56210 00000000`00000000 fffff800`02c54000 : nt!_C_specific_handler+0x8c
fffff880`08e54b50 fffff800`02cf1a90 : fffff800`02e10bc4 fffff880`08e54bc8 fffff880`08e55a28 fffff800`02c54000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`08e54b80 fffff800`02cfe9ef : fffff880`08e55a28 fffff880`08e55290 fffff880`00000000 fffffa80`064c8a00 : nt!RtlDispatchException+0x410
fffff880`08e55260 fffff800`02cc3d82 : fffff880`08e55a28 fffffa80`077877f0 fffff880`08e55ad0 fffffa80`077877f0 : nt!KiDispatchException+0x16f
fffff880`08e558f0 fffff800`02cc268a : fffffa80`065c6000 fffffa80`079c7180 fffffa80`065da000 fffffa80`06f525c0 : nt!KiExceptionDispatch+0xc2
fffff880`08e55ad0 fffff800`02c85d71 : fffff880`0184447f 00000000`00000002 fffff880`06828be6 fffffa80`064c8a00 : nt!KiGeneralProtectionFault+0x10a
fffff880`08e55c68 fffff880`0184447f : 00000000`00000002 fffff880`06828be6 fffffa80`064c8a00 00000000`00000000 : nt!RtlGetNextEntryHashTable+0x1d
fffff880`08e55c70 fffff880`0185e392 : fffffa80`065da138 00000000`00000000 fffff880`01967800 fffff880`01967800 : tcpip!IppFindNextHopAtDpc+0x44f
fffff880`08e55ee0 fffff880`0185c592 : fffffa80`06c964a0 00000000`00000000 fffffa80`06be5601 00ffffff`00000010 : tcpip!IpFlcReceivePackets+0xec2
fffff880`08e560e0 fffff880`01875e5a : fffffa80`06be5600 fffff880`08e56210 fffffa80`06be5600 fffff880`08e50001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`08e561c0 fffff800`02cd3e5a : fffffa80`06e3c030 fffff880`08e51000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`08e56210 fffff880`01875882 : fffff880`01875d80 fffff880`08e56320 00ffffff`00ffff02 00ffffff`00ffffff : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08e562f0 fffff880`0179d0eb : fffffa80`06f7c010 00000000`00000000 fffffa80`069b81a0 fffff880`08e564f0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`08e56360 fffff880`01766fc6 : 00ffffff`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`08e563d0 fffff880`016e0ef1 : fffffa80`069b81a0 00000000`00000002 00000000`00000002 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`08e56850 fffff880`04fa47d2 : fffffa80`06c34000 00000000`00000000 fffffa80`06c34600 fffff880`065ab450 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`08e568a0 fffffa80`06c34000 : 00000000`00000000 fffffa80`06c34600 fffff880`065ab450 00000000`00000001 : Rt64win7+0x147d2
fffff880`08e568a8 00000000`00000000 : fffffa80`06c34600 fffff880`065ab450 00000000`00000001 fffff800`02cca9a2 : 0xfffffa80`06c34000
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+147d2
fffff880`04fa47d2 ?? ???
