Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102410-15132-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c4d000 PsLoadedModuleList = 0x82d95810
Debug session time: Sun Oct 24 09:00:02.694 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:17.489
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.....
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 001904fb
Arg2: 8d0efe20
Arg3: 8d0efa00
Arg4: 82ceab79
Debugging Details:
------------------
EXCEPTION_RECORD: 8d0efe20 -- (.exr 0xffffffff8d0efe20)
ExceptionAddress: 82ceab79 (nt!ExAcquireFastMutex+0x00000012)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00000018
Attempt to write to address 00000018
CONTEXT: 8d0efa00 -- (.cxr 0xffffffff8d0efa00)
eax=00000018 ebx=86431d00 ecx=00000001 edx=00000000 esi=00000018 edi=8d0f0058
eip=82ceab79 esp=8d0efee8 ebp=8d0f0024 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExAcquireFastMutex+0x12:
82ceab79 f00fba3000 lock btr dword ptr [eax],0 ds:0023:00000018=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 1
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 00000018
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82db5718
Unable to read MiSystemVaType memory at 82d95160
00000018
FOLLOWUP_IP:
Ntfs!NtfsLookupNtfsMcbEntry+17
8b04f883 ff7510 push dword ptr [ebp+10h]
FAULTING_IP:
nt!ExAcquireFastMutex+12
82ceab79 f00fba3000 lock btr dword ptr [eax],0
BUGCHECK_STR: 0x24
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 8b04f883 to 82ceab79
STACK_TEXT:
8d0efeec 8b04f883 8d0f0058 8633b500 863390d8 nt!ExAcquireFastMutex+0x12
8d0f0024 8b0c63fa 86431d58 8633b500 0000000d Ntfs!NtfsLookupNtfsMcbEntry+0x17
8d0f0068 8b0c54c4 86431d58 8633b500 0000000d Ntfs!LookupLcns+0x3a
8d0f01bc 8b0c4f99 86431d58 8633b500 86607be0 Ntfs!NtfsWriteLog+0x494
8d0f02b8 8b0dc042 86431d58 9844d930 8e626528 Ntfs!NtfsWriteFileSizes+0x3ec
8d0f0380 8b0e2cce 86431d58 8e626428 079bd0a8 Ntfs!NtOfsSetLength+0x41f
8d0f0420 8b0e75eb 86431d58 8e626518 079bd058 Ntfs!NtOfsPutData+0x4c
8d0f049c 8b0e435e 86431d58 97721500 9776bce8 Ntfs!NtfsWriteFcbUsnRecordToJournal+0xb2
8d0f04f8 8b0db1b7 86431d58 0608de16 86431d84 Ntfs!NtfsWriteUsnJournalChanges+0x1a8
8d0f0560 8b04eb92 86431d58 97721500 00000001 Ntfs!NtfsPostUsnChangeWithOverrideOption+0x491
8d0f0670 8b05085f 86431d58 86dd15f0 0608dd9e Ntfs!NtfsCommonWrite+0x19a9
8d0f06e8 82c894bc 86339020 86dd15f0 86dd15f0 Ntfs!NtfsFsdWrite+0x2e1
8d0f0700 8ae0620c 862e3130 86dd15f0 00000000 nt!IofCallDriver+0x63
8d0f0724 8ae063cb 8d0f0744 862e3130 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
8d0f075c 82c894bc 862e3130 86dd15f0 86dd15f0 fltmgr!FltpDispatch+0xc5
8d0f0774 82e8af6e 85ce2ad0 86dd15f0 86dd17c8 nt!IofCallDriver+0x63
8d0f0794 82e8b822 862e3130 85ce2ad0 00000001 nt!IopSynchronousServiceTail+0x1f8
8d0f0830 82c9044a 862e3130 8000024c 00000000 nt!NtWriteFile+0x6e8
8d0f0830 00000000 862e3130 8000024c 00000000 nt!KiFastCallEntry+0x12a
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsLookupNtfsMcbEntry+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45
STACK_COMMAND: .cxr 0xffffffff8d0efa00 ; kb
FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsLookupNtfsMcbEntry+17
BUCKET_ID: 0x24_Ntfs!NtfsLookupNtfsMcbEntry+17
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102410-16130-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c1f000 PsLoadedModuleList = 0x82d67810
Debug session time: Sun Oct 24 08:53:45.618 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:00.662
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 82c99276, 9c60b62c, 0}
Unable to load image \SystemRoot\system32\DRIVERS\MpFilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for MpFilter.sys
*** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
Probably caused by : MpFilter.sys ( MpFilter+ec9c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82c99276, The address that the exception occurred at
Arg3: 9c60b62c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MmUnlockPages+173
82c99276 8944242c mov dword ptr [esp+2Ch],eax
TRAP_FRAME: 9c60b62c -- (.trap 0xffffffff9c60b62c)
ErrCode = 00000002
eax=8641dbec ebx=8641dbc8 ecx=00000002 edx=00000fff esi=00000002 edi=8641dbe4
eip=82c99276 esp=9c60b6a0 ebp=9c60b6ec iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MmUnlockPages+0x173:
82c99276 8944242c mov dword ptr [esp+2Ch],eax ss:0010:9c60b6cc=82eeb055
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82c87cd8 to 82c99276
STACK_TEXT:
9c60b6ec 82c87cd8 8641dbc8 00000000 8781c488 nt!MmUnlockPages+0x173
9c60b728 8b025fd7 17624e50 90080f08 a2e15e50 nt!IopfCompleteRequest+0x2cd
9c60b7d0 9008bc9c 9c60b778 876a5274 a2e15e50 fltmgr!FltSendMessage+0x3b7
WARNING: Stack unwind information not available. Following frames may be wrong.
9c60b85c 90087bac 00000000 a2a45558 9c60b98c MpFilter+0xec9c
9c60b940 90087fdd 87958c38 9c60b98c 00000040 MpFilter+0xabac
9c60b968 8b020324 87958c38 9c60b98c 00000040 MpFilter+0xafdd
9c60b9d0 8b023512 00958bd8 87958bd8 1000000c fltmgr!FltpPerformPostCallbacks+0x24a
9c60b9e4 8b023b46 87958bd8 87c64738 9c60ba24 fltmgr!FltpProcessIoCompletion+0x10
9c60b9f4 8b02429c 86336778 87c64738 87958bd8 fltmgr!FltpPassThroughCompletion+0x98
9c60ba24 8b0378c9 9c60ba44 00000000 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x33a
9c60ba70 82c5b4bc 86336778 862e2008 879b2f0c fltmgr!FltpCreate+0x2db
9c60ba88 82e5f6ad ba49bab6 9c60bc30 00000000 nt!IofCallDriver+0x63
9c60bb60 82e4026b 862a0030 853df7a8 87760008 nt!IopParseDevice+0xed7
9c60bbdc 82e662d9 00000000 9c60bc30 00000040 nt!ObpLookupObjectName+0x4fa
9c60bc38 82e5e62b 00feec60 853df7a8 00000001 nt!ObOpenObjectByName+0x165
9c60bcb4 82e69f42 00feecbc 80100180 00feec60 nt!IopCreateFile+0x673
9c60bd00 82c6244a 00feecbc 80100180 00feec60 nt!NtCreateFile+0x34
9c60bd00 778664f4 00feecbc 80100180 00feec60 nt!KiFastCallEntry+0x12a
00feecc4 00000000 00000000 00000000 00000000 0x778664f4
STACK_COMMAND: kb
FOLLOWUP_IP:
MpFilter+