Update Eset to the latest version, or install MSE instead:
easdrv.sys Wed Oct 07 03:06:53 2009
Uninstall Daemon Tools:
sptd.sys Mon Mar 23 02:38:33 2009
DuplexSecure - FAQ
Update Nvidia nForce Networking Driver:
nvm62x32.sys Fri Oct 17 17:00:39 2008
Update Analog Devices:
giveio.sys Wed Apr 03 22:33:25 1996
Update Realtek Audio:
RTKVHDA.sys Thu May 10 06:24:41 2007
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121810-17706-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81a49000 PsLoadedModuleList = 0x81b91810
Debug session time: Sun Dec 19 01:13:22.364 2010 (UTC - 5:00)
System Uptime: 0 days 0:25:03.160
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00008887, The subtype of the bugcheck.
Arg2: 8366b8ac
Arg3: 8366b7b0
Arg4: 00000205
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for eamon.sys
*** ERROR: Module load completed but symbols could not be loaded for eamon.sys
BUGCHECK_STR: 0x1a_8887
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: TrustedInstall
CURRENT_IRQL: 2
STACK_TEXT:
97ac183c 81ae3016 0000001a 00008887 8366b8ac nt!KeBugCheckEx+0x1e
97ac187c 81aaad7b 00000000 af8f0000 00530000 nt!MiUnlinkPageFromLockedList+0x51
97ac197c 81aff866 af8f0000 00010000 00000000 nt!MmCheckCachedPageStates+0x2c2
97ac19b4 81ca6d20 8499b408 00000001 97ac1a2c nt!CcFetchDataForRead+0xb6
97ac19f4 81ca8987 8499b408 00530000 00000000 nt!CcMapAndCopyFromCache+0x71
97ac1a34 88440c8b 8499b408 97ac1a78 00010000 nt!CcCopyRead+0x107
97ac1a60 8843e541 843802c0 8499b408 841b3550 Ntfs!NtfsCachedRead+0x13e
97ac1b3c 88441bae 843802c0 841b3550 1fea612f Ntfs!NtfsCommonRead+0x11a1
97ac1bac 81a854bc 84b22020 841b3550 841b3550 Ntfs!NtfsFsdRead+0x279
97ac1bc4 882e220c 84b20138 841b3550 00000000 nt!IofCallDriver+0x63
97ac1be8 882e23cb 97ac1c08 84b20138 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
97ac1c20 81a854bc 84b20138 841b3550 981826ec fltmgr!FltpDispatch+0xc5
97ac1c38 9814d7dd 8550bb40 97ac1c5c 81a854bc nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
97ac1c44 81a854bc 8550bb40 841b3550 841b3550 eamon+0x37dd
97ac1c5c 81c86eee 841b3550 841b374c 8499b408 nt!IofCallDriver+0x63
97ac1c7c 81c98ea6 8550bb40 8499b408 00000001 nt!IopSynchronousServiceTail+0x1f8
97ac1d08 81a8c42a 8550bb40 841b3550 00000000 nt!NtReadFile+0x644
97ac1d08 775264f4 8550bb40 841b3550 00000000 nt!KiFastCallEntry+0x12a
0064e4d4 00000000 00000000 00000000 00000000 0x775264f4
STACK_COMMAND: kb
SYMBOL_NAME: ZEROED_PAGE_CORRUPTED
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x1a_8887_ZEROED_PAGE_CORRUPTED
BUCKET_ID: 0x1a_8887_ZEROED_PAGE_CORRUPTED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121810-22120-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81a55000 PsLoadedModuleList = 0x81b9d810
Debug session time: Sun Dec 19 00:46:55.471 2010 (UTC - 5:00)
System Uptime: 0 days 1:57:06.283
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00008887, The subtype of the bugcheck.
