Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062510-25802-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`0329ce50
Debug session time: Fri Jun 25 18:51:50.007 2010 (UTC - 7:00)
System Uptime: 0 days 1:12:01.723
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa000a50a2f0, 2, 1, fffff800030d470c}
Unable to load image avgtdia.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdia.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdia.sys
Probably caused by : avgtdia.sys ( avgtdia+8be6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa000a50a2f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030d470c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800033070e0
fffffa000a50a2f0
CURRENT_IRQL: 2
FAULTING_IP:
nt!ObfDereferenceObject+2c
fffff800`030d470c f0480fc11f lock xadd qword ptr [rdi],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88004db2270 -- (.trap 0xfffff88004db2270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa000a50a320
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030d470c rsp=fffff88004db2400 rbp=ffffffffffffffff
r8=fffff8000305f000 r9=0000000000000000 r10=fffffa800a79a700
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x2c:
fffff800`030d470c f0480fc11f lock xadd qword ptr [rdi],rbx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030ceb69 to fffff800030cf600
STACK_TEXT:
fffff880`04db2128 fffff800`030ceb69 : 00000000`0000000a fffffa00`0a50a2f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`04db2130 fffff800`030cd7e0 : 00000000`00000001 ffffffff`ffffffff fffffa80`08285d02 fffffa80`08f05500 : nt!KiBugCheckDispatch+0x69
fffff880`04db2270 fffff800`030d470c : 00000000`00000000 fffff880`04db2400 00000000`00000000 fffff880`04db2410 : nt!KiPageFault+0x260
fffff880`04db2400 fffff880`03f2e686 : ffffffff`ffffffff fffffa80`0a979000 00000000`00000014 fffffa80`09c63790 : nt!ObfDereferenceObject+0x2c
fffff880`04db2460 fffff880`03f2e60a : 00000000`00000000 fffffa80`0a979000 fffff880`0196d9a0 fffff880`03f2e6e5 : afd!AfdDerefPollInfoFileObjects+0x36
fffff880`04db2490 fffff880`03f23448 : 00000000`00000000 00000000`00000000 fffffa80`09c63790 00000000`00000001 : afd!AfdCompletePollIrp+0x9a
fffff880`04db24e0 fffff880`03f4af5f : fffffa80`0a979f68 00000000`00000001 00000000`00000000 00000000`0000007c : afd!AfdIndicatePollEvent+0x138
fffff880`04db2530 fffff880`02d05be6 : fffffa80`0a768e90 fffff880`04db2968 fffffa80`00000c20 fffffa80`0000007c : afd!AfdBReceiveEventHandler+0x5af
fffff880`04db25f0 fffffa80`0a768e90 : fffff880`04db2968 fffffa80`00000c20 fffffa80`0000007c fffff880`0000007c : avgtdia+0x8be6
fffff880`04db25f8 fffff880`04db2968 : fffffa80`00000c20 fffffa80`0000007c fffff880`0000007c fffff880`04db26b4 : 0xfffffa80`0a768e90
fffff880`04db2600 fffffa80`00000c20 : fffffa80`0000007c fffff880`0000007c fffff880`04db26b4 fffff880`04827a02 : 0xfffff880`04db2968
fffff880`04db2608 fffffa80`0000007c : fffff880`0000007c fffff880`04db26b4 fffff880`04827a02 fffff880`04db26b8 : 0xfffffa80`00000c20
fffff880`04db2610 fffff880`0000007c : fffff880`04db26b4 fffff880`04827a02 fffff880`04db26b8 fffffa80`0a66ce30 : 0xfffffa80`0000007c
fffff880`04db2618 fffff880`04db26b4 : fffff880`04827a02 fffff880`04db26b8 fffffa80`0a66ce30 fffff880`03f4a9b0 : 0xfffff880`0000007c
fffff880`04db2620 fffff880`04827a02 : fffff880`04db26b8 fffffa80`0a66ce30 fffff880`03f4a9b0 00000000`0000007c : 0xfffff880`04db26b4
fffff880`04db2628 fffff880`04db26b8 : fffffa80`0a66ce30 fffff880`03f4a9b0 00000000`0000007c fffff880`04827a02 : 0xfffff880`04827a02
fffff880`04db2630 fffffa80`0a66ce30 : fffff880`03f4a9b0 00000000`0000007c fffff880`04827a02 fffff880`02d05b10 : 0xfffff880`04db26b8
fffff880`04db2638 fffff880`03f4a9af : 00000000`0000007c fffff880`04827a02 fffff880`02d05b10 fffff880`04db27d0 : 0xfffffa80`0a66ce30
fffff880`04db2640 00000000`00000001 : fffffa80`07c6f110 fffffa80`07767010 fffffa80`07862d38 fffffa80`09797080 : afd!AfdRestartConnect+0x24f
fffff880`04db26c0 fffffa80`07c6f110 : fffffa80`07767010 fffffa80`07862d38 fffffa80`09797080 fffffa80`0a51cd30 : 0x1
fffff880`04db26c8 fffffa80`07767010 : fffffa80`07862d38 fffffa80`09797080 fffffa80`0a51cd30 00000000`00000000 : 0xfffffa80`07c6f110
fffff880`04db26d0 fffffa80`07862d38 : fffffa80`09797080 fffffa80`0a51cd30 00000000`00000000 00000000`00000000 : 0xfffffa80`07767010
fffff880`04db26d8 fffffa80`09797080 : fffffa80`0a51cd30 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`07862d38
fffff880`04db26e0 fffffa80`0a51cd30 : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`00000000 : 0xfffffa80`09797080
fffff880`04db26e8 00000000`00000000 : 00000000`00000000 00000000`00000001 fffffa80`00000000 00000000`00000020 : 0xfffffa80`0a51cd30
STACK_COMMAND: kb
FOLLOWUP_IP:
avgtdia+8be6
fffff880`02d05be6 ?? ???
