IRQL_NOT_LESS_OR_EQUAL (a)
This is usually caused by drivers using improper addresses.
Update:
WmXlCore.sys Thu Jan 24 18:01:22 2008
Logitech gamepad
Rt64win7.sys Thu Jul 30 07:58:43 2009
Realtek 8136/8168/8169 PCI/PCIe Adapters
rtl8192se.sys Fri Oct 02 01:33:48 2009
Realtek RTL81892SE Wireless LAN PCI-E NIC
RTKVHD64.sys Tue Jul 28 09:00:05 2009
Realtek Audio
atikmdag.sys Thu Jul 30 00:23:28 2009
ATI
pgeffect.sys Mon Jun 22 05:00:11 2009
TOSHIBA Universal Camera
SynTP.sys Mon Jul 20 20:07:29 2009
Synaptics Touchpad
tos_sps64.sys Wed Jun 24 01:31:09 2009
Get all available Toshiba updates
DMP
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121310-41901-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0381a000 PsLoadedModuleList = 0xfffff800`03a57e50
Debug session time: Mon Dec 13 09:29:16.227 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:14.053
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {90, 2, 0, fffff80003891995}
Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000090, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003891995, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac20e0
0000000000000090
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+1d5
fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SmartFaceVWatc
TRAP_FRAME: fffff88007ad62f0 -- (.trap 0xfffff88007ad62f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007ad6440
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003891995 rsp=fffff88007ad6480 rbp=0000000000000001
r8=0000000000000000 r9=0000000000007e00 r10=0000000000000009
r11=fffffa80033d433c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiCommitThreadWait+0x1d5:
fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003889ca9 to fffff8000388a740
STACK_TEXT:
fffff880`07ad61a8 fffff800`03889ca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07ad61b0 fffff800`03888920 : fffffa80`05a73060 00000000`00000000 00000000`0986fd3a fffff800`03a04e80 : nt!KiBugCheckDispatch+0x69
fffff880`07ad62f0 fffff800`03891995 : fffffa80`06688060 fffffa80`06688060 fffff800`03a19a20 fffff800`00000009 : nt!KiPageFault+0x260
fffff880`07ad6480 fffff800`03893cff : fffff800`03a04e80 fffff800`03a04e80 00000000`0000006c fffffa80`06089940 : nt!KiCommitThreadWait+0x1d5
fffff880`07ad6510 fffff880`0115c1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`05ca3c00 : nt!KeWaitForSingleObject+0x19f
fffff880`07ad65b0 fffff880`0115b05d : fffffa80`06688060 fffff8a0`02c87320 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118
fffff880`07ad6620 fffff880`0115b37b : fffff8a0`03133e40 00000000`00000000 fffff8a0`03133e40 fffff8a0`02c87320 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
fffff880`07ad6760 fffff880`0115e9d2 : fffff8a0`02c87320 fffff8a0`02c87320 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
fffff880`07ad6790 fffff960`003644f3 : fffff8a0`0308b3a0 fffff900`c29096a0 00000000`00000001 00000000`000007ff : msrpc!RpcBindingCopy+0x42
fffff880`07ad67c0 fffff960`000e26a9 : fffff900`c29096a0 00000000`00000000 fffffa80`06529b30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
fffff880`07ad6820 fffff960`0013d285 : 00000000`00000030 fffffa80`06688060 fffff880`07ad6c20 fffffa80`06529b30 : win32k!PostPlaySoundMessage+0x25
fffff880`07ad6850 fffff960`001342cb : fffff900`c29096a0 fffff880`07ad6c20 00000000`ffffffff fffffa80`06529b30 : win32k!DestroyProcessInfo+0x125
fffff880`07ad6880 fffff960`001343c6 : fffffa80`04b34500 fffff900`c29096a0 00020508`00000000 fffff8a0`002dd001 : win32k!xxxUserProcessCallout+0x15f
fffff880`07ad68d0 fffff800`03b6fa01 : fffffa80`04b345e0 00000000`00000000 00000000`00000000 fffffa80`06688060 : win32k!W32pProcessCallout+0x4e
fffff880`07ad6900 fffff800`03b48635 : 00000000`00000000 fffff800`03b89101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`07ad69c0 fffff800`038671db : fffffa80`05bfc001 fffffa80`0665c010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`07ad69f0 fffff800`03867620 : 00000000`00383930 fffff880`07ad6a70 fffff800`03b4874c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`07ad6a70 fffff800`03889a37 : 00000000`0000046e 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`07ad6bb0 00000000`779601ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`02acf508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779601ea
STACK_COMMAND: kb
FOLLOWUP_IP:
msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
fffff880`0115c1c8 8b7710 mov esi,dword ptr [rdi+10h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msrpc
IMAGE_NAME: msrpc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc17c
FAILURE_BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000090, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003891995, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000090
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+1d5
fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SmartFaceVWatc