Arg2: 8358ed48
Arg3: 83891448
Arg4: 00000500
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8887
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
STACK_TEXT:
8942f7b4 81aef016 0000001a 00008887 8358ed48 nt!KeBugCheckEx+0x1e
8942f7f4 81af7bc9 00000000 00000000 00000000 nt!MiUnlinkPageFromLockedList+0x51
8942f864 81b075b5 84120300 01000000 0004519e nt!MmPurgeSection+0x665
8942f894 8846ed8b 8403e738 00000000 00000000 nt!CcPurgeCacheSection+0xe2
8942f8e0 8849322b 8412f008 a4d2b9f8 00000000 Ntfs!NtfsFlushAndPurgeScb+0xc0
8942f94c 8849e129 8412f008 84cfb7a4 84db30d8 Ntfs!NtfsOpenAttribute+0x807
8942f9a8 88495217 8412f008 84cfb5f0 a4d2bba0 Ntfs!NtfsOpenExistingAttr+0x2e7
8942fa90 88495677 8412f008 84cfb5f0 a4d2bba0 Ntfs!NtfsOpenAttributeInExistingFile+0x7a4
8942fb3c 88494a2d 8412f008 84cfb5f0 a4d2bba0 Ntfs!NtfsOpenExistingPrefixFcb+0x26e
8942fb9c 88496c5c 8412f008 84cfb5f0 8d691528 Ntfs!NtfsFindStartingNode+0xb88
8942fc78 8841b426 8412f008 84cfb5f0 9a1978f0 Ntfs!NtfsCommonCreate+0x65f
8942fd00 81ac2f2b 0012f008 00000000 83c88518 Ntfs!NtfsFspDispatch+0x1b0
8942fd50 81c6366d 00000000 ab3b901b 00000000 nt!ExpWorkerThread+0x10d
8942fd90 81b150d9 81ac2e1e 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
SYMBOL_NAME: ZEROED_PAGE_CORRUPTED
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x1a_8887_ZEROED_PAGE_CORRUPTED
BUCKET_ID: 0x1a_8887_ZEROED_PAGE_CORRUPTED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121810-16333-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_4e3914fa, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_4e3914fa
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_4e3914fa
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81a04000 PsLoadedModuleList = 0x81b4c810
Debug session time: Sat Dec 18 22:49:05.919 2010 (UTC - 5:00)
System Uptime: 0 days 0:21:09.731
Unable to load image Unknown_Module_4e3914fa, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_4e3914fa
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_4e3914fa
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: d43081a7, memory referenced.
Arg2: 00000008, value 0 = read operation, 1 = write operation.
Arg3: 8946fb96, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
*** WARNING: Unable to verify timestamp for Unknown_Module_4e3914fa
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_4e3914fa
WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
d43081a7
FAULTING_IP:
+3034636636353132
8946fb96 46 inc esi
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 81a4a5f8 to 81a898e3
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8946fb7e 81a4a5f8 00000008 d43081a7 00000000 0x81a898e3
8946fb96 d43081a7 badb0d00 00000000 6d4d81b3 0x81a4a5f8
8946fb9a badb0d00 00000000 6d4d81b3 d4300000 0xd43081a7
8946fb9e 00000000 6d4d81b3 d4300000 0d4483c8 0xbadb0d00
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
87fa5000 87fed000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8c23e000 8c298000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8c5a5000 8c5b7000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
882d3000 882dc000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
882a7000 882b0000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
882b0000 882d3000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
8896b000 88972000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8c218000 8c226000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
87eb0000 87eb8000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9809f000 980b8000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
93560000 9357e000 cdd cdd.dll unavailable (00000000)
87efa000 87fa5000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8890d000 88932000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
87eb8000 87efa000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88596000 885f3000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8d5e7000 8d5f4000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
8e9ec000 8e9f9000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8c39c000 8c400000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8c200000 8c218000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8c390000 8c39c000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
888fc000 8890d000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8dacb000 8dae4000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
8dae4000 8daed000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8e82f000 8e83a000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8daed000 8dafe000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8db15000 8db1f000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8c499000 8c550000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:26:15 2009 (4A5BC297)
8d5a5000 8d5de000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
9814a000 98197000 eamon eamon.sys Wed Oct 07 03:05:55 2009 (4ACC3DD3)
88972000 88981000 easdrv easdrv.sys Wed Oct 07 03:06:53 2009 (4ACC3E0D)
8db5f000 8db73000 epfw epfw.sys Wed Oct 07 02:54:44 2009 (4ACC3B34)
8d5f4000 8d5ff000 Epfwndis Epfwndis.sys Wed Oct 07 02:54:43 2009 (4ACC3B33)
88822000 88834000 epfwtdi epfwtdi.sys Wed Oct 07 02:54:43 2009 (4ACC3B33)
887e8000 887f3000 fdc fdc.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
88310000 88321000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8da6c000 8da76000 flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
882dc000 88310000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8840e000 88417000 Fs_Rec Fs_Rec.sys unavailable (00000000)
888ca000 888fc000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
887ae000 887df000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
888c9000 888c9680 giveio giveio.sys Wed Apr 03 22:33:25 1996 (316334F5)
81a12000 81a49000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8c47a000 8c499000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
9801a000 9809f000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
888c1000 888c9000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
88218000 88230000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8c226000 8c238000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
887f3000 88800000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
81953000 8195b000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8da2a000 8da5e000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
88583000 88596000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88640000 88665000 ksecpkg ksecpkg.sys Mon Jul 13 19:34:00 2009 (4A5BC468)
8db73000 8db83000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8db2a000 8db45000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
87e27000 87e9f000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
