Code:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e3e000 PsLoadedModuleList = 0x82f86810
Debug session time: Tue Dec 14 18:35:04.574 2010 (GMT-5)
System Uptime: 0 days 0:52:08.182
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {804000ac, 2, 0, 82ed3a04}
Probably caused by : rdbss.sys ( rdbss!RxFastCopyRead+244 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 804000ac, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82ed3a04, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82fa6718
Unable to read MiSystemVaType memory at 82f86160
804000ac
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlAreBitsSet+5b
82ed3a04 8a08 mov cl,byte ptr [eax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AVSVideoConver
TRAP_FRAME: 9afed714 -- (.trap 0xffffffff9afed714)
ErrCode = 00000000
eax=804000ac ebx=00000007 ecx=00000005 edx=000000ac esi=000000ae edi=82f84820
eip=82ed3a04 esp=9afed788 ebp=9afed794 iopl=0 nv up ei ng nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010293
nt!RtlAreBitsSet+0x5b:
82ed3a04 8a08 mov cl,byte ptr [eax] ds:0023:804000ac=80
Resetting default scope
LAST_CONTROL_TRANSFER: from 82ed3a04 to 82e8482b
STACK_TEXT:
9afed714 82ed3a04 badb0d00 000000ac 91016220 nt!KiTrap0E+0x2cf
9afed794 82ee3d5f 00000005 00000567 0000000f nt!RtlAreBitsSet+0x5b
9afed86c 82ed052c 82f84820 0000000f 00000000 nt!MiReplenishBitMap+0x169
9afed8cc 82ee4e38 82f84820 c048a058 0000000f nt!MiInsertCachedPte+0x214
9afed908 82ef25dd 9140b000 86c8ca30 00000000 nt!MmUnmapLockedPages+0xef
9afed970 82e6d950 86c8ca4c 00000000 00000000 nt!MiWaitForInPageComplete+0x2c0
9afed994 82e6d1bc 00000000 00000000 00000000 nt!MiPfCompletePrefetchIos+0x6c
9afed9b0 82ef4864 87c8f6e8 0000f6a4 87d156b8 nt!MmWaitForCacheManagerPrefetch+0x1b
9afed9dc 8309bdae 87d156b8 00000001 9afeda54 nt!CcFetchDataForRead+0xa4
9afeda1c 8309da15 87d156b8 6420d0bc 00000000 nt!CcMapAndCopyFromCache+0x71
9afeda58 9103bef4 87d156b8 858c00ac 0000f6a4 nt!CcCopyRead+0x107
9afedabc 9103c061 00d156b8 018c00ac 0000f6a4 rdbss!RxFastCopyRead+0x244
9afedb18 8b5e6460 87d156b8 858c00ac 0000f6a4 rdbss!RxFastIoRead+0x7a
9afedb44 8af83fec 87d156b8 858c00ac 0000f6a4 mup!MupFastIoRead+0x3c
9afedb78 8af841bb 00000003 00000000 858c00a4 fltmgr!FltpPerformFastIoCall+0x22e
9afedba4 8af96c37 00fedbc8 87d156b8 86811b60 fltmgr!FltpPassThroughFastIo+0x7d
9afedbe8 8af83fec 87d156b8 9afedc5c 0000f6a4 fltmgr!FltpFastIoRead+0x163
9afedc1c 8af96bba 00000003 00000000 9afedc54 fltmgr!FltpPerformFastIoCall+0x22e
9afedc74 8308dbbe 87d156b8 9afedcb4 0000f6a4 fltmgr!FltpFastIoRead+0xe6
9afedd08 82e8144a 86b5e490 00000000 00000000 nt!NtReadFile+0x2d5
9afedd08 76de64f4 86b5e490 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
087cfa8c 00000000 00000000 00000000 00000000 0x76de64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
rdbss!RxFastCopyRead+244
9103bef4 8845e7 mov byte ptr [ebp-19h],al
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: rdbss!RxFastCopyRead+244
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdbss
IMAGE_NAME: rdbss.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbfd2
FAILURE_BUCKET_ID: 0xA_rdbss!RxFastCopyRead+244
BUCKET_ID: 0xA_rdbss!RxFastCopyRead+244
Followup: MachineOwner
---------
Debug session time: Tue Dec 14 17:41:37.819 2010 (GMT-5)
System Uptime: 0 days 6:33:49.427
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {3452, 66c000, c0808ca0, 8c06f05a}
Probably caused by : memory_corruption ( nt!MiDeleteAddressesInWorkingSet+389 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00003452, The subtype of the bugcheck.
