Code:
indows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03815000 PsLoadedModuleList = 0xfffff800`03a52e50
Debug session time: Wed Dec 29 06:16:56.391 2010 (GMT-5)
System Uptime: 0 days 12:14:30.687
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+5932952f007edd34
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: WinRAR.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff880030d35d8 -- (.exr 0xfffff880030d35d8)
ExceptionAddress: fffff80003890e39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880030d3680 -- (.trap 0xfffff880030d3680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8006366d08 rbx=0000000000000000 rcx=f7fffa8006366d08
rdx=fffff880030a8700 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003890e39 rsp=fffff880030d3810 rbp=fffffa8006360468
r8=fffffa800871ec00 r9=0000000000000008 r10=fffff80003815000
r11=fffff880030d37e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`03890e39 48894108 mov qword ptr [rcx+8],rax ds:f7fffa80`06366d10=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000387d46e to fffff80003885710
STACK_TEXT:
fffff880`030d26c8 fffff800`0387d46e : fffffa80`08840630 fffffa80`08930ac8 fffff880`030d2e40 fffff800`038b2668 : nt!KeBugCheck
fffff880`030d26d0 fffff800`038ab40d : fffff800`03a93b7c fffff800`039cde84 fffff800`03815000 fffff880`030d35d8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`030d2700 fffff800`038b2a90 : fffff800`039d4a40 fffff880`030d2778 fffff880`030d35d8 fffff800`03815000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`030d2730 fffff800`038bf9ef : fffff880`030d35d8 fffff880`030d2e40 fffff880`00000000 fffffa80`06366d00 : nt!RtlDispatchException+0x410
fffff880`030d2e10 fffff800`03884d82 : fffff880`030d35d8 fffffa80`06360468 fffff880`030d3680 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`030d34a0 fffff800`0388368a : 00000000`00000005 00000000`00433f05 fffffa80`00433f05 fffff880`0164808f : nt!KiExceptionDispatch+0xc2
fffff880`030d3680 fffff800`03890e39 : fffffa80`0871ec20 fffffa80`0871ec68 fffffa80`0871ec68 fffffa80`06360400 : nt!KiGeneralProtectionFault+0x10a
fffff880`030d3810 fffff800`038914be : 00000066`9c2d360e fffff880`030d3e88 00000000`002b1b41 fffff880`030a6da8 : nt!KiProcessExpiredTimerList+0x129
fffff880`030d3e60 fffff800`03890cb7 : fffff880`030a41c2 fffffa80`002b1b41 00000000`00000000 00000000`00000041 : nt!KiTimerExpiration+0x1be
fffff880`030d3f00 fffff800`0388b865 : 0000058a`00000000 fffffa80`06518b60 00000000`00000000 fffff800`0393e230 : nt!KiRetireDpcList+0x277
fffff880`030d3fb0 fffff800`0388b67c : fffff880`030a4180 fffff800`03892618 00000000`00000000 fffff880`07544c28 : nt!KxRetireDpcList+0x5
fffff880`07544be0 fffff800`038cf113 : fffff800`038923ac fffff800`03892418 00000000`00009ca5 fffff880`07544ca0 : nt!KiDispatchInterruptContinue
fffff880`07544c10 fffff800`03892418 : 00000000`00009ca5 fffff880`07544ca0 00000000`00190750 00000000`00008000 : nt!KiDpcInterruptBypass+0x13
fffff880`07544c20 00000001`3fdca952 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8
00000000`06b4f9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1`3fdca952
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0387d46e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------
System Uptime: 0 days 0:52:39.315
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80003b96cc4, fffff88003bbc030, 0}
Probably caused by : hardware ( nt!IopXxxControlFile+bc1 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003b96cc4, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88003bbc030, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IopXxxControlFile+bc1
fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh]
CONTEXT: fffff88003bbc030 -- (.cxr 0xfffff88003bbc030)
rax=fffffa8008e90b60 rbx=fffffa80072d3c40 rcx=0000000008547b00
rdx=0000057ffbe7f7f8 rsi=fffffa8008547bd8 rdi=fffffa8008547ac0
rip=fffff80003b96cc4 rsp=fffff88003bbca08 rbp=fffff88003bbcca0
r8=0000000000000000 r9=0000000000000000 r10=fffff880009b2ca0
r11=fffffa8007d70680 r12=0000000000000008 r13=0000000000000001
r14=0000000000000001 r15=fffffa8008901da0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!IopXxxControlFile+0xbc1:
fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh] ds:002b:00000000`08547a81=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: HWMonitor 1.17
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!IopXxxControlFile+bc1
fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh]
LAST_CONTROL_TRANSFER: from fffffa8008e90b60 to fffff80003b96cc4
STACK_TEXT:
fffff880`03bbca08 fffffa80`08e90b60 : fffff800`03b96f66 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xbc1
fffff880`03bbcb38 fffff800`03b96f66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`08e90b60
fffff880`03bbcb40 fffff800`0387a993 : 00000000`73682450 00000000`0098f170 00000000`0098fd20 fffff880`03bbcc20 : nt!NtDeviceIoControlFile+0x56
fffff880`03bbcbb0 00000000`73682dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0098f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73682dd9
FOLLOWUP_IP:
nt!IopXxxControlFile+bc1
fffff800`03b96cc4 ff4181 inc dword ptr [rcx-7Fh]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IopXxxControlFile+bc1
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff88003bbc030 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Debug session time: Thu Dec 30 03:28:06.166 2010 (GMT-5)
System Uptime: 0 days 12:55:28.461
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff960002e0010, 80800001e6074021, fffff8800745cd80, b}
Probably caused by : win32k.sys ( win32k!SpBitBlt+4a3 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff960002e0010, Virtual address for the attempted write.