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: avgtdia+8be6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avgtdia
IMAGE_NAME: avgtdia.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bd4af8f
FAILURE_BUCKET_ID: X64_0xA_avgtdia+8be6
BUCKET_ID: X64_0xA_avgtdia+8be6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062110-30030-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0301c000 PsLoadedModuleList = 0xfffff800`03259e50
Debug session time: Mon Jun 21 15:13:29.671 2010 (UTC - 7:00)
System Uptime: 0 days 3:37:06.983
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff820039a25a0, 0, fffff80003387bc6, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!RtlEqualUnicodeString+26 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff820039a25a0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80003387bc6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c40e0
fffff820039a25a0
FAULTING_IP:
nt!RtlEqualUnicodeString+26
fffff800`03387bc6 488b02 mov rax,qword ptr [rdx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: taskhost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880095106b0 -- (.trap 0xfffff880095106b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000e rbx=0000000000000000 rcx=fffff88009510950
rdx=fffff820039a25a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003387bc6 rsp=fffff88009510840 rbp=00000000189ebd7e
r8=0000000000000001 r9=fffff8a00c98bab0 r10=000000000000000e
r11=fffff8a00c98babe r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlEqualUnicodeString+0x26:
fffff800`03387bc6 488b02 mov rax,qword ptr [rdx] ds:fffff820`039a25a0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000310b801 to fffff8000308c600
STACK_TEXT:
fffff880`09510548 fffff800`0310b801 : 00000000`00000050 fffff820`039a25a0 00000000`00000000 fffff880`095106b0 : nt!KeBugCheckEx
fffff880`09510550 fffff800`0308a6ee : 00000000`00000000 fffff8a0`04accbd0 fffff8a0`00010500 fffff8a0`0544c940 : nt! ?? ::FNODOBFM::`string'+0x40ecb
fffff880`095106b0 fffff800`03387bc6 : fffff8a0`015cbf60 fffff800`033874cb 00000000`06cb888e fffff8a0`0000cb70 : nt!KiPageFault+0x16e
fffff880`09510840 fffff800`033874cb : 00000000`06cb888e fffff8a0`0000cb70 fffff8a0`00004900 fffffa80`0a956660 : nt!RtlEqualUnicodeString+0x26
fffff880`09510850 fffff800`0338698f : 00000000`00000040 fffff880`09510950 fffffa80`08f3a801 00000000`00000001 : nt!ObpLookupDirectoryEntry+0x19b
fffff880`095108b0 fffff800`0338bb76 : fffffa80`08f3a690 fffff880`09510a30 fffffa80`00000040 fffffa80`06a40360 : nt!ObpLookupObjectName+0x4b0
fffff880`095109b0 fffff800`03392887 : 00000000`000007ff 00000000`00000001 fffffa80`0a958201 00000000`00000180 : nt!ObOpenObjectByName+0x306
fffff880`09510a80 fffff800`033ab5b4 : 00000000`00e9ed00 fffff8a0`00100080 fffff8a0`0eb1ba30 00000000`00e9ed50 : nt!IopCreateFile+0x2b7
fffff880`09510b20 fffff800`0308b853 : fffffa80`0ac72060 00000000`00000001 fffffa80`0a956660 fffff800`033a33b4 : nt!NtOpenFile+0x58
fffff880`09510bb0 00000000`77b801ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00e9ecb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b801ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlEqualUnicodeString+26