Arg2: 0066c000
Arg3: c0808ca0
Arg4: 8c06f05a
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_3452
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: newsLeecher.ex
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82ea70a8 to 82ea25bc
STACK_TEXT:
98affc5c 82ea70a8 87edb030 87edb030 00000000 nt!MiDeleteAddressesInWorkingSet+0x389
98affc88 8304adae b62e6e5c 00000000 87d08030 nt!MmCleanProcessAddressSpace+0x8c
98affcfc 83063dc7 00000000 ffffffff 0012feac nt!PspExitThread+0x683
98affd24 82e4544a ffffffff 00000000 0012feb8 nt!NtTerminateProcess+0x1fa
98affd24 77cd64f4 ffffffff 00000000 0012feb8 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012feb8 00000000 00000000 00000000 00000000 0x77cd64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteAddressesInWorkingSet+389
82ea25bc cc int 3
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+389
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet+389
BUCKET_ID: 0x1a_3452_nt!MiDeleteAddressesInWorkingSet+389
Followup: MachineOwner
---------
Debug session time: Fri Dec 24 00:35:21.589 2010 (GMT-5)
System Uptime: 0 days 4:37:51.212
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 8b42f82b, 8d5439c4, 8d5435a0}
Probably caused by : Ntfs.sys ( Ntfs!NtfsDecodeFileObject+6e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8b42f82b, The address that the exception occurred at
Arg3: 8d5439c4, Exception Record Address
Arg4: 8d5435a0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
Ntfs!NtfsDecodeFileObject+6e
8b42f82b 0fb64034 movzx eax,byte ptr [eax+34h]
EXCEPTION_RECORD: 8d5439c4 -- (.exr 0xffffffff8d5439c4)
ExceptionAddress: 8b42f82b (Ntfs!NtfsDecodeFileObject+0x0000006e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000037
Attempt to read from address 00000037
CONTEXT: 8d5435a0 -- (.cxr 0xffffffff8d5435a0)
eax=00000003 ebx=00000000 ecx=a6fffc18 edx=8d543b04 esi=87d36b50 edi=00000000
eip=8b42f82b esp=8d543a8c ebp=8d543a90 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
Ntfs!NtfsDecodeFileObject+0x6e:
8b42f82b 0fb64034 movzx eax,byte ptr [eax+34h] ds:0023:00000037=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000037
READ_ADDRESS: GetPointerFromAddress: unable to read from 833af718
Unable to read MiSystemVaType memory at 8338f160
00000037
FOLLOWUP_IP:
Ntfs!NtfsDecodeFileObject+6e
8b42f82b 0fb64034 movzx eax,byte ptr [eax+34h]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 8b4b5e05 to 8b42f82b
STACK_TEXT:
8d543a90 8b4b5e05 00000000 87d36b50 8d543afc Ntfs!NtfsDecodeFileObject+0x6e
8d543b28 832834bc 00000003 860dee00 860dee00 Ntfs!NtfsFsdClose+0x5f
8d543b40 8b3ac20c 86c556d0 860dee00 00000000 nt!IofCallDriver+0x63
8d543b64 8b3ac3cb 8d543b84 86c556d0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
8d543b9c 832834bc 86c556d0 860dee00 860dee00 fltmgr!FltpDispatch+0xc5
8d543bb4 8b3ac20c 86ff0528 860dee00 00000000 nt!IofCallDriver+0x63
8d543bd8 8b3ac3cb 8d543bf8 86ff0528 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
8d543c10 832834bc 86ff0528 860dee00 8734f024 fltmgr!FltpDispatch+0xc5
8d543c28 83488e47 85a19a38 87d36b38 00000000 nt!IofCallDriver+0x63
8d543c6c 83468788 87d36b50 87d36b50 87d36b38 nt!IopDeleteFile+0x10c
8d543c84 832aff60 00000000 000c0000 00000000 nt!ObpRemoveObjectRoutine+0x59
8d543c98 832afed0 87d36b50 83478a75 85b93e08 nt!ObfDereferenceObjectWithTag+0x88
8d543ca0 83478a75 85b93e08 85b93e30 833b1680 nt!ObfDereferenceObject+0xd
8d543ccc 83272f39 85b93e08 00000000 00000000 nt!MiSegmentDelete+0x191
8d543d28 83272e51 85a38638 00000000 04020304 nt!MiProcessDereferenceList+0xdb
8d543d50 834556d3 00000000 a3d00e9e 00000000 nt!MiDereferenceSegmentThread+0xc5
8d543d90 833070f9 83272d8a 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsDecodeFileObject+6e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45
STACK_COMMAND: .cxr 0xffffffff8d5435a0 ; kb
FAILURE_BUCKET_ID: 0x7E_Ntfs!NtfsDecodeFileObject+6e
BUCKET_ID: 0x7E_Ntfs!NtfsDecodeFileObject+6e
Followup: MachineOwner
---------
0: kd> lmtsmn
start end module name
8f892000 8f8be000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8b147000 8b18f000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
90ca2000 90cfc000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8f9e0000 8f9f2000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b392000 8b39b000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
8b34b000 8b35b000 arcm_x86 arcm_x86.sys Thu Jun 10 04:25:52 2010 (4C10A190)
9e8ea000 9e8f3000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
8b2b3000 8b2bc000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b2bc000 8b2df000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
82bb0000 82bfd000 ATMFD ATMFD.DLL unavailable (00000000)
8f913000 8f94c000 aumdtxep aumdtxep.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
8b1e5000 8b1f0000 BATTC BATTC.SYS Mon Jul 13 19:19:15 2009 (4A5BC0F3)
8b62c000 8b633000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
900c7000 900d5000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8ae94000 8ae9c000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
961e2000 961fb000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
900ba000 900c6300 CBDisk CBDisk.sys Wed Jan 13 04:15:41 2010 (4B4D8F3D)
82b90000 82bae000 cdd cdd.dll unavailable (00000000)
82321000 82340000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
8aede000 8af89000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b600000 8b625000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8ae9c000 8aede000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8b58f000 8b5ec000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8b1dd000 8b1e5000 compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