TRAP_FRAME: fffff88007ad62f0 -- (.trap 0xfffff88007ad62f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007ad6440
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003891995 rsp=fffff88007ad6480 rbp=0000000000000001
r8=0000000000000000 r9=0000000000007e00 r10=0000000000000009
r11=fffffa80033d433c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiCommitThreadWait+0x1d5:
fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003889ca9 to fffff8000388a740
STACK_TEXT:
fffff880`07ad61a8 fffff800`03889ca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07ad61b0 fffff800`03888920 : fffffa80`05a73060 00000000`00000000 00000000`0986fd3a fffff800`03a04e80 : nt!KiBugCheckDispatch+0x69
fffff880`07ad62f0 fffff800`03891995 : fffffa80`06688060 fffffa80`06688060 fffff800`03a19a20 fffff800`00000009 : nt!KiPageFault+0x260
fffff880`07ad6480 fffff800`03893cff : fffff800`03a04e80 fffff800`03a04e80 00000000`0000006c fffffa80`06089940 : nt!KiCommitThreadWait+0x1d5
fffff880`07ad6510 fffff880`0115c1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`05ca3c00 : nt!KeWaitForSingleObject+0x19f
fffff880`07ad65b0 fffff880`0115b05d : fffffa80`06688060 fffff8a0`02c87320 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118
fffff880`07ad6620 fffff880`0115b37b : fffff8a0`03133e40 00000000`00000000 fffff8a0`03133e40 fffff8a0`02c87320 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
fffff880`07ad6760 fffff880`0115e9d2 : fffff8a0`02c87320 fffff8a0`02c87320 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
fffff880`07ad6790 fffff960`003644f3 : fffff8a0`0308b3a0 fffff900`c29096a0 00000000`00000001 00000000`000007ff : msrpc!RpcBindingCopy+0x42
fffff880`07ad67c0 fffff960`000e26a9 : fffff900`c29096a0 00000000`00000000 fffffa80`06529b30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
fffff880`07ad6820 fffff960`0013d285 : 00000000`00000030 fffffa80`06688060 fffff880`07ad6c20 fffffa80`06529b30 : win32k!PostPlaySoundMessage+0x25
fffff880`07ad6850 fffff960`001342cb : fffff900`c29096a0 fffff880`07ad6c20 00000000`ffffffff fffffa80`06529b30 : win32k!DestroyProcessInfo+0x125
fffff880`07ad6880 fffff960`001343c6 : fffffa80`04b34500 fffff900`c29096a0 00020508`00000000 fffff8a0`002dd001 : win32k!xxxUserProcessCallout+0x15f
fffff880`07ad68d0 fffff800`03b6fa01 : fffffa80`04b345e0 00000000`00000000 00000000`00000000 fffffa80`06688060 : win32k!W32pProcessCallout+0x4e
fffff880`07ad6900 fffff800`03b48635 : 00000000`00000000 fffff800`03b89101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`07ad69c0 fffff800`038671db : fffffa80`05bfc001 fffffa80`0665c010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`07ad69f0 fffff800`03867620 : 00000000`00383930 fffff880`07ad6a70 fffff800`03b4874c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`07ad6a70 fffff800`03889a37 : 00000000`0000046e 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`07ad6bb0 00000000`779601ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`02acf508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779601ea
STACK_COMMAND: kb
FOLLOWUP_IP:
msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
fffff880`0115c1c8 8b7710 mov esi,dword ptr [rdi+10h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msrpc
IMAGE_NAME: msrpc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc17c
FAILURE_BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121310-93241-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03854000 PsLoadedModuleList = 0xfffff800`03a91e50
Debug session time: Mon Dec 13 10:20:07.631 2010 (UTC - 5:00)
System Uptime: 0 days 0:37:41.473
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800038e42b3}
Probably caused by : win32k.sys ( win32k!GreLockVisRgn+19 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800038e42b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003afc0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`038e42b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: rundll32.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88006ef33a0 -- (.trap 0xfffff88006ef33a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88006ef3728 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800038e42b3 rsp=fffff88006ef3530 rbp=fffff88006ef3680
r8=fffffa8005bc0850 r9=fffff88006ef3630 r10=0000000000000002
r11=fffffa8005bc0f40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`038e42b3 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800038c3ca9 to fffff800038c4740
STACK_TEXT:
fffff880`06ef3258 fffff800`038c3ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06ef3260 fffff800`038c2920 : fffffa80`04a0c4c0 fffffa80`05c6f660 fffffa80`04a0c500 fffff800`038f7f8c : nt!KiBugCheckDispatch+0x69
fffff880`06ef33a0 fffff800`038e42b3 : fffffa80`043b6f68 fffffa80`042da400 00000000`0000007f 00000000`00000030 : nt!KiPageFault+0x260
fffff880`06ef3530 fffff800`038a10c7 : 00000000`00000001 fffffa80`039371c0 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xae3