fffff800`03387bc6 488b02 mov rax,qword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlEqualUnicodeString+26
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x50_nt!RtlEqualUnicodeString+26
BUCKET_ID: X64_0x50_nt!RtlEqualUnicodeString+26
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp5_Minidump.zip\062210-24024-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`0301a000 PsLoadedModuleList = 0xfffff800`03257e50
Debug session time: Tue Jun 22 16:01:56.112 2010 (UTC - 7:00)
System Uptime: 0 days 9:58:55.883
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8200342da20, 0, fffff880012d2c50, 5}
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+227 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8200342da20, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012d2c50, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c20e0
fffff8200342da20
FAULTING_IP:
Ntfs!NtfsFindPrefixHashEntry+227
fffff880`012d2c50 498b7c2418 mov rdi,qword ptr [r12+18h]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: GUI.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880087297c0 -- (.trap 0xfffff880087297c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000054 rbx=0000000000000000 rcx=000000000000035e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012d2c50 rsp=fffff88008729950 rbp=0000000000000000
r8=00000000188f99af r9=0000000000000000 r10=0000000000000006
r11=fffff88008729998 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Ntfs!NtfsFindPrefixHashEntry+0x227:
fffff880`012d2c50 498b7c2418 mov rdi,qword ptr [r12+18h] ds:00d8:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003109801 to fffff8000308a600
STACK_TEXT:
fffff880`08729658 fffff800`03109801 : 00000000`00000050 fffff820`0342da20 00000000`00000000 fffff880`087297c0 : nt!KeBugCheckEx
fffff880`08729660 fffff800`030886ee : 00000000`00000000 fffff8a0`03977320 00000000`00000000 fffff8a0`0489b010 : nt! ?? ::FNODOBFM::`string'+0x40ecb
fffff880`087297c0 fffff880`012d2c50 : fffff880`07929aa0 fffff8a0`001fd640 fffffa80`07c0f180 00000000`00000080 : nt!KiPageFault+0x16e
fffff880`08729950 fffff880`012d3ce2 : fffffa80`06b48010 fffffa80`07c10350 fffff8a0`001fd640 00000000`00000701 : Ntfs!NtfsFindPrefixHashEntry+0x227
fffff880`08729a80 fffff880`012ce28d : fffffa80`06b48010 fffffa80`071268a0 fffff880`08729c60 fffff880`08729ca8 : Ntfs!NtfsFindStartingNode+0x452
fffff880`08729b50 fffff880`01237c0d : fffffa80`06b48010 fffffa80`071268a0 fffff880`07929aa0 fffffa80`0a273900 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`08729d30 fffff800`03082487 : fffff880`07929a10 00000000`7efd7000 00000000`7efd5000 00000000`032cff88 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`08729d60 fffff800`03082441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`079298e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsFindPrefixHashEntry+227
fffff880`012d2c50 498b7c2418 mov rdi,qword ptr [r12+18h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Ntfs!NtfsFindPrefixHashEntry+227
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x50_Ntfs!NtfsFindPrefixHashEntry+227
BUCKET_ID: X64_0x50_Ntfs!NtfsFindPrefixHashEntry+227
