1. Remove Avira and install MSE as the replacement:
avgntflt.sys Thu Nov 11 10:54:47 2010
http://www.microsoft.com/security_essentials/
2. Update :
AmdLLD.sys Fri Jun 29 15:47:32 2007
AMD Low Level Device Driver
atipmdag.sys Fri Dec 11 15:31:46 2009
ATI video card
EIO1.sys Wed Aug 08 03:15:17 2007
ASUS Kernel Mode Driver
Visit both ASUS and NVIDIA support sites to check for nForce (motherboard) updates:
nvmf6232.sys Thu Jul 30 19:47:55 2009
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\110610-20389-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e39000 PsLoadedModuleList = 0x82f81810
Debug session time: Sat Nov 6 06:23:21.913 2010 (UTC - 5:00)
System Uptime: 0 days 3:14:42.880
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 82ec3f21, 8ce13a94, 0}
Probably caused by : cdd.dll ( cdd!CGuardMutex::Enter+d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ec3f21, The address that the exception occurred at
Arg3: 8ce13a94, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+1a
82ec3f21 f00fba3000 lock btr dword ptr [eax],0
TRAP_FRAME: 8ce13a94 -- (.trap 0xffffffff8ce13a94)
ErrCode = 00000002
eax=00000000 ebx=8922207e ecx=00000000 edx=00000001 esi=00000000 edi=8560ea38
eip=82ec3f21 esp=8ce13b08 ebp=8ce13b28 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x1a:
82ec3f21 f00fba3000 lock btr dword ptr [eax],0 ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 963572c9 to 82ec3f21
STACK_TEXT:
8ce13b0c 963572c9 ffa0d018 9635a8d4 ffa0d018 nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x1a
8ce13b14 9635a8d4 ffa0d018 00000000 00000000 cdd!CGuardMutex::Enter+0xd
8ce13b28 9635b7c7 0043bfef ffa0d018 fe7105d0 cdd!CddBitmap::RemoveFromCddBitmapList+0x28
8ce13b5c 96351753 ffa0d018 8ce13bfc 9618d50c cdd!CddBitmapHw::Release+0x7d
8ce13b68 9618d50c ffa0d018 00000002 8ce13c20 cdd!DrvDeleteDeviceBitmapEx+0x39
8ce13bfc 9618e920 00000001 00000000 fb051d03 win32k!SURFACE::bDeleteSurface+0x235
8ce13c10 96190e1d 00000001 00000001 fe7105d0 win32k!SURFREF::bDeleteSurface+0x14
8ce13c24 961905bd 00000f34 00000001 00000f34 win32k!vCleanupSurfaces+0x43
8ce13c44 9618c25a ffa85ba8 00000000 00000000 win32k!NtGdiCloseProcess+0xc5
8ce13c64 9618eb3f ffa85ba8 00000000 86b203c8 win32k!GdiProcessCallout+0x151
8ce13c80 83081b98 84fb8110 00000000 ad1bd2d7 win32k!W32pProcessCallout+0x5d
8ce13cfc 8309adc7 00000000 ffffffff 0017f918 nt!PspExitThread+0x46d
8ce13d24 82e7c44a ffffffff 00000000 0017f924 nt!NtTerminateProcess+0x1fa
8ce13d24 776d64f4 ffffffff 00000000 0017f924 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0017f924 00000000 00000000 00000000 00000000 0x776d64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!CGuardMutex::Enter+d
963572c9 c7460401000000 mov dword ptr [esi+4],1
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: cdd!CGuardMutex::Enter+d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bd992
FAILURE_BUCKET_ID: 0x8E_cdd!CGuardMutex::Enter+d
BUCKET_ID: 0x8E_cdd!CGuardMutex::Enter+d
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\112610-16988-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e05000 PsLoadedModuleList = 0x82f4d810
Debug session time: Fri Nov 26 14:46:57.801 2010 (UTC - 5:00)
System Uptime: 0 days 2:02:32.768
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 961bbf11, 9a0c3b98, 0}
Probably caused by : win32k.sys ( win32k!HmgLockEx+67 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 961bbf11, The address that the exception occurred at
Arg3: 9a0c3b98, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32k!HmgLockEx+67
961bbf11 0fb74f08 movzx ecx,word ptr [edi+8]
TRAP_FRAME: 9a0c3b98 -- (.trap 0xffffffff9a0c3b98)
ErrCode = 00000000
eax=84f6ac10 ebx=00000000 ecx=ffbbf000 edx=00000950 esi=ff800000 edi=00000000
eip=961bbf11 esp=9a0c3c0c ebp=9a0c3c30 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
win32k!HmgLockEx+0x67:
961bbf11 0fb74f08 movzx ecx,word ptr [edi+8] ds:0023:00000008=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 961bd68f to 961bbf11
STACK_TEXT:
9a0c3c30 961bd68f 00000000 96171966 fe7aa8e8 win32k!HmgLockEx+0x67
9a0c3c38 96171966 fe7aa8e8 9a0c3c70 9616cd17 win32k!HmgLock+0x7
9a0c3c44 9616cd17 00000000 00000000 fe7aa8e8 win32k!GreReferenceObject+0x16
9a0c3c54 9616cda6 4d120ede 00000001 00000000 win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x27
9a0c3c70 961bf730 4d120ede 4d120ede fe7aa8e8 win32k!SFMLOGICALSURFACE::DeInitialize+0x21
9a0c3c88 9616d313 fe7aa8e8 00000001 00000000 win32k!bhLSurfDestroyLogicalSurfaceObject+0x31
9a0c3cac 96171d88 ffb8b748 00000000 0c3c4c8e win32k!GreSfmCloseCompositorRef+0x8b
9a0c3d1c 82e4844a 4d120ede 00000008 00000000 win32k!NtGdiHLSurfSetInformation+0x110
9a0c3d1c 775c64f4 4d120ede 00000008 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
02e7f6e0 00000000 00000000 00000000 00000000 0x775c64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!HmgLockEx+67
961bbf11 0fb74f08 movzx ecx,word ptr [edi+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!HmgLockEx+67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dbbb5
FAILURE_BUCKET_ID: 0x8E_win32k!HmgLockEx+67
BUCKET_ID: 0x8E_win32k!HmgLockEx+67
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120210-19531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e4f000 PsLoadedModuleList = 0x82f97810
Debug session time: Thu Dec 2 13:35:29.010 2010 (UTC - 5:00)
System Uptime: 0 days 1:07:12.977
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 961dbf11, 9b71bb98, 0}
Probably caused by : win32k.sys ( win32k!HmgLockEx+67 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 961dbf11, The address that the exception occurred at
Arg3: 9b71bb98, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32k!HmgLockEx+67
961dbf11 0fb74f08 movzx ecx,word ptr [edi+8]
TRAP_FRAME: 9b71bb98 -- (.trap 0xffffffff9b71bb98)
ErrCode = 00000000
eax=84fd1d48 ebx=00000000 ecx=ffbbf000 edx=00000a08 esi=ff800000 edi=00000000
eip=961dbf11 esp=9b71bc0c ebp=9b71bc30 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
win32k!HmgLockEx+0x67:
961dbf11 0fb74f08 movzx ecx,word ptr [edi+8] ds:0023:00000008=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 961dd68f to 961dbf11
STACK_TEXT:
9b71bc30 961dd68f 00000000 96191966 fdebc370 win32k!HmgLockEx+0x67
9b71bc38 96191966 fdebc370 9b71bc70 9618cd17 win32k!HmgLock+0x7