SYMBOL_STACK_INDEX: 13
SYMBOL_NAME: Rt64win7+147d2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c21cf95
FAILURE_BUCKET_ID: X64_0x1E_c0000005_Rt64win7+147d2
BUCKET_ID: X64_0x1E_c0000005_Rt64win7+147d2
Followup: MachineOwner
---------
2: kd> lmvm Rt64win7
start end module name
fffff880`04f90000 fffff880`04fe6000 Rt64win7 T (no symbols)
Loaded symbol image file: Rt64win7.sys
Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
Image name: Rt64win7.sys
Timestamp: Wed Jun 23 05:10:45 2010 (4C21CF95)
CheckSum: 00063352
ImageSize: 00056000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\110810-20950-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c56000 PsLoadedModuleList = 0xfffff800`02e93e50
Debug session time: Mon Nov 8 11:23:30.302 2010 (UTC - 4:00)
System Uptime: 0 days 6:37:10.333
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002dfa0cd, fffff88008e61980, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+241 )
Followup: Pool_corruption
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002dfa0cd, Address of the instruction which caused the bugcheck
Arg3: fffff88008e61980, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExDeferredFreePool+241
fffff800`02dfa0cd 4c3910 cmp qword ptr [rax],r10
CONTEXT: fffff88008e61980 -- (.cxr 0xfffff88008e61980)
rax=fffbfa80080476d0 rbx=0000000000000000 rcx=fffff80002e55b20
rdx=fffffa8008047780 rsi=0000000000000000 rdi=fffffa8008b6d670
rip=fffff80002dfa0cd rsp=fffff88008e62350 rbp=0000000000000000
r8=fffffa8007cbb010 r9=fffffa8008047800 r10=fffffa8008047810
r11=0000000000000001 r12=fffff80002e55880 r13=0000000000000000
r14=0000000000000017 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExDeferredFreePool+0x241:
fffff800`02dfa0cd 4c3910 cmp qword ptr [rax],r10 ds:002b:fffbfa80`080476d0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: winamp.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002dfa0cd
STACK_TEXT:
fffff880`08e62350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x241
FOLLOWUP_IP:
nt!ExDeferredFreePool+241
fffff800`02dfa0cd 4c3910 cmp qword ptr [rax],r10
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+241
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88008e61980 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+241
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+241
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\110510-18236-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Thu Nov 4 20:28:21.129 2010 (UTC - 4:00)
System Uptime: 0 days 3:56:05.159
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002cac07e, fffff88002922f20, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiRundownMutants+7e )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cac07e, Address of the instruction which caused the bugcheck
Arg3: fffff88002922f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiRundownMutants+7e
fffff800`02cac07e 807b3100 cmp byte ptr [rbx+31h],0
CONTEXT: fffff88002922f20 -- (.cxr 0xfffff88002922f20)
rax=0000000000000000 rbx=fffbfa8006817800 rcx=fffffa8006817510
rdx=fffffa8006817510 rsi=fffbfa8006817818 rdi=fffffa8006817510
rip=fffff80002cac07e rsp=fffff880029238f0 rbp=fffffa8006817818
r8=0000000000000000 r9=0000000000000000 r10=fffff80002c5b000
r11=fffffa8006817510 r12=fffff880030f9180 r13=0000000000000000
r14=0000000000000000 r15=0000000000000002
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!KiRundownMutants+0x7e:
fffff800`02cac07e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:fffbfa80`06817831=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: SC2.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002cac07e
STACK_TEXT:
fffff880`029238f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRundownMutants+0x7e
FOLLOWUP_IP:
nt!KiRundownMutants+7e
fffff800`02cac07e 807b3100 cmp byte ptr [rbx+31h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiRundownMutants+7e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88002922f20 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiRundownMutants+7e
BUCKET_ID: X64_0x3B_nt!KiRundownMutants+7e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\110710-18283-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Sat Nov 6 18:00:50.669 2010 (UTC - 4:00)
System Uptime: 0 days 10:35:35.700
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002cfe510, fffff8800811aff0, 0}
Probably caused by : memory_corruption ( nt!MiLocateAddress+40 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cfe510, Address of the instruction which caused the bugcheck
Arg3: fffff8800811aff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiLocateAddress+40
fffff800`02cfe510 483b4818 cmp rcx,qword ptr [rax+18h]
CONTEXT: fffff8800811aff0 -- (.cxr 0xfffff8800811aff0)
rax=fffbfa800734d640 rbx=0000000000000001 rcx=000000007fefccbe
rdx=fffffa8007751060 rsi=0000000000000000 rdi=fffffa8007982b60
rip=fffff80002cfe510 rsp=fffff8800811b9c8 rbp=fffff8800811bca0
r8=86800001925fa867 r9=fffff80002e09e00 r10=fffff683ff7e65f0