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
fffff880`02daf000 fffff880`02ded000 1394ohci 1394ohci.sys Mon Jul 13 17:07:12 2009 (4A5BCC30)
fffff880`01000000 fffff880`01057000 ACPI ACPI.sys Mon Jul 13 16:19:34 2009 (4A5BC106)
fffff880`03ead000 fffff880`03f37000 afd afd.sys Mon Jul 13 16:21:40 2009 (4A5BC184)
fffff880`02c6b000 fffff880`02c81000 AgileVpn AgileVpn.sys Mon Jul 13 17:10:24 2009 (4A5BCCF0)
fffff880`06e31000 fffff880`06e39000 ALSysIO64 ALSysIO64.sys Sun Apr 19 12:41:04 2009 (49EB7E50)
fffff880`04000000 fffff880`04015000 amdppm amdppm.sys Mon Jul 13 16:19:25 2009 (4A5BC0FD)
fffff880`00fd5000 fffff880`00fe0000 amdxata amdxata.sys Tue May 19 10:56:59 2009 (4A12F2EB)
fffff880`06e4c000 fffff880`06e53000 AODDriver AODDriver.sys Sun Oct 12 21:38:55 2008 (48F2D0DF)
fffff880`06ec4000 fffff880`06ecf000 asyncmac asyncmac.sys Mon Jul 13 17:10:13 2009 (4A5BCCE5)
fffff880`00ead000 fffff880`00eb6000 atapi atapi.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`00eb6000 fffff880`00ee0000 ataport ataport.SYS Mon Jul 13 16:19:52 2009 (4A5BC118)
fffff880`015e1000 fffff880`015e9000 AtiPcie AtiPcie.sys Tue May 05 08:00:22 2009 (4A005486)
fffff880`06728000 fffff880`06777000 atksgt atksgt.sys Sun May 17 06:36:34 2009 (4A1012E2)
fffff880`0417f000 fffff880`041c6000 avgldx64 avgldx64.sys Wed Feb 10 20:52:31 2010 (4B737EFF)
fffff880`04177000 fffff880`0417e080 avgmfx64 avgmfx64.sys Sun Apr 25 14:06:15 2010 (4BD4AEC7)
fffff880`02d19000 fffff880`02d6a000 avgtdia avgtdia.sys Sun Apr 25 14:09:35 2010 (4BD4AF8F)
fffff880`0121f000 fffff880`01226000 Beep Beep.SYS Mon Jul 13 17:00:13 2009 (4A5BCA8D)
fffff880`04166000 fffff880`04177000 blbdrive blbdrive.sys Mon Jul 13 16:35:59 2009 (4A5BC4DF)
fffff880`053a8000 fffff880`053c6000 bowser bowser.sys Mon Jul 13 16:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000 cdd cdd.dll Mon Jul 13 18:25:40 2009 (4A5BDE94)
fffff880`05f8e000 fffff880`05fab000 cdfs cdfs.sys Mon Jul 13 16:19:46 2009 (4A5BC112)
fffff880`00c00000 fffff880`00c2a000 cdrom cdrom.sys Mon Jul 13 16:19:54 2009 (4A5BC11A)
fffff880`00cd8000 fffff880`00d98000 CI CI.dll Mon Jul 13 18:32:13 2009 (4A5BE01D)
fffff880`013c9000 fffff880`013f9000 CLASSPNP CLASSPNP.SYS Mon Jul 13 16:19:58 2009 (4A5BC11E)
fffff880`00c7a000 fffff880`00cd8000 CLFS CLFS.SYS Mon Jul 13 16:19:57 2009 (4A5BC11D)
fffff880`014cd000 fffff880`01540000 cng cng.sys Mon Jul 13 16:49:40 2009 (4A5BC814)
fffff880`040b2000 fffff880`040c2000 CompositeBus CompositeBus.sys Mon Jul 13 17:00:33 2009 (4A5BCAA1)
fffff880`05c3d000 fffff880`05c4b000 crashdmp crashdmp.sys Mon Jul 13 17:01:01 2009 (4A5BCABD)
fffff880`040c5000 fffff880`04148000 csc csc.sys Mon Jul 13 16:24:26 2009 (4A5BC22A)
fffff880`04148000 fffff880`04166000 dfsc dfsc.sys Mon Jul 13 16:23:44 2009 (4A5BC200)
fffff880`03e7c000 fffff880`03e8b000 discache discache.sys Mon Jul 13 16:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000 disk disk.sys Mon Jul 13 16:19:57 2009 (4A5BC11D)
fffff880`05f66000 fffff880`05f88000 drmk drmk.sys Mon Jul 13 18:01:25 2009 (4A5BD8E5)