9b71bc44 9618cd17 00000000 00000000 fdebc370 win32k!GreReferenceObject+0x16
9b71bc54 9618cda6 aa121666 00000001 00000000 win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x27
9b71bc70 961df730 aa121666 aa121666 fdebc370 win32k!SFMLOGICALSURFACE::DeInitialize+0x21
9b71bc88 9618d313 fdebc370 00000001 00000000 win32k!bhLSurfDestroyLogicalSurfaceObject+0x31
9b71bcac 96191d88 ffb8b748 00000000 0d43cc84 win32k!GreSfmCloseCompositorRef+0x8b
9b71bd1c 82e9244a aa121666 00000008 00000000 win32k!NtGdiHLSurfSetInformation+0x110
9b71bd1c 76f764f4 aa121666 00000008 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0163f708 00000000 00000000 00000000 00000000 0x76f764f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!HmgLockEx+67
961dbf11 0fb74f08 movzx ecx,word ptr [edi+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!HmgLockEx+67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dbbb5
FAILURE_BUCKET_ID: 0x8E_win32k!HmgLockEx+67
BUCKET_ID: 0x8E_win32k!HmgLockEx+67
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
88f37000 88f7f000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8d63d000 8d697000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8eb4d000 8eb5f000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8e108000 8e11a000 amdk8 amdk8.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8f38c000 8f39b000 AmdLLD AmdLLD.sys Fri Jun 29 15:47:32 2007 (468561D4)
890ef000 890f8000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
991f6000 991ff000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
88ff2000 88ffb000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
89029000 8904c000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
95b53000 95b71000 AtiHdmi AtiHdmi.sys Wed Nov 18 18:25:03 2009 (4B04824F)
8e000000 8e024000 atikmpag atikmpag.sys Fri Dec 11 14:50:53 2009 (4B22A29D)
8ee17000 8f358000 atipmdag atipmdag.sys Fri Dec 11 15:31:46 2009 (4B22AC32)
8eb07000 8eb40000 au0uoekx au0uoekx.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
8ee00000 8ee15000 avgntflt avgntflt.sys Thu Nov 11 10:54:47 2010 (4CDC11C7)
8e0c4000 8e0e7000 avipbb avipbb.sys Thu May 27 10:11:26 2010 (4BFE7D8E)
897a8000 897af000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8e0b6000 8e0c4000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
88c1e000 88c26000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
970bc000 970d5000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
963b0000 963ce000 cdd cdd.dll Mon Jul 13 21:04:18 2009 (4A5BD992)
89782000 897a1000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
88c68000 88d13000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
896fe000 89723000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
88c26000 88c68000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
89399000 893f6000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8eb40000 8eb4d000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
95b7b000 95b88000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8e03a000 8e09e000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8e09e000 8e0b6000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8d795000 8d7a1000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
896ed000 896fe000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
95b3a000 95b53000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
95bc9000 95bda000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
95b92000 95bc9000 dump_nvstor32 dump_nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
95b88000 95b92000 dump_storport dump_storport.sys Mon Jul 12 23:24:27 2010 (4C3BDC6B)
95b71000 95b7b000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8ea17000 8eace000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
8eace000 8eb07000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
97167000 9716a180 EIO1 EIO1.sys Wed Aug 08 03:15:17 2007 (46B96D85)
8e11a000 8e125000 fdc fdc.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
8912c000 8913d000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8ebf4000 8ebfe000 flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
890f8000 8912c000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8920e000 89217000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
896bb000 896ed000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55)
895b0000 895e1000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
8e1ef000 8e1f4280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
82e18000 82e4f000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8e1d0000 8e1ef000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
95be5000 95bf8000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
95bf8000 95bfe480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
95bda000 95be5000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
97037000 970bc000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
896b3000 896bb000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8e147000 8e15f000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8e15f000 8e16c000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80ba1000 80ba9000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8f358000 8f38c000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0)
89386000 89399000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
89442000 89467000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
8e024000 8e034000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8d600000 8d61b000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
88c02000 88c0d000 mcupdate mcupdate.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
9580d000 95818000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8ea00000 8ea0d000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
95802000 9580d000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
88ddd000 88df3000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
970d5000 970e7000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
970e7000 9710a000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
9710a000 97145000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
97145000 97160000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
89608000 89613000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
