BugCheck 109, {a3a039d89844769f, b3b7465eeac148cd, fffff8000286dba0, 1}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
~~~~~~~~~~~~~
~~~~~~~~~~~~~
BugCheck 1A, {41284, 7fef6492001, 1cec, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )
1. Check the memory settings, attach Rammon HTML report:
PassMark RAMMon - Identify RAM type, speed & memory timings
2. Run Memtest86+ - Advanced Memory Diagnostic Tool 10 passes overnight.
Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030811-35661-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02800000 PsLoadedModuleList = 0xfffff800`02a3de50
Debug session time: Tue Mar 8 08:43:35.255 2011 (UTC - 5:00)
System Uptime: 0 days 0:05:52.019
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 34, {50830, fffff880065034a8, fffff88006502d00, fffff80002976c95}
Probably caused by : memory_corruption ( nt!MiLogPageAccess+e5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff880065034a8
Arg3: fffff88006502d00
Arg4: fffff80002976c95
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880065034a8 -- (.exr 0xfffff880065034a8)
ExceptionAddress: fffff80002976c95 (nt!MiLogPageAccess+0x00000000000000e5)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88006502d00 -- (.cxr 0xfffff88006502d00)
rax=0000000000000001 rbx=fffffa8008733000 rcx=f8a00a36dba80000
rdx=fffff6fcc0086fa8 rsi=fffffa8003853520 rdi=fffff6fcc0086fa8
rip=fffff80002976c95 rsp=fffff880065036e0 rbp=0000000000000000
r8=fffff98010df5001 r9=0000000000002eb2 r10=fffff780c0000488
r11=fffff780c0000000 r12=fa80072cc3a004c0 r13=0000000000000035
r14=fffffa8008733ff8 r15=fffff8a00a36dba8
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiLogPageAccess+0xe5:
fffff800`02976c95 410fba64243814 bt dword ptr [r12+38h],14h ds:002b:fa80072c`c3a004f8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aa80e0
ffffffffffffffff
FOLLOWUP_IP:
nt!MiLogPageAccess+e5
fffff800`02976c95 410fba64243814 bt dword ptr [r12+38h],14h
FAULTING_IP:
nt!MiLogPageAccess+e5
fffff800`02976c95 410fba64243814 bt dword ptr [r12+38h],14h
BUGCHECK_STR: 0x34
LAST_CONTROL_TRANSFER: from fffff8000281418b to fffff80002976c95
STACK_TEXT:
fffff880`065036e0 fffff800`0281418b : 00000003`00000000 00000000`00002eb2 fffffa80`03171a80 fffff880`06503968 : nt!MiLogPageAccess+0xe5
fffff880`06503730 fffff800`02b85e35 : fffff980`10df5000 fffff8a0`0a87e8b0 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x2bf68
fffff880`06503a10 fffff800`0288ad47 : 00000000`00140000 fffffa80`066f9990 00000000`00000000 00000000`00200000 : nt!CcUnmapVacb+0x5d
fffff880`06503a50 fffff800`02861ad4 : 00000000`00000001 fffffa80`081d21f0 fffffa80`06d0de00 00000000`00000000 : nt!CcUnmapVacbArray+0x1b7
fffff880`06503ae0 fffff800`0286555c : fffffa80`06d0de10 00000000`00000011 fffffa80`06d0de10 fffffa80`00000000 : nt!CcDeleteSharedCacheMap+0x140
fffff880`06503b50 fffff800`02865d60 : fffff800`02a77100 fffff880`06503c58 00000000`00000000 fffffa80`00000000 : nt!CcWriteBehind+0x5bc
fffff880`06503c00 fffff800`0287f161 : fffffa80`06747190 fffff800`02b6b504 fffff800`02a77140 fffff880`00000000 : nt!CcWorkerThread+0x1c8
fffff880`06503cb0 fffff800`02b15166 : fffff880`00000103 fffffa80`06c0d760 00000000`00000080 fffffa80`066a8890 : nt!ExpWorkerThread+0x111
fffff880`06503d40 fffff800`02850486 : fffff800`029eae80 fffffa80`06c0d760 fffff800`029f8c40 fffff880`0123dbf0 : nt!PspSystemThreadStartup+0x5a
fffff880`06503d80 00000000`00000000 : fffff880`06504000 fffff880`064fe000 fffff880`06502f30 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiLogPageAccess+e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff88006502d00 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x34_nt!MiLogPageAccess+e5
BUCKET_ID: X64_0x34_nt!MiLogPageAccess+e5
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030811-30654-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02802000 PsLoadedModuleList = 0xfffff800`02a3fe50
Debug session time: Tue Mar 8 08:48:45.818 2011 (UTC - 5:00)
System Uptime: 0 days 0:04:03.582
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 109, {a3a039d89844769f, b3b7465eeac148cd, fffff8000286dba0, 1}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d89844769f, Reserved
Arg2: b3b7465eeac148cd, Reserved
Arg3: fffff8000286dba0, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Debugging Details:
------------------
BUGCHECK_STR: 0x109
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002873f00
STACK_TEXT:
fffff880`02fef5d8 00000000`00000000 : 00000000`00000109 a3a039d8`9844769f b3b7465e`eac148cd fffff800`0286dba0 : nt!KeBugCheckEx
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8000286dbad - nt!ZwDisableLastKnownGood+d
[ 8d:89 ]
1 error : !nt (fffff8000286dbad)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030811-45973-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c57e50
Debug session time: Tue Mar 8 09:42:54.102 2011 (UTC - 5:00)
System Uptime: 0 days 0:06:21.757
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, 7fef6492001, 1cec, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000007fef6492001
Arg3: 0000000000001cec
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002adf3b3 to fffff80002a8a740
STACK_TEXT:
fffff880`0bf317e8 fffff800`02adf3b3 : 00000000`0000001a 00000000`00041284 000007fe`f6492001 00000000`00001cec : nt!KeBugCheckEx
fffff880`0bf317f0 fffff800`02afdcc3 : fffffa80`03bfacc0 4ec00001`3fe44025 000007fe`f648c000 5f400001`4e231025 : nt! ?? ::FNODOBFM::`string'+0x4a83
fffff880`0bf31830 fffff800`02abddf9 : 00000000`00000000 000007fe`f6496fff fffffa80`00000000 fffff800`02c04e80 : nt! ?? ::FNODOBFM::`string'+0x3360b
fffff880`0bf319f0 fffff800`02da1010 : fffffa80`096887f0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0bf31b10 fffff800`02da141b : 00000000`00000000 000007fe`f6480000 fffffa80`00000001 fffffa80`06807df0 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0bf31bd0 fffff800`02a89993 : fffffa80`06aa9060 fffff880`0bf31ca0 fffffa80`06a38b30 fffffa80`00008000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0bf31c20 00000000`77a7f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0017de28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a7f95a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4a83