fffff880`05c57000 fffff880`05c60000 dump_atapi dump_atapi.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`05c4b000 fffff880`05c57000 dump_ataport dump_ataport.sys Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`05c60000 fffff880`05c73000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 16:21:51 2009 (4A5BC18F)
fffff880`05c73000 fffff880`05c7f000 Dxapi Dxapi.sys Mon Jul 13 16:38:28 2009 (4A5BC574)
fffff880`14a89000 fffff880`14b7d000 dxgkrnl dxgkrnl.sys Thu Oct 01 18:00:14 2009 (4AC5509E)
fffff880`14b7d000 fffff880`14bc3000 dxgmms1 dxgmms1.sys Mon Jul 13 16:38:32 2009 (4A5BC578)
fffff880`052aa000 fffff880`052e0000 fastfat fastfat.SYS Mon Jul 13 16:23:28 2009 (4A5BC1F0)
fffff880`04099000 fffff880`040a6000 fdc fdc.sys Mon Jul 13 17:00:54 2009 (4A5BCAB6)
fffff880`00fe0000 fffff880`00ff4000 fileinfo fileinfo.sys Mon Jul 13 16:34:25 2009 (4A5BC481)
fffff880`05272000 fffff880`0527d000 flpydisk flpydisk.sys Mon Jul 13 17:00:54 2009 (4A5BCAB6)
fffff880`00d98000 fffff880`00de4000 fltmgr fltmgr.sys Mon Jul 13 16:19:59 2009 (4A5BC11F)
fffff880`01551000 fffff880`0155b000 Fs_Rec Fs_Rec.sys Mon Jul 13 16:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Fri Sep 25 19:34:26 2009 (4ABD7DB2)
fffff880`0168b000 fffff880`016d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 16:21:08 2009 (4A5BC164)
fffff880`06e39000 fffff880`06e42000 gdrv gdrv.sys Thu Mar 12 20:22:29 2009 (49B9D175)
fffff880`06e42000 fffff880`06e4c000 GVTDrv64 GVTDrv64.sys Tue Sep 05 00:10:02 2006 (44FD22CA)
fffff800`035f6000 fffff800`0363f000 hal hal.dll Mon Jul 13 18:27:36 2009 (4A5BDF08)
fffff880`04075000 fffff880`04099000 HDAudBus HDAudBus.sys Mon Jul 13 17:06:13 2009 (4A5BCBF5)
fffff880`05c00000 fffff880`05c19000 HIDCLASS HIDCLASS.SYS Mon Jul 13 17:06:21 2009 (4A5BCBFD)
fffff880`05c19000 fffff880`05c21080 HIDPARSE HIDPARSE.SYS Mon Jul 13 17:06:17 2009 (4A5BCBF9)
fffff880`05fe3000 fffff880`05ff1000 hidusb hidusb.sys Mon Jul 13 17:06:22 2009 (4A5BCBFE)
fffff880`052e0000 fffff880`053a8000 HTTP HTTP.sys Mon Jul 13 16:22:16 2009 (4A5BC1A8)
fffff880`016d5000 fffff880`016de000 hwpolicy hwpolicy.sys Mon Jul 13 16:19:22 2009 (4A5BC0FA)
fffff880`00e73000 fffff880`00e93000 jraid jraid.sys Wed Oct 07 04:26:03 2009 (4ACC7ACB)
fffff880`04566000 fffff880`04575000 kbdclass kbdclass.sys Mon Jul 13 16:19:50 2009 (4A5BC116)
fffff880`05c22000 fffff880`05c30000 kbdhid kbdhid.sys Mon Jul 13 17:00:20 2009 (4A5BCA94)
fffff800`00b9f000 fffff800`00ba9000 kdcom kdcom.dll Mon Jul 13 18:31:07 2009 (4A5BDFDB)
fffff880`04400000 fffff880`04443000 ks ks.sys Mon Jul 13 17:00:31 2009 (4A5BCA9F)
fffff880`014b3000 fffff880`014cd000 ksecdd ksecdd.sys Mon Jul 13 16:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000 ksecpkg ksecpkg.sys Thu Dec 10 23:03:32 2009 (4B21E0B4)
fffff880`05f88000 fffff880`05f8d200 ksthunk ksthunk.sys Mon Jul 13 17:00:19 2009 (4A5BCA93)
fffff880`06777000 fffff880`06784000 lirsgt lirsgt.sys Sun May 17 06:06:57 2009 (4A100BF1)
fffff880`05cd1000 fffff880`05ce6000 lltdio lltdio.sys Mon Jul 13 17:08:50 2009 (4A5BCC92)
fffff880`05c8d000 fffff880`05cb0000 luafv luafv.sys Mon Jul 13 16:26:13 2009 (4A5BC295)
fffff880`04584000 fffff880`045c0880 mcdbus mcdbus.sys Tue Feb 24 03:34:07 2009 (49A3CD1F)
fffff880`00c59000 fffff880`00c66000 mcupdate mcupdate.dll Mon Jul 13 18:29:09 2009 (4A5BDF65)