88f7f000 88f87000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8935b000 89386000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8d78b000 8d795000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
896a3000 896b3000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8913d000 891f4000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8eb77000 8eb82000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8eb82000 8eba4000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
8f3ed000 8f3fe000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8d6ef000 8d6fd000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8d697000 8d6c9000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
89404000 89442000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
89613000 89621000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8d781000 8d78b000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82e4f000 8325f000 nt ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
8922c000 8935b000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
897a1000 897a8000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
8d7a1000 8d7e5880 nvmf6232 nvmf6232.sys Thu Jul 30 19:47:55 2009 (4A72312B)
8904c000 89071000 nvstor nvstor.sys Wed May 20 02:44:09 2009 (4A13A6B9)
890b8000 890ef000 nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
8d6d0000 8d6ef000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
8e12f000 8e147000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E)
88fbc000 88fcd000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
97160000 97167000 parvdm parvdm.sys Mon Jul 13 19:45:29 2009 (4A5BC719)
88f92000 88fbc000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
88fdd000 88fe4000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
88fe4000 88ff2000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
89200000 8920e000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9901d000 990b4000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
95b0b000 95b3a000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
88c0d000 88c1e000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8eb5f000 8eb77000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
8eba4000 8ebbc000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8ebbc000 8ebd3000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8ebd3000 8ebea000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8d740000 8d781000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8ebea000 8ebf4000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
897e9000 897f1000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
897f1000 897f9000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
89600000 89608000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
89676000 896a3000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8d7e6000 8d7f9000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
9581b000 95b0af80 RTKVHDA RTKVHDA.sys Fri Apr 30 04:59:05 2010 (4BDA9BD9)
88f11000 88f37000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
990b4000 990be000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
8e125000 8e12f000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
8d6fd000 8d717000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
8966e000 89676000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
88e15000 88f08000 spsc spsc.sys Sun Oct 11 16:54:02 2009 (4AD245EA)
9913b000 9918c000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
990ec000 9913b000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
990be000 990df000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
8d73a000 8d73fa00 ssmdrv ssmdrv.sys Tue May 05 06:05:18 2009 (4A000F5E)
89071000 890b8000 storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
8ea0d000 8ea0e380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
89467000 895b0000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
990df000 990ec000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
89621000 8962c000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
89000000 89017000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8d72a000 8d73a000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
96380000 96389000 TSDDD TSDDD.dll Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8e0e7000 8e108000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
8f39b000 8f3a9000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
95800000 95801700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8e1c1000 8e1d0000 usbehci usbehci.sys Fri Oct 23 23:58:55 2009 (4AE27B7F)
8f3a9000 8f3ed000 usbhub usbhub.sys Sat Oct 24 00:00:05 2009 (4AE27BC5)
8e16c000 8e176000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8e176000 8e1c1000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
88f87000 88f92000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
897af000 897bb000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
897bb000 897dc000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
895e1000 895e9380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
88fcd000 88fdd000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88d92000 88ddd000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8962f000 8966e000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8d717000 8d72a000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
897dc000 897e9000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
88d13000 88d84000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
88d84000 88d92000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8d6c9000 8d6d0000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
96120000 9636b000 win32k win32k.sys Tue Aug 31 22:34:29 2010 (4C7DBBB5)
88f08000 88f11000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8d61b000 8d635000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
Unloaded modules:
9918c000 991f6000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0006A000
89723000 89730000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
89730000 8973a000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
8973a000 89771000 dump_nvstor3
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00037000
89771000 89782000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000