fffff880`06ef3600 fffff800`038a1487 : fffffa80`051dcb60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`06ef3680 fffff800`038bade5 : fffff800`038d07e3 00000000`00000030 fffffa80`051dcb60 fffff900`c1ad3010 : nt!KiApcInterrupt+0xd7
fffff880`06ef3818 fffff800`038d07e3 : 00000000`00000030 fffffa80`051dcb60 fffff900`c1ad3010 00000000`00000000 : nt!ExAcquireResourceSharedLite+0x5
fffff880`06ef3820 fffff960`001f6db1 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!ExEnterPriorityRegionAndAcquireResourceShared+0x23
fffff880`06ef3850 fffff960`00134313 : fffff900`c1ad3010 fffff880`06ef3c20 00000000`ffffffff fffffa80`03937060 : win32k!GreLockVisRgn+0x19
fffff880`06ef3880 fffff960`001343c6 : fffffa80`0574e900 fffff900`c1ad3010 00000000`a0000000 fffffa80`05c64890 : win32k!xxxUserProcessCallout+0x1a7
fffff880`06ef38d0 fffff800`03ba9a01 : fffffa80`0574e960 00000000`00000000 00000000`00000000 fffffa80`051dcb60 : win32k!W32pProcessCallout+0x4e
fffff880`06ef3900 fffff800`03b82635 : 00000000`00000000 fffffa80`051dcb01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`06ef39c0 fffff800`038a11db : 00000000`00000000 00000000`00000000 fffffa80`05c64960 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`06ef39f0 fffff800`038a1620 : 00000000`000ffb90 fffff880`06ef3a70 fffff800`03b8274c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`06ef3a70 fffff800`038c3a37 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff880`06ef3bb0 00000000`775dff1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`00c5ee88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775dff1a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GreLockVisRgn+19
fffff960`001f6db1 488b1588331500 mov rdx,qword ptr [win32k!ghsemDynamicModeChange (fffff960`0034a140)]
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: win32k!GreLockVisRgn+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
FAILURE_BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19
BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19
Followup: MachineOwner
---------
DRIVERS:
Code:
start end module name
fffff880`00f2b000 fffff880`00f82000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cca000 fffff880`02d54000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0453d000 fffff880`04553000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03a77000 fffff880`03a8c000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00dba000 fffff880`00dc5000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00d7c000 fffff880`00d85000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d85000 fffff880`00daf000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03ce0000 fffff880`042f7000 atikmdag atikmdag.sys Thu Jul 30 00:23:28 2009 (4A712040)
fffff880`01880000 fffff880`01888000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486)
fffff880`00ff3000 fffff880`00fff000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`018ad000 fffff880`018b4000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ded000 fffff880`02dfe000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02ac8000 fffff880`02ae6000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00700000 fffff960`00727000 cdd cdd.dll unavailable (00000000)
fffff880`0122b000 fffff880`01255000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01850000 fffff880`01880000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d04000 fffff880`00d62000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03a8c000 fffff880`03a90500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01377000 fffff880`013ea000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fea000 fffff880`00ff3000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`0452d000 fffff880`0453d000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05612000 fffff880`05620000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02ca6000 fffff880`02cc4000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c97000 fffff880`02ca6000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183a000 fffff880`01850000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04efa000 fffff880`04f1c000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04f39000 fffff880`04f45000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04f50000 fffff880`04f63000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04f45000 fffff880`04f50000 dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`010ce000 fffff880`010f9000 dwprot dwprot.sys Mon Jul 26 08:54:08 2010 (4C4D8570)
fffff880`05606000 fffff880`05612000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042f7000 fffff880`043eb000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03c00000 fffff880`03c46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010ba000 fffff880`010ce000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0106e000 fffff880`010ba000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015e2000 fffff880`015ec000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01800000 fffff880`0183a000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`03a6f000 fffff880`03a77000 FwLnk FwLnk.sys Mon Jul 06 20:51:41 2009 (4A529C1D)