fffff800`02adf3b3 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a83
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83
BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83
Followup: MachineOwner
---------
Drivers:
Code:
start end module name
fffff880`00f9b000 fffff880`00ff2000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b17000 fffff880`02ba1000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03dc4000 fffff880`03dda000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`039e0000 fffff880`039f5000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00d93000 fffff880`00d9e000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03a29000 fffff880`03a31000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`00cda000 fffff880`00ce3000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00d69000 fffff880`00d93000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02a6b000 fffff880`02a72000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`039cf000 fffff880`039e0000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06db8000 fffff880`06dd6000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00750000 fffff960`00777000 cdd cdd.dll unavailable (00000000)
fffff880`02a07000 fffff880`02a31000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d0b000 fffff880`00d69000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012e4000 fffff880`01357000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`03db4000 fffff880`03dc4000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`06c9e000 fffff880`06ca7000 cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`056ae000 fffff880`056bc000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0392e000 fffff880`039b1000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`039b1000 fffff880`039cf000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0391f000 fffff880`0392e000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0123a000 fffff880`01250000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0566e000 fffff880`05690000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`056c8000 fffff880`056d1000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`056bc000 fffff880`056c8000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`056d1000 fffff880`056e4000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`056e4000 fffff880`056f0000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c71000 fffff880`03d65000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`03d65000 fffff880`03dab000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`06cba000 fffff880`06cf0000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`03826000 fffff880`03833000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00dea000 fffff880`00dfe000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`04655000 fffff880`04660000 flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00d9e000 fffff880`00dea000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01368000 fffff880`01372000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01200000 fffff880`0123a000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ff7000 fffff800`03040000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03aba000 fffff880`03ade000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`03b8a000 fffff880`03be6000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`056fe000 fffff880`05717000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05717000 fffff880`0571f080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`056f0000 fffff880`056fe000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`06cf0000 fffff880`06db8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f1000 fffff880`015fa000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`051b3000 fffff880`051c2000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05767000 fffff880`05775000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc3000 fffff800`00bcd000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04600000 fffff880`04643000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`012ca000 fffff880`012e4000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05690000 fffff880`05695200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`057e2000 fffff880`057f7000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0579e000 fffff880`057c1000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`07507000 fffff880`07511000 LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
fffff880`01c05000 fffff880`01ffba80 lvuvc64 lvuvc64.sys Tue Nov 09 21:37:14 2010 (4CDA055A)
fffff880`00cea000 fffff880`00cf7000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05790000 fffff880`0579e000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`051c2000 fffff880`051d1000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05722000 fffff880`0572f000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a31000 fffff880`02a62000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`07542000 fffff880`07552000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`06dd6000 fffff880`06dee000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06c00000 fffff880`06c2d000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06c2d000 fffff880`06c7b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`06c7b000 fffff880`06c9e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02ad0000 fffff880`02adb000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0126c000 fffff880`012ca000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03914000 fffff880`0391f000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015df000 fffff880`015f1000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014e5000 fffff880`015d7000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c00000 fffff880`03c0c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03c0c000 fffff880`03c3b000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04660000 fffff880`04675000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`0385c000 fffff880`0386b000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ba1000 fffff880`02be6000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`07552000 fffff880`07567000 NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`02adb000 fffff880`02aec000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03908000 fffff880`03914000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1a000 fffff800`02ff7000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01041000 fffff880`011e4000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02a62000 fffff880`02a6b000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05185000 fffff880`05186180 nvBridge nvBridge.kmd Wed Jul 08 12:31:23 2009 (4A54C9DB)