fffff880`05c7f000 fffff880`05c8d000 monitor monitor.sys Mon Jul 13 16:38:52 2009 (4A5BC58C)
fffff880`04575000 fffff880`04584000 mouclass mouclass.sys Mon Jul 13 16:19:50 2009 (4A5BC116)
fffff880`05c30000 fffff880`05c3d000 mouhid mouhid.sys Mon Jul 13 17:00:20 2009 (4A5BCA94)
fffff880`00e93000 fffff880`00ead000 mountmgr mountmgr.sys Mon Jul 13 16:19:54 2009 (4A5BC11A)
fffff880`053c6000 fffff880`053de000 mpsdrv mpsdrv.sys Mon Jul 13 17:08:25 2009 (4A5BCC79)
fffff880`0446c000 fffff880`04499000 mrxsmb mrxsmb.sys Sat Feb 27 00:52:19 2010 (4B88CF33)
fffff880`066b7000 fffff880`06705000 mrxsmb10 mrxsmb10.sys Sat Feb 27 00:52:28 2010 (4B88CF3C)
fffff880`06705000 fffff880`06728000 mrxsmb20 mrxsmb20.sys Sat Feb 27 00:52:26 2010 (4B88CF3A)
fffff880`00ee0000 fffff880`00eeb000 msahci msahci.sys Mon Jul 13 17:01:01 2009 (4A5BCABD)
fffff880`02cd2000 fffff880`02cdd000 Msfs Msfs.SYS Mon Jul 13 16:19:47 2009 (4A5BC113)
fffff880`01057000 fffff880`01061000 msisadrv msisadrv.sys Mon Jul 13 16:19:26 2009 (4A5BC0FE)
fffff880`01455000 fffff880`014b3000 msrpc msrpc.sys Mon Jul 13 16:21:32 2009 (4A5BC17C)
fffff880`03e71000 fffff880`03e7c000 mssmbios mssmbios.sys Mon Jul 13 16:31:10 2009 (4A5BC3BE)
fffff880`017ec000 fffff880`017fe000 mup mup.sys Mon Jul 13 16:23:45 2009 (4A5BC201)
fffff880`016e2000 fffff880`017d4000 ndis ndis.sys Mon Jul 13 16:21:40 2009 (4A5BC184)
fffff880`044ca000 fffff880`044d6000 ndistapi ndistapi.sys Mon Jul 13 17:10:00 2009 (4A5BCCD8)
fffff880`044d6000 fffff880`04505000 ndiswan ndiswan.sys Mon Jul 13 17:10:11 2009 (4A5BCCE3)
fffff880`0527d000 fffff880`05292000 NDProxy NDProxy.SYS Mon Jul 13 17:10:05 2009 (4A5BCCDD)
fffff880`03f66000 fffff880`03f75000 netbios netbios.sys Mon Jul 13 17:09:26 2009 (4A5BCCB6)
fffff880`02d6a000 fffff880`02daf000 netbt netbt.sys Mon Jul 13 16:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000 NETIO NETIO.SYS Mon Jul 13 16:21:46 2009 (4A5BC18A)
fffff880`02cdd000 fffff880`02cee000 Npfs Npfs.SYS Mon Jul 13 16:19:48 2009 (4A5BC114)
fffff880`03e65000 fffff880`03e71000 nsiproxy nsiproxy.sys Mon Jul 13 16:21:02 2009 (4A5BC15E)
fffff800`0301a000 fffff800`035f6000 nt ntkrnlmp.exe Sat Feb 27 00:55:23 2010 (4B88CFEB)
fffff880`01226000 fffff880`013c9000 Ntfs Ntfs.sys Mon Jul 13 16:20:47 2009 (4A5BC14F)
fffff880`00ff4000 fffff880`00ffd000 Null Null.SYS Mon Jul 13 16:19:37 2009 (4A5BC109)
fffff880`04455000 fffff880`0446c000 nusb3hub nusb3hub.sys Fri Nov 20 03:15:57 2009 (4B066C5D)
fffff880`14bc3000 fffff880`14bf3000 nusb3xhc nusb3xhc.sys Fri Nov 20 03:16:01 2009 (4B066C61)
fffff880`14a87000 fffff880`14a88180 nvBridge nvBridge.kmd Mon Jun 07 15:07:11 2010 (4C0D6D8F)
fffff880`13e19000 fffff880`14a86c80 nvlddmkm nvlddmkm.sys Mon Jun 07 15:16:55 2010 (4C0D6FD7)
fffff880`03f40000 fffff880`03f66000 pacer pacer.sys Mon Jul 13 17:09:41 2009 (4A5BCCC5)
fffff880`03e8b000 fffff880`03ea8000 parport parport.sys Mon Jul 13 17:00:40 2009 (4A5BCAA8)
fffff880`0106e000 fffff880`01083000 partmgr partmgr.sys Mon Jul 13 16:19:58 2009 (4A5BC11E)
fffff880`00fa2000 fffff880`00fd5000 pci pci.sys Mon Jul 13 16:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000 pciide pciide.sys Mon Jul 13 16:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000 PCIIDEX PCIIDEX.SYS Mon Jul 13 16:19:48 2009 (4A5BC114)