fffff880`01000000 fffff880`0104a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03c9b000 fffff880`03ca8000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`0380b000 fffff800`03854000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03a00000 fffff880`03a24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`02a00000 fffff880`02ac8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`019db000 fffff880`019e4000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03a24000 fffff880`03a42000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03cc4000 fffff880`03cd3000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00ba6000 fffff800`00ba9000 kdcom kdcom.dll Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`0441c000 fffff880`0445f000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`015b7000 fffff880`015d1000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01200000 fffff880`0122b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05600000 fffff880`05605200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04fea000 fffff880`04fff000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04fa6000 fffff880`04fc9000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce3000 fffff880`00cf0000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04f98000 fffff880`04fa6000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0451e000 fffff880`0452d000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00d62000 fffff880`00d7c000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`011b7000 fffff880`011e4000 MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`02b6d000 fffff880`02b85000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02b85000 fffff880`02bb2000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02bb2000 fffff880`02c00000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`04e00000 fffff880`04e23000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`00daf000 fffff880`00dba000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`013f3000 fffff880`013fe000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f8b000 fffff880`00f95000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010f9000 fffff880`01157000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c8c000 fffff880`02c97000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019c9000 fffff880`019db000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0126b000 fffff880`0135d000 NDIS NDIS.SYS Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04577000 fffff880`04583000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02b42000 fffff880`02b55000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04583000 fffff880`045b2000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04ea8000 fffff880`04ebd000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dde000 fffff880`02ded000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d54000 fffff880`02d99000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01157000 fffff880`011b7000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`011e4000 fffff880`011f5000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c80000 fffff880`02c8c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03854000 fffff800`03e30000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01414000 fffff880`015b7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019f7000 fffff880`01a00000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02aef000 fffff880`02b42000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02da2000 fffff880`02dc8000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fd5000 fffff880`00fea000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f95000 fffff880`00fc8000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e71000 fffff880`00e78000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00cc0000 fffff880`00cd0000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015d1000 fffff880`015e2000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06283000 fffff880`06329000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04f91000 fffff880`04f97e80 pgeffect pgeffect.sys Mon Jun 22 05:00:11 2009 (4A3F481B)
fffff880`04ebd000 fffff880`04efa000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf0000 fffff880`00d04000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0136a000 fffff880`01376040 PxHlpa64 PxHlpa64.sys Tue Oct 20 14:08:42 2009 (4ADDFCAA)