r11=0000000000000000 r12=000000007fefccbe r13=fffffa80066a1260
r14=000007fefccbe000 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!MiLocateAddress+0x40:
fffff800`02cfe510 483b4818 cmp rcx,qword ptr [rax+18h] ds:002b:fffbfa80`0734d658=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002cfe510
STACK_TEXT:
fffff880`0811b9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiLocateAddress+0x40
FOLLOWUP_IP:
nt!MiLocateAddress+40
fffff800`02cfe510 483b4818 cmp rcx,qword ptr [rax+18h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiLocateAddress+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800811aff0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiLocateAddress+40
BUCKET_ID: X64_0x3B_nt!MiLocateAddress+40
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\110810-18470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Mon Nov 8 12:18:11.405 2010 (UTC - 4:00)
System Uptime: 0 days 0:26:12.436
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff8800a7dabc0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+147d2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800a7dabc0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+6530333162336438
fffff880`0a7dabc0 d8ba7d0a80f8 fdivr dword ptr [rdx-77FF583h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f030e0
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff8800a7dbad8 -- (.exr 0xfffff8800a7dbad8)
ExceptionAddress: fffff80002c8cd71 (nt!RtlGetNextEntryHashTable+0x000000000000001d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff8800a7dbb80 -- (.trap 0xfffff8800a7dbb80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffbfa80065cf480 rbx=0000000000000000 rcx=00000000ac5c9947
rdx=fffff8800a7dbe88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c8cd71 rsp=fffff8800a7dbd18 rbp=0000000000000010
r8=fffffa8006be7818 r9=0000000000000000 r10=fffff8800a7dbe88
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlGetNextEntryHashTable+0x1d:
fffff800`02c8cd71 48394810 cmp qword ptr [rax+10h],rcx ds:9f26:fffbfa80`065cf490=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d5dbdb to fffff80002ccb740
STACK_TEXT:
fffff880`0a7dab08 fffff800`02d5dbdb : 00000000`0000001e ffffffff`c0000005 fffff880`0a7dabc0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a7dab10 fffff800`02d1cd30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`0a7dab50 fffff800`02cf9d1c : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`0a7dab90 fffff800`02cf140d : fffff800`02e17bc4 fffff880`0a7dc2c0 00000000`00000000 fffff800`02c5b000 : nt!_C_specific_handler+0x8c
fffff880`0a7dac00 fffff800`02cf8a90 : fffff800`02e17bc4 fffff880`0a7dac78 fffff880`0a7dbad8 fffff800`02c5b000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0a7dac30 fffff800`02d059ef : fffff880`0a7dbad8 fffff880`0a7db340 fffff880`00000000 fffffa80`064f0c80 : nt!RtlDispatchException+0x410
fffff880`0a7db310 fffff800`02ccad82 : fffff880`0a7dbad8 fffffa80`06be77f0 fffff880`0a7dbb80 fffffa80`06be77f0 : nt!KiDispatchException+0x16f
fffff880`0a7db9a0 fffff800`02cc968a : fffffa80`065def00 00000000`00000000 fffffa80`0647ab01 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0a7dbb80 fffff800`02c8cd71 : fffff880`0184547f 00000000`00000002 fffff880`066e9f26 fffffa80`064f0c80 : nt!KiGeneralProtectionFault+0x10a
fffff880`0a7dbd18 fffff880`0184547f : 00000000`00000002 fffff880`066e9f26 fffffa80`064f0c80 00000000`00000000 : nt!RtlGetNextEntryHashTable+0x1d
fffff880`0a7dbd20 fffff880`0185ecde : fffffa80`065d0000 00000000`00000000 00000000`2000000c fffff880`01968800 : tcpip!IppFindNextHopAtDpc+0x44f
fffff880`0a7dbf90 fffff880`0185d592 : fffffa80`06fbce30 00000000`00000000 fffffa80`06f98301 00000000`00000001 : tcpip!IpFlcReceivePackets+0x80e
fffff880`0a7dc190 fffff880`01876e5a : fffffa80`06f983f0 fffff880`0a7dc2c0 fffffa80`06f983f0 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0a7dc270 fffff800`02cdae5a : fffffa80`06dc8ae0 fffff880`0a7d7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0a7dc2c0 fffff880`01876882 : fffff880`01876d80 fffff880`0a7dc3d0 fffffa80`06e1fb02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0a7dc3a0 fffff880`016d00eb : fffffa80`06fdb8d0 00000000`00000000 fffffa80`06a171a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0a7dc410 fffff880`01699fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0a7dc480 fffff880`01613ef1 : fffffa80`06a171a0 00000000`00000002 00000000`00000001 00000000`00000200 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0a7dc900 fffff880`048147d2 : fffffa80`06d5e000 00000000`00000000 fffffa80`06d5e5f0 fffff880`065585c0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`0a7dc950 fffffa80`06d5e000 : 00000000`00000000 fffffa80`06d5e5f0 fffff880`065585c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`0a7dc958 00000000`00000000 : fffffa80`06d5e5f0 fffff880`065585c0 fffffa80`00000001 fffffa80`05ef6030 : 0xfffffa80`06d5e000
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+147d2
fffff880`048147d2 ?? ???