8f94c000 8f959000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
82346000 82353000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
9003e000 900a2000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
900a2000 900ba000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
90c0a000 90c16000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b7ed000 8b7fe000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8f993000 8f9ac000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
8235d000 8236d000 dump_arcm_x86 dump_arcm_x86.sys Thu Jun 10 04:25:52 2010 (4C10A190)
82353000 8235d000 dump_diskdump dump_diskdump.sys Mon Jul 13 19:45:49 2009 (4A5BC72D)
8236d000 8237e000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8237e000 82388000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
90108000 901bf000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
901bf000 901f8000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
921e7000 921f2000 fdc fdc.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
8b3da000 8b3eb000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b3a6000 8b3da000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b400000 8b409000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8b7bb000 8b7ed000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55)
8b959000 8b98a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82340000 82345280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
8b9f4000 8b9f4680 giveio giveio.sys Wed Apr 03 22:33:25 1996 (316334F5)
83210000 83247000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
90000000 9001f000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
9e904000 9e917000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
823ec000 823f2480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
9e8f9000 9e904000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
9615d000 961e2000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b9ec000 8b9f4000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
900f6000 90108000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
96073000 96080000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
9e94b000 9e957000 kbdhid kbdhid.sys Mon Jul 13 19:45:09 2009 (4A5BC705)
80bc4000 80bcc000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8f9ac000 8f9e0000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
8b57c000 8b58f000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8b728000 8b74d000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
9e919000 9e920d80 LHidFilt LHidFilt.Sys Thu Mar 18 04:50:19 2010 (4BA1E94B)
96117000 96127000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
9e92c000 9e933780 LMouFilt LMouFilt.Sys Thu Mar 18 04:50:27 2010 (4BA1E953)
82393000 823ae000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
9e8f3000 9e8f8580 LUsbFilt LUsbFilt.Sys Thu Mar 18 04:50:32 2010 (4BA1E958)
8ae0b000 8ae83000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
8b77a000 8b7bb000 MDFSYSNT MDFSYSNT.sys Tue May 18 10:07:00 2010 (4BF29F04)
8b39b000 8b3a6000 MDPMGRNT MDPMGRNT.sys Mon Apr 26 11:25:21 2010 (4BD5B061)
82388000 82393000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
96080000 9608d000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
9e921000 9e92c000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8b29d000 8b2b3000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
8b200000 8b223000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
9e877000 9e87fe00 MpNWMon MpNWMon.sys Sat Mar 20 00:03:24 2010 (4BA4490C)
8f823000 8f835000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
9b213000 9b236000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
9b236000 9b271000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
9b271000 9b28c000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
90c67000 90c72000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8b18f000 8b197000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b551000 8b57c000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
90c00000 90c0a000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b9dc000 8b9ec000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b633000 8b6ea000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8f818000 8f823000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
96001000 96023000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
960e1000 960f2000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
90d54000 90d62000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
90cfc000 90d2e000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
8b6ea000 8b728000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
90c72000 90c80000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
90dee000 90df8000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
83247000 83657000 nt ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
8b422000 8b551000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
8b625000 8b62c000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
921e5000 921e6040 nvBridge nvBridge.kmd Wed Jul 28 11:37:38 2010 (4C504EC2)
960f2000 9610f000 nvhda32v nvhda32v.sys Mon Jun 21 18:07:07 2010 (4C1FE28B)
9180d000 921e42e0 nvlddmkm nvlddmkm.sys Wed Jul 28 10:40:15 2010 (4C50414F)
8f8be000 8f912c80 nvm62x32 nvm62x32.sys Fri Oct 17 17:00:39 2008 (48F8FCF7)
8b2df000 8b304000 nvstor nvstor.sys Wed May 20 02:44:09 2009 (4A13A6B9)
8b35b000 8b392000 nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
90d35000 90d54000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