fffff880`04553000 fffff880`04577000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`045b2000 fffff880`045cd000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`045cd000 fffff880`045ee000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04400000 fffff880`0441a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c2f000 fffff880`02c80000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01255000 fffff880`0125e000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0125e000 fffff880`01267000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013ea000 fffff880`013f3000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0638d000 fffff880`063c5000 RDPWD RDPWD.SYS Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`0198f000 fffff880`019c9000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02b55000 fffff880`02b6d000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03c53000 fffff880`03c91000 Rt64win7 Rt64win7.sys Thu Jul 30 07:58:43 2009 (4A718AF3)
fffff880`05621000 fffff880`057ffd00 RTKVHD64 RTKVHD64.sys Tue Jul 28 09:00:05 2009 (4A6EF655)
fffff880`03a91000 fffff880`03b99000 rtl8192se rtl8192se.sys Fri Oct 02 01:33:48 2009 (4AC590BC)
fffff880`06329000 fffff880`06334000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`01987000 fffff880`0198f000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0683f000 fffff880`068d5000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06200000 fffff880`06267000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06334000 fffff880`06361000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`0441a000 fffff880`0441b480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`044d3000 fffff880`0451c000 SynTP SynTP.sys Mon Jul 20 20:07:29 2009 (4A6506C1)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06361000 fffff880`06373000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03c91000 fffff880`03c9b000 tdcmdpst tdcmdpst.sys Thu Jul 30 04:39:35 2009 (4A715C47)
fffff880`0135d000 fffff880`0136a000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`06373000 fffff880`0637e000 tdtcp tdtcp.sys Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`0104a000 fffff880`01068000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02c1b000 fffff880`02c2f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`0190d000 fffff880`01987000 tos_sps64 tos_sps64.sys Wed Jun 24 01:31:09 2009 (4A41BA1D)
fffff960`005d0000 fffff960`005da000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0637e000 fffff880`0638d000 tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`03a42000 fffff880`03a68000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`01908000 fffff880`0190ce00 TVALZ_O TVALZ_O.SYS Mon Jul 13 22:19:26 2009 (4A5BEB2E)
fffff880`03a68000 fffff880`03a6f000 TVALZFL TVALZFL.sys Fri Jun 19 06:05:44 2009 (4A3B62F8)
fffff880`04470000 fffff880`04482000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04f1c000 fffff880`04f39000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0451c000 fffff880`0451df00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03cb3000 fffff880`03cc4000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04e4e000 fffff880`04ea8000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03ca8000 fffff880`03cb3000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03b99000 fffff880`03bef000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04f63000 fffff880`04f90100 usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`00fc8000 fffff880`00fd5000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`015ec000 fffff880`015fa000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00dc5000 fffff880`00dea000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e00000 fffff880`00e15000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e71000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`018bc000 fffff880`01908000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c46000 fffff880`03c53000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02dc8000 fffff880`02dde000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02c00000 fffff880`02c1b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01400000 fffff880`01410000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e78000 fffff880`00f1c000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f1c000 fffff880`00f2b000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d99000 fffff880`02da2000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`0037f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`0445f000 fffff880`04462c00 WmBEnum WmBEnum.sys Thu Jan 24 18:01:30 2008 (479918CA)
fffff880`00f82000 fffff880`00f8b000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04463000 fffff880`0446f600 WmXlCore WmXlCore.sys Thu Jan 24 18:01:22 2008 (479918C2)
fffff880`04fc9000 fffff880`04fea000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`068d5000 fffff880`06946000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01888000 fffff880`01896000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01896000 fffff880`018a2000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`018a2000 fffff880`018ad000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
fffff880`019e4000 fffff880`019f7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000