fffff880`05696000 fffff880`056ae000 nvhda64v nvhda64v.sys Fri Jun 26 18:54:59 2009 (4A4551C3)
fffff880`04688000 fffff880`05184e00 nvlddmkm nvlddmkm.sys Wed Jul 08 13:44:06 2009 (4A54DAE6)
fffff880`03ade000 fffff880`03b2f500 nvmf6264 nvmf6264.sys Wed Jul 01 14:55:18 2009 (4A4BB116)
fffff880`03a3d000 fffff880`03a48000 nvsmu nvsmu.sys Mon Jun 29 03:36:37 2009 (4A486F05)
fffff880`03836000 fffff880`0385c000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03a0c000 fffff880`03a29000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e4a000 fffff880`00e5f000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e0a000 fffff880`00e3d000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ed0000 fffff880`00ed7000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ed7000 fffff880`00ee7000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01357000 fffff880`01368000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`072d8000 fffff880`0737e000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05631000 fffff880`0566e000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf7000 fffff880`00d0b000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03dda000 fffff880`03dfe000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03c3b000 fffff880`03c56000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`05187000 fffff880`051a8000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03c56000 fffff880`03c70000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`038b7000 fffff880`03908000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`051a8000 fffff880`051b3000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02ab5000 fffff880`02abe000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02abe000 fffff880`02ac7000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ac7000 fffff880`02ad0000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`013be000 fffff880`013f8000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05600000 fffff880`05618000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0737e000 fffff880`07389000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03a31000 fffff880`03a3d000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0386b000 fffff880`03888000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015d7000 fffff880`015df000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07567000 fffff880`075d8000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`07471000 fffff880`07507000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`07200000 fffff880`07267000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`07389000 fffff880`073b6000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03dfe000 fffff880`03dff480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`073b6000 fffff880`073c8000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b0a000 fffff880`02b17000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02aec000 fffff880`02b0a000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`038a3000 fffff880`038b7000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004c0000 fffff960`004ca000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03800000 fffff880`03826000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04643000 fffff880`04655000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05775000 fffff880`0578fc00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0574a000 fffff880`05767000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05720000 fffff880`05721f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03aa9000 fffff880`03aba000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`03b30000 fffff880`03b8a000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03a48000 fffff880`03a53000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03a53000 fffff880`03aa9000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0572f000 fffff880`0574a000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00e3d000 fffff880`00e4a000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02a72000 fffff880`02a80000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02a80000 fffff880`02aa5000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`014d5000 fffff880`014e5000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e5f000 fffff880`00e74000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01372000 fffff880`013be000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03888000 fffff880`038a3000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02aa5000 fffff880`02ab5000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ee8000 fffff880`00f8c000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8c000 fffff880`00f9b000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02be6000 fffff880`02bef000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`003a0000 win32k win32k.sys Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`03dab000 fffff880`03db4000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ff2000 fffff880`00ffb000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`057c1000 fffff880`057e2000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`07511000 fffff880`07542000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`01250000 fffff880`0125e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0125e000 fffff880`0126a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01030000 fffff880`01039000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`011e4000 fffff880`011f7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000