fffff880`01540000 fffff880`01551000 pcw pcw.sys Mon Jul 13 16:19:27 2009 (4A5BC0FF)
fffff880`06600000 fffff880`066a6000 peauth peauth.sys Mon Jul 13 18:01:19 2009 (4A5BD8DF)
fffff880`05f29000 fffff880`05f66000 portcls portcls.sys Mon Jul 13 17:06:27 2009 (4A5BCC03)
fffff880`00c66000 fffff880`00c7a000 PSHED PSHED.dll Mon Jul 13 18:32:23 2009 (4A5BE027)
fffff880`044a6000 fffff880`044ca000 rasl2tp rasl2tp.sys Mon Jul 13 17:10:11 2009 (4A5BCCE3)
fffff880`04505000 fffff880`04520000 raspppoe raspppoe.sys Mon Jul 13 17:10:17 2009 (4A5BCCE9)
fffff880`04520000 fffff880`04541000 raspptp raspptp.sys Mon Jul 13 17:10:18 2009 (4A5BCCEA)
fffff880`04541000 fffff880`0455b000 rassstp rassstp.sys Mon Jul 13 17:10:25 2009 (4A5BCCF1)
fffff880`03e14000 fffff880`03e65000 rdbss rdbss.sys Mon Jul 13 16:24:09 2009 (4A5BC219)
fffff880`0455b000 fffff880`04566000 rdpbus rdpbus.sys Mon Jul 13 17:17:46 2009 (4A5BCEAA)
fffff880`02cb7000 fffff880`02cc0000 RDPCDD RDPCDD.sys Mon Jul 13 17:16:34 2009 (4A5BCE62)
fffff880`02cc0000 fffff880`02cc9000 rdpencdd rdpencdd.sys Mon Jul 13 17:16:34 2009 (4A5BCE62)
fffff880`02cc9000 fffff880`02cd2000 rdprefmp rdprefmp.sys Mon Jul 13 17:16:35 2009 (4A5BCE63)
fffff880`015a7000 fffff880`015e1000 rdyboost rdyboost.sys Mon Jul 13 16:34:34 2009 (4A5BC48A)
fffff880`05292000 fffff880`052aa000 rspndr rspndr.sys Mon Jul 13 17:08:50 2009 (4A5BCC92)
fffff880`0401e000 fffff880`04075000 Rt64win7 Rt64win7.sys Mon Mar 22 02:57:14 2010 (4BA73EFA)
fffff880`05cea000 fffff880`05f28580 RTKVHD64 RTKVHD64.sys Fri Apr 30 02:05:58 2010 (4BDA9D76)
fffff880`05ff1000 fffff880`05ffd000 RtNdPt60 RtNdPt60.sys Sun Jul 19 19:27:32 2009 (4A63D614)
fffff880`011b7000 fffff880`011e6000 SCSIPORT SCSIPORT.SYS Mon Jul 13 17:01:04 2009 (4A5BCAC0)
fffff880`066a6000 fffff880`066b1000 secdrv secdrv.SYS Wed Sep 13 06:18:38 2006 (4508052E)
fffff880`040a6000 fffff880`040b2000 serenum serenum.sys Mon Jul 13 17:00:33 2009 (4A5BCAA1)
fffff880`03f75000 fffff880`03f92000 serial serial.sys Mon Jul 13 17:00:40 2009 (4A5BCAA8)
fffff880`017e4000 fffff880`017ec000 spldr spldr.sys Mon May 11 09:56:27 2009 (4A0858BB)
fffff880`01087000 fffff880`011ae000 spvp spvp.sys Wed Apr 07 18:29:00 2010 (4BBD315C)
fffff880`06f5a000 fffff880`06ff2000 srv srv.sys Tue Dec 08 01:32:55 2009 (4B1E0F37)
fffff880`06ef1000 fffff880`06f5a000 srv2 srv2.sys Mon Jul 13 16:25:02 2009 (4A5BC24E)
fffff880`06784000 fffff880`067b1000 srvnet srvnet.sys Tue Dec 08 01:32:26 2009 (4B1E0F1A)
fffff880`045c1000 fffff880`045c2480 swenum swenum.sys Mon Jul 13 17:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000 tcpip tcpip.sys Mon Jul 13 16:25:34 2009 (4A5BC26E)
fffff880`067b1000 fffff880`067c3000 tcpipreg tcpipreg.sys Mon Jul 13 17:09:49 2009 (4A5BCCCD)
fffff880`02d0c000 fffff880`02d19000 TDI TDI.SYS Mon Jul 13 16:21:18 2009 (4A5BC16E)
fffff880`02cee000 fffff880`02d0c000 tdx tdx.sys Mon Jul 13 16:21:15 2009 (4A5BC16B)
fffff880`03e00000 fffff880`03e14000 termdd termdd.sys Mon Jul 13 17:16:36 2009 (4A5BCE64)
fffff960`004f0000 fffff960`004fa000 TSDDD TSDDD.dll Mon Jul 13 17:16:34 2009 (4A5BCE62)