Arg2: 80800001e6074021, PTE contents.
Arg3: fffff8800745cd80, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800745cd80 -- (.trap 0xfffff8800745cd80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff900c1e57850 rbx=0000000000000000 rcx=fffff900c1e578b8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960001e1baf rsp=fffff8800745cf10 rbp=000000000000f0f0
r8=fffff900c2aae0f8 r9=0000000000000001 r10=fffff8800745d0e0
r11=fffff8800745cee0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32k!SpBitBlt+0x4a3:
fffff960`001e1baf ff155be40f00 call qword ptr [win32k!_imp_PsGetCurrentThreadWin32Thread (fffff960`002e0010)] ds:fffff960`002e0010={nt!PsGetCurrentThreadWin32Thread (fffff800`038cb990)}
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000393fae2 to fffff800038bf740
STACK_TEXT:
fffff880`0745cc18 fffff800`0393fae2 : 00000000`000000be fffff960`002e0010 80800001`e6074021 fffff880`0745cd80 : nt!KeBugCheckEx
fffff880`0745cc20 fffff800`038bd82e : 00000000`00000001 00000000`00000000 00000420`00000000 00000436`00000780 : nt! ?? ::FNODOBFM::`string'+0x4237e
fffff880`0745cd80 fffff960`001e1baf : fffff900`c39c8b10 00000000`00000000 00000000`0000f0f0 fffff900`c1efd018 : nt!KiPageFault+0x16e
fffff880`0745cf10 fffff960`0005f88d : fffff900`c00cf028 00000000`00000000 00000000`00000000 fffff880`0745d0e0 : win32k!SpBitBlt+0x4a3
fffff880`0745d300 fffff960`0005f474 : 00000000`00000000 00000000`00f00021 fffff880`0745d550 fffff900`0000f0f0 : win32k!GrePatBltLockedDC+0x2f9
fffff880`0745d3b0 fffff960`0005f144 : fffff880`0745d550 fffff800`038cb772 fffff880`0745d5a0 00000000`00000000 : win32k!GrePolyPatBltInternal+0x2ec
fffff880`0745d500 fffff960`0005f0c3 : fffff900`c0805390 fffff900`c0805390 00000000`01100073 fffff960`0023b192 : win32k!GrePolyPatBlt+0x74
fffff880`0745d570 fffff960`00147035 : fffff900`c0805390 00000000`01100073 00000000`00000000 fffff900`c0805390 : win32k!FillRect+0x63
fffff880`0745d5d0 fffff960`00146f5d : 00000000`00000000 fffff900`c0805390 00000000`01100073 ffffffff`f6011c8d : win32k!xxxPaintRect+0xb5
fffff880`0745d600 fffff960`00196e18 : 00000000`00000000 fffff900`c0805390 ffffffff`f6011c8d fffff800`03bd8500 : win32k!xxxFillWindow+0x9d
fffff880`0745d660 fffff960`000e9897 : 00000000`00000000 00000000`00000014 00000000`00000000 fffff800`03bb1fd1 : win32k!xxxDWP_EraseBkgnd+0xdc
fffff880`0745d6b0 fffff960`000f0a9c : 00000000`00000000 fffff900`c0805390 00000000`00000014 00000000`0001004c : win32k!xxxRealDefWindowProc+0x507
fffff880`0745d8c0 fffff960`000e2be7 : fffff900`c0805390 00000000`0000029e 00000000`00000014 fffffa80`087dbb60 : win32k!xxxWrapRealDefWindowProc+0x3c
fffff880`0745d8f0 fffff960`000effbe : 00000000`0001004c 00000000`00000014 fffffa80`0867d060 00000000`00000000 : win32k!NtUserfnNCDESTROY+0x27
fffff880`0745d930 fffff800`038be993 : fffffa80`087dbb60 fffff880`0745daa0 00000000`02f8d8a8 00000000`0001004c : win32k!NtUserMessageCall+0x132
fffff880`0745d9b0 00000000`778ba08a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02f8d888 fffff800`038b7080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778ba08a
fffff880`0745de10 fffff880`0745de28 : fffff880`0745e178 00000000`00000000 fffff960`00000018 00000000`00000002 : nt!KiCallUserMode
fffff880`0745de18 fffff880`0745e178 : 00000000`00000000 fffff960`00000018 00000000`00000002 fffff880`0745e4f0 : 0xfffff880`0745de28
fffff880`0745de20 00000000`00000000 : fffff960`00000018 00000000`00000002 fffff880`0745e4f0 00000000`00000000 : 0xfffff880`0745e178
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SpBitBlt+4a3
fffff960`001e1baf ff155be40f00 call qword ptr [win32k!_imp_PsGetCurrentThreadWin32Thread (fffff960`002e0010)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!SpBitBlt+4a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
FAILURE_BUCKET_ID: X64_0xBE_win32k!SpBitBlt+4a3
BUCKET_ID: X64_0xBE_win32k!SpBitBlt+4a3
Followup: MachineOwner
---------
4: kd> lmtsmn
start end module name
fffff880`02d9d000 fffff880`02ddb000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f15000 fffff880`00f6c000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c3f000 fffff880`02cc9000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02ddb000 fffff880`02df1000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03faa000 fffff880`03fbf000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00db6000 fffff880`00dca000 amdsata amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`01075000 fffff880`01080000 amdxata amdxata.sys Wed Oct 07 16:13:10 2009 (4ACCF656)
fffff880`072ad000 fffff880`072de000 AODDriver2 AODDriver2.sys Wed May 05 00:03:12 2010 (4BE0EE00)
fffff880`00d83000 fffff880`00d8c000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d8c000 fffff880`00db6000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`048f5000 fffff880`05106000 atikmdag atikmdag.sys Thu Nov 25 21:46:44 2010 (4CEF1F94)
fffff880`03e00000 fffff880`03e4c000 atikmpag atikmpag.sys Thu Nov 25 21:16:47 2010 (4CEF188F)
fffff880`01931000 fffff880`01939000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486)
fffff880`019ab000 fffff880`019b2000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f73000 fffff880`03f84000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06bdf000 fffff880`06bfd000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`007c0000 fffff960`007e7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`073bf000 fffff880`073dc000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`01978000 fffff880`019a2000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03c1e000 fffff880`03dc1000 cfosspeed6 cfosspeed6.sys Tue Dec 21 10:26:50 2010 (4D10C73A)