SYMBOL_STACK_INDEX: 13
SYMBOL_NAME: Rt64win7+147d2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c21cf95
FAILURE_BUCKET_ID: X64_0x1E_c0000005_Rt64win7+147d2
BUCKET_ID: X64_0x1E_c0000005_Rt64win7+147d2
Followup: MachineOwner
---------
0: kd> lmvm Rt64win7
start end module name
fffff880`04800000 fffff880`04856000 Rt64win7 T (no symbols)
Loaded symbol image file: Rt64win7.sys
Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
Image name: Rt64win7.sys
Timestamp: Wed Jun 23 05:10:45 2010 (4C21CF95)
CheckSum: 00063352
ImageSize: 00056000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
0: kd> lmtn
start end module name
fffff880`04452000 fffff880`04490000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`01000000 fffff880`01057000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`07a71000 fffff880`07a89000 adfs adfs.SYS Thu Jun 26 16:52:37 2008 (48640195)
fffff880`02d07000 fffff880`02d91000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`044f5000 fffff880`0450b000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00e1d000 fffff880`00e28000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04490000 fffff880`04498000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0415f000 fffff880`04166000 AsIO AsIO.sys Mon Dec 17 04:11:49 2007 (47663D55)
fffff880`08b85000 fffff880`08b90000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fbb000 fffff880`00fc4000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc4000 fffff880`00fee000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0576e000 fffff880`0578e000 AtihdW76 AtihdW76.sys Thu Jul 15 08:46:49 2010 (4C3F0339)
fffff880`0486e000 fffff880`04fdc000 atikmdag atikmdag.sys Tue Aug 03 21:39:08 2010 (4C58C4BC)
fffff880`041a2000 fffff880`041e9000 atikmpag atikmpag.sys Tue Aug 03 21:15:45 2010 (4C58BF41)
fffff960`00950000 fffff960`009b1000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`04498000 fffff880`044dc000 awo9rs9u awo9rs9u.SYS Sat Mar 21 10:48:32 2009 (49C4FE40)
fffff880`02c5b000 fffff880`02c62000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0414e000 fffff880`0415f000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07b94000 fffff880`07bb2000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00730000 fffff960`00757000 cdd cdd.dll unavailable (00000000)
fffff880`02c28000 fffff880`02c52000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cc6000 fffff880`00d86000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c68000 fffff880`00cc6000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0154f000 fffff880`015c2000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`044e5000 fffff880`044f5000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`06fc7000 fffff880`06fd5000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`040ad000 fffff880`04130000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`04130000 fffff880`0414e000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0409e000 fffff880`040ad000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`014c0000 fffff880`014d6000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`057cb000 fffff880`057ed000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06fe1000 fffff880`06fea000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06fd5000 fffff880`06fe1000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`06fea000 fffff880`06ffd000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06e00000 fffff880`06e0c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042bc000 fffff880`043b0000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`043b0000 fffff880`043f6000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00dd2000 fffff880`00de6000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00d86000 fffff880`00dd2000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015d3000 fffff880`015dd000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01486000 fffff880`014c0000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0178f000 fffff880`017d9000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c12000 fffff800`02c5b000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04200000 fffff880`04224000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0561d000 fffff880`05636000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05636000 fffff880`0563e080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06e0c000 fffff880`06e1a000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07acc000 fffff880`07b94000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017f1000 fffff880`017fa000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0418c000 fffff880`041a2000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e00000 fffff880`00e1d000 jraid jraid.sys Wed May 27 01:39:35 2009 (4A1CD217)
fffff880`045cb000 fffff880`045da000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05652000 fffff880`05660000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9b000 fffff800`00ba5000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04400000 fffff880`04443000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01535000 fffff880`0154f000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01764000 fffff880`0178f000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`057ed000 fffff880`057f2200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0563f000 fffff880`05652000 LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
fffff880`04298000 fffff880`042ad000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0567d000 fffff880`05691000 LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)
fffff880`056ba000 fffff880`056dd000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`05660000 fffff880`05670000 LUsbFilt LUsbFilt.Sys Wed Jun 17 12:49:46 2009 (4A391EAA)