fffff880`041c6000 fffff880`041ec000 tunnel tunnel.sys Mon Jul 13 17:09:37 2009 (4A5BCCC1)
fffff880`04443000 fffff880`04455000 umbus umbus.sys Mon Jul 13 17:06:56 2009 (4A5BCC20)
fffff880`05fc6000 fffff880`05fe3000 usbccgp usbccgp.sys Mon Jul 13 17:06:45 2009 (4A5BCC15)
fffff880`14bf3000 fffff880`14bf4f00 USBD USBD.SYS Mon Jul 13 17:06:23 2009 (4A5BCBFF)
fffff880`13e00000 fffff880`13e11000 usbehci usbehci.sys Mon Jul 13 17:06:30 2009 (4A5BCC06)
fffff880`05218000 fffff880`05272000 usbhub usbhub.sys Mon Jul 13 17:07:09 2009 (4A5BCC2D)
fffff880`14bf5000 fffff880`14c00000 usbohci usbohci.sys Mon Jul 13 17:06:30 2009 (4A5BCC06)
fffff880`02c00000 fffff880`02c56000 USBPORT USBPORT.SYS Mon Jul 13 17:06:31 2009 (4A5BCC07)
fffff880`06ff2000 fffff880`06ffe000 usbprint usbprint.sys Mon Jul 13 17:38:18 2009 (4A5BD37A)
fffff880`05fab000 fffff880`05fc6000 USBSTOR USBSTOR.SYS Mon Jul 13 17:06:34 2009 (4A5BCC0A)
fffff880`01061000 fffff880`0106e000 vdrvroot vdrvroot.sys Mon Jul 13 17:01:31 2009 (4A5BCADB)
fffff880`00c2a000 fffff880`00c38000 vga vga.sys Mon Jul 13 16:38:47 2009 (4A5BC587)
fffff880`02c82000 fffff880`02ca7000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 16:38:51 2009 (4A5BC58B)
fffff880`03fad000 fffff880`03ffa000 vmm vmm.sys Sun Feb 18 01:11:21 2007 (45D80A29)
fffff880`02c56000 fffff880`02c6b000 VMNetSrv VMNetSrv.sys Wed Jan 24 05:05:46 2007 (45B74B9A)
fffff880`017d4000 fffff880`017e4000 vmstorfl vmstorfl.sys Mon Jul 13 16:42:54 2009 (4A5BC67E)
fffff880`011e6000 fffff880`011fb000 volmgr volmgr.sys Mon Jul 13 16:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 16:20:33 2009 (4A5BC141)
fffff880`0155b000 fffff880`015a7000 volsnap volsnap.sys Mon Jul 13 16:20:08 2009 (4A5BC128)
fffff880`03f92000 fffff880`03fad000 wanarp wanarp.sys Mon Jul 13 17:10:21 2009 (4A5BCCED)
fffff880`02ca7000 fffff880`02cb7000 watchdog watchdog.sys Mon Jul 13 16:37:35 2009 (4A5BC53F)
fffff880`00eef000 fffff880`00f93000 Wdf01000 Wdf01000.sys Mon Jul 13 16:22:07 2009 (4A5BC19F)
fffff880`00f93000 fffff880`00fa2000 WDFLDR WDFLDR.SYS Mon Jul 13 16:19:54 2009 (4A5BC11A)
fffff880`03f37000 fffff880`03f40000 wfplwf wfplwf.sys Mon Jul 13 17:09:26 2009 (4A5BCCB6)
fffff960`000f0000 fffff960`003ff000 win32k win32k.sys Sat May 01 08:06:30 2010 (4BDC4376)
fffff880`067c3000 fffff880`067cc000 WinFLdrv WinFLdrv.sys Wed Nov 18 06:05:58 2009 (4B03F136)
fffff880`04015000 fffff880`0401e000 wmiacpi wmiacpi.sys Mon Jul 13 16:31:02 2009 (4A5BC3B6)
fffff880`011ae000 fffff880`011b7000 WMILIB WMILIB.SYS Mon Jul 13 16:19:51 2009 (4A5BC117)
fffff880`05cb0000 fffff880`05cd1000 WudfPf WudfPf.sys Mon Jul 13 17:05:37 2009 (4A5BCBD1)
fffff880`06e00000 fffff880`06e31000 WUDFRd WUDFRd.sys Mon Jul 13 17:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`06e53000 fffff880`06ec4000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`015e9000 fffff880`015f7000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01200000 fffff880`0120c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`015f7000 fffff880`01600000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`0120c000 fffff880`0121f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
~Lordbob