fffff880`00ca9000 fffff880`00d69000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01901000 fffff880`01931000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c4b000 fffff880`00ca9000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01149000 fffff880`011bc000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03ebe000 fffff880`03ece000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`073dc000 fffff880`073e5000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`0734f000 fffff880`07357000 cpuz_x64 cpuz_x64.sys Tue Dec 02 08:51:19 2008 (49353D57)
fffff880`06ae2000 fffff880`06af0000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ed2000 fffff880`03f55000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f55000 fffff880`03f73000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02d8e000 fffff880`02d9d000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`018eb000 fffff880`01901000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`057d5000 fffff880`057f7000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06afa000 fffff880`06b0e000 dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`06b2b000 fffff880`06b3e000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06af0000 fffff880`06afa000 dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`06b3e000 fffff880`06b4a000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`05106000 fffff880`051fa000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04800000 fffff880`04846000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`02ac8000 fffff880`02b9a000 eamon eamon.sys Tue Sep 29 06:51:47 2009 (4AC1E6C3)
fffff880`019b2000 fffff880`019d5000 ehdrv ehdrv.sys Tue Sep 29 06:52:21 2009 (4AC1E6E5)
fffff880`05600000 fffff880`05620000 epfwwfpr epfwwfpr.sys Tue Sep 29 06:47:10 2009 (4AC1E5AE)
fffff880`010d7000 fffff880`010eb000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0108b000 fffff880`010d7000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013da000 fffff880`013e4000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018b1000 fffff880`018eb000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`03806000 fffff800`0384f000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04846000 fffff880`0486a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06b73000 fffff880`06b8c000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`06b8c000 fffff880`06b94080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06b65000 fffff880`06b73000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02a00000 fffff880`02ac8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`018a8000 fffff880`018b1000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03fc8000 fffff880`03fe6000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03fe6000 fffff880`03ff5000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00ba8000 fffff800`00bb2000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`05686000 fffff880`056c9000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013af000 fffff880`013c9000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015a3000 fffff880`015ce000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`057f7000 fffff880`057fc200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02bbb000 fffff880`02bd0000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06bbc000 fffff880`06bdf000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c2a000 fffff880`00c37000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06bae000 fffff880`06bbc000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`05675000 fffff880`05684000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06ba1000 fffff880`06bae000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d69000 fffff880`00d83000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`06800000 fffff880`0682d000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0682d000 fffff880`0687b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0687b000 fffff880`0689e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01080000 fffff880`0108b000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`015f0000 fffff880`015fb000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f75000 fffff880`00f7f000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010eb000 fffff880`01149000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c0c000 fffff880`03c17000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01896000 fffff880`018a8000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01451000 fffff880`01543000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02c24000 fffff880`02c30000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`00dca000 fffff880`00df9000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0574c000 fffff880`05761000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03dc1000 fffff880`03dd0000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cc9000 fffff880`02d0e000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01543000 fffff880`015a3000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`013e4000 fffff880`013f5000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c00000 fffff880`03c0c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0384f000 fffff800`03e2b000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0120c000 fffff880`013af000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019a2000 fffff880`019ab000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`056db000 fffff880`056f2000 nusb3hub nusb3hub.sys Fri Nov 20 05:15:57 2009 (4B066C5D)
fffff880`0486a000 fffff880`0489a000 nusb3xhc nusb3xhc.sys Fri Nov 20 05:16:01 2009 (4B066C61)