8db1f000 8db2a000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
88417000 88424000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
88291000 882a7000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
980b8000 980ca000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
980ca000 980ed000 mrxsmb mrxsmb.sys Mon Jul 13 19:14:24 2009 (4A5BBFD0)
980ed000 98128000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
98128000 98143000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
889d3000 889de000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
881e8000 881f0000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88558000 88583000 msrpc msrpc.sys unavailable (00000000)
8c386000 8c390000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
888b1000 888c1000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88321000 883d8000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8c5cf000 8c5da000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8c5da000 8c5fc000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
8daba000 8dacb000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8c2f0000 8c2fe000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8c298000 8c2ca000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
88602000 88640000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
889de000 889ec000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8c37c000 8c386000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
81a49000 81e59000 nt ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
88429000 88558000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
88964000 8896b000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
8d5a3000 8d5a4040 nvBridge nvBridge.kmd Sat Oct 16 13:04:23 2010 (4CB9DB17)
8cc06000 8d5a25a0 nvlddmkm nvlddmkm.sys Sat Oct 16 13:07:56 2010 (4CB9DBEC)
8c550000 8c5a4c80 nvm62x32 nvm62x32.sys Fri Oct 17 17:00:39 2008 (48F8FCF7)
8c2d1000 8c2f0000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
88200000 88218000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E)
87fed000 87ffe000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
98143000 9814a000 parvdm parvdm.sys Mon Jul 13 19:45:29 2009 (4A5BC719)
88000000 8802a000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8827c000 88283000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
88283000 88291000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
88400000 8840e000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9b205000 9b29c000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
8e800000 8e82f000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
87e9f000 87eb0000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8c5b7000 8c5cf000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
8c400000 8c418000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
87e10000 87e27000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8da07000 8da1e000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8c33b000 8c37c000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8da1e000 8da28000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
889bb000 889c3000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
889c3000 889cb000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
889cb000 889d3000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88884000 888b1000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8db83000 8db96000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8e83b000 8e9eb240 RTKVHDA RTKVHDA.sys Thu May 10 06:24:41 2007 (4642F2E9)
881c2000 881e8000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
9b29c000 9b2a6000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
889ec000 889f6000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
8c2fe000 8c318000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
88882000 88883480 speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
8887a000 88882000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
9b2c7000 9b331000 spsys spsys.sys Mon May 11 12:37:10 2009 (4A085436)
880b8000 881b9000 sptd sptd.sys Mon Mar 23 02:38:33 2009 (49C72E69)
9b38d000 9b3de000 srv srv.sys Mon Jul 13 19:15:10 2009 (4A5BBFFE)
9b33e000 9b38d000 srv2 srv2.sys Mon Jul 13 19:14:52 2009 (4A5BBFEC)
9b2a6000 9b2c7000 srvnet srvnet.sys Mon Jul 13 19:14:45 2009 (4A5BBFE5)
8da28000 8da29380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
88665000 887ae000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E)
9b331000 9b33e000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
88817000 88822000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
88800000 88817000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8c32b000 8c33b000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
93530000 93539000 TSDDD TSDDD.dll Mon Jul 13 20:01:40 2009 (4A5BCAE4)
883d8000 883f9000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
8da5e000 8da6c000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
8e9f9000 8e9fa700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8c46b000 8c47a000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8da76000 8daba000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
889f6000 88a00000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8c420000 8c46b000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
8dafe000 8db15000 USBSTOR USBSTOR.SYS Mon Jul 13 19:51:19 2009 (4A5BC877)
881f0000 881fb000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
88981000 8898d000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
8898d000 889ae000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
887df000 887e8000 vmstorfl vmstorfl.sys unavailable (00000000)
87e00000 87e10000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88231000 8827c000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8883b000 8887a000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8c318000 8c32b000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
889ae000 889bb000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
88039000 880aa000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
880aa000 880b8000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8c2ca000 8c2d1000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
932d0000 9351a000 win32k win32k.sys Mon Jul 13 19:26:26 2009 (4A5BC2A2)
8d5de000 8d5e7000 wmiacpi wmiacpi.sys Mon Jul 13 19:19:16 2009 (4A5BC0F4)
881b9000 881c2000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8db45000 8db5f000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
Unloaded modules:
88932000 8893f000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
8893f000 8894a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
8894a000 88953000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
88953000 88964000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000