8b1cc000 8b1dd000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8b1a2000 8b1cc000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8b288000 8b28f000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8b28f000 8b29d000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b5ec000 8b5fa000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9b2a6000 9b33d000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
8f964000 8f993000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
8ae83000 8ae94000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8f800000 8f818000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
96023000 9603b000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
9603b000 96052000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
96052000 96069000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
90dad000 90dee000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
96069000 96073000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
90c4f000 90c57000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
90c57000 90c5f000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
90c5f000 90c67000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8b74d000 8b77a000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
96127000 9613a000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8200e000 823209c0 RTKVHDA RTKVHDA.sys Tue Nov 02 07:18:52 2010 (4CCFF39C)
90d9f000 90daca60 SCDEmu SCDEmu.SYS Mon Apr 12 04:44:34 2010 (4BC2DD72)
8b121000 8b147000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
9b33d000 9b347000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
921f2000 921fc000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
90d62000 90d7c000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
8b9da000 8b9db480 speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
8b9d2000 8b9da000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
8b025000 8b118000 sptd sptd.sys Sun Oct 11 16:54:02 2009 (4AD245EA)
9e826000 9e877000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
9b375000 9b3c4000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
9b347000 9b368000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
8b304000 8b34b000 storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
9608d000 9608e380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8b810000 8b959000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
9b368000 9b375000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
90c97000 90ca2000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
90c80000 90c97000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
90d8f000 90d9f000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
82b60000 82b69000 TSDDD TSDDD.dll unavailable (00000000)
900d5000 900f6000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
9608f000 9609d000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
9e934000 9e94b000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
9e917000 9e918700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8f883000 8f892000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
9609d000 960e1000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
91800000 9180a000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8f838000 8f883000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
8b197000 8b1a2000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8b223000 8b22f000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
90c21000 90c42000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8b98a000 8b992380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
8b1f0000 8b200000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b23d000 8b288000 volmgrx volmgrx.sys unavailable (00000000)
8b993000 8b9d2000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8f959000 8f963b80 vrtaucbl vrtaucbl.sys Mon Feb 15 12:07:04 2010 (4B797F38)
90d7c000 90d8f000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
90c42000 90c4f000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8af89000 8affa000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8b017000 8b025000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
90d2e000 90d35000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
82900000 82b4b000 win32k win32k.sys unavailable (00000000)
8b118000 8b121000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
823ae000 823c8000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
Unloaded modules:
823f5000 823fd000 LHidFilt.Sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9610f000 96117000 LMouFilt.Sys
Timestamp: unavailable (00000000)
Checksum: 00000000
823c8000 823ce000 LUsbFilt.Sys
Timestamp: unavailable (00000000)
Checksum: 00000000
823f3000 823f5000 USBD.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
823d9000 823ec000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
823ce000 823d9000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
82000000 8200b000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9613a000 96151000 usbccgp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
96151000 9615d000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9e880000 9e8ea000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9b2a4000 9b2a6000 SOFTLOK.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
9b28c000 9b2a4000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8b800000 8b80d000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8b9f5000 8b9ff000 dump_scsipor
Timestamp: unavailable (00000000)
Checksum: 00000000
8b409000 8b419000 dump_arcm_x8
Timestamp: unavailable (00000000)
Checksum: 00000000
8b3eb000 8b3fc000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
8b200000 8b21f000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000