fffff880`02d17000 fffff880`02d3d000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fbf000 fffff880`00fd4000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f7f000 fffff880`00fb2000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fe9000 fffff880`00ff0000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ff0000 fffff880`01000000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c9000 fffff880`013da000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06e8b000 fffff880`06f31000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05798000 fffff880`057d5000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c37000 fffff880`00c4b000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02c00000 fffff880`02c24000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`00c00000 fffff880`00c1b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0562f000 fffff880`05650000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`05650000 fffff880`0566a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d3d000 fffff880`02d8e000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0566a000 fffff880`05675000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019f3000 fffff880`019fc000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015de000 fffff880`015e7000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015e7000 fffff880`015f0000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0185c000 fffff880`01896000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02bd0000 fffff880`02be8000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0489c000 fffff880`048f3000 Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`05761000 fffff880`05797d80 RtHDMIVX RtHDMIVX.sys Tue Jan 26 22:04:58 2010 (4B5FAD5A)
fffff880`068a8000 fffff880`06ae1080 RTKVHD64 RTKVHD64.sys Tue Apr 06 06:17:30 2010 (4BBB0A3A)
fffff880`01854000 fffff880`0185c000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07217000 fffff880`072ad000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06f70000 fffff880`06fd7000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06f31000 fffff880`06f5e000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`01013000 fffff880`01075000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`05684000 fffff880`05685480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06f5e000 fffff880`06f70000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01000000 fffff880`0100d000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011e1000 fffff880`011ff000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03deb000 fffff880`03dff000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00460000 fffff960`0046a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03f84000 fffff880`03faa000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`056c9000 fffff880`056db000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06b4a000 fffff880`06b64c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06b0e000 fffff880`06b2b000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0489a000 fffff880`0489bf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03ead000 fffff880`03ebe000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`056f2000 fffff880`0574c000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03e4c000 fffff880`03e57000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03e57000 fffff880`03ead000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06b95000 fffff880`06ba1000 usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`00fb2000 fffff880`00fbf000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019d5000 fffff880`019e3000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`011bc000 fffff880`011e1000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015ce000 fffff880`015de000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fd4000 fffff880`00fe9000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01808000 fffff880`01854000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03dd0000 fffff880`03deb000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019e3000 fffff880`019f3000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e62000 fffff880`00f06000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f06000 fffff880`00f15000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d0e000 fffff880`02d17000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00040000 fffff960`0034f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`03fbf000 fffff880`03fc8000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f6c000 fffff880`00f75000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02b9a000 fffff880`02bbb000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`073ef000 fffff880`073f9000 HWiNFO64A.SY
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`073e5000 fffff880`073ef000 HWiNFO64A.SY
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`073b6000 fffff880`073bf000 cpuz135_x64.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07385000 fffff880`073b6000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07374000 fffff880`07385000 WinUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0736a000 fffff880`07374000 HWiNFO64A.SY
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07361000 fffff880`0736a000 cpuz135_x64.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07357000 fffff880`07361000 HWiNFO64A.SY
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`072de000 fffff880`0734f000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01939000 fffff880`01947000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01947000 fffff880`01951000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01951000 fffff880`01965000 dump_amdsata
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01965000 fffff880`01978000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
4: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3500
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 16 Model 10 Stepping 0
ProcessorNameString = REG_SZ AMD Phenom(tm) II X6 1055T Processor
VendorIdentifier = REG_SZ AuthenticAMD