fffff880`00c10000 fffff880`00c54000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`056ac000 fffff880`056ba000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`045da000 fffff880`045e9000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05670000 fffff880`0567d000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fa1000 fffff880`00fbb000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`07bb2000 fffff880`07bca000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07bca000 fffff880`07bf7000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07a00000 fffff880`07a4e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`07a4e000 fffff880`07a71000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02cc0000 fffff880`02ccb000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01057000 fffff880`01061000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014d7000 fffff880`01535000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04093000 fffff880`0409e000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01600000 fffff880`01612000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01612000 fffff880`01704000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0452f000 fffff880`0453b000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0453b000 fffff880`0456a000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05759000 fffff880`0576e000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02ddf000 fffff880`02dee000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d91000 fffff880`02dd6000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01704000 fffff880`01764000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02ccb000 fffff880`02cdc000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04087000 fffff880`04093000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c5b000 fffff800`03237000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01233000 fffff880`013d6000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02c52000 fffff880`02c5b000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02c00000 fffff880`02c26000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`011dc000 fffff880`011f1000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00eed000 fffff880`00f20000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011f1000 fffff880`011f8000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f91000 fffff880`00fa1000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015c2000 fffff880`015d3000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`088c2000 fffff880`08968000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0578e000 fffff880`057cb000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c54000 fffff880`00c68000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00e28000 fffff880`00e33e00 PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`0450b000 fffff880`0452f000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0456a000 fffff880`04585000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04585000 fffff880`045a6000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`045a6000 fffff880`045c0000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04036000 fffff880`04087000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`045c0000 fffff880`045cb000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02ca5000 fffff880`02cae000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cae000 fffff880`02cb7000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cb7000 fffff880`02cc0000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0144c000 fffff880`01486000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04856000 fffff880`0486e000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`04856000 Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06e1a000 fffff880`06fc6900 RTKVHD64 RTKVHD64.sys Fri May 22 14:04:20 2009 (4A16E924)
fffff880`011ad000 fffff880`011dc000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08968000 fffff880`08973000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`017e9000 fffff880`017f1000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01070000 fffff880`011a4000 sptd sptd.sys Sun Mar 22 08:35:35 2009 (49C63097)
fffff880`08a7e000 fffff880`08b14000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08800000 fffff880`08867000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`08973000 fffff880`089a0000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`045e9000 fffff880`045ea480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01802000 fffff880`019ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`089a0000 fffff880`089b2000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02cfa000 fffff880`02d07000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02cdc000 fffff880`02cfa000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`04022000 fffff880`04036000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00550000 fffff960`0055a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`04166000 fffff880`0418c000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`045eb000 fffff880`045fd000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05600000 fffff880`0561d000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`06ffd000 fffff880`06ffef00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04287000 fffff880`04298000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`056ff000 fffff880`05759000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04231000 fffff880`04287000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05691000 fffff880`056ac000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`04224000 fffff880`04231000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01061000 fffff880`0106e000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02c62000 fffff880`02c70000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02c70000 fffff880`02c95000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d9000 fffff880`017e9000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f20000 fffff880`00f35000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f35000 fffff880`00f91000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01400000 fffff880`0144c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04007000 fffff880`04022000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c95000 fffff880`02ca5000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e3a000 fffff880`00ede000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ede000 fffff880`00eed000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dd6000 fffff880`02ddf000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000 win32k win32k.sys unavailable (00000000)
fffff880`044dc000 fffff880`044e5000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`011a4000 fffff880`011ad000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`056dd000 fffff880`056fe000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`08b14000 fffff880`08b85000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`015dd000 fffff880`015eb000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`015eb000 fffff880`015f7000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`015f7000 fffff880`01600000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`013d6000 fffff880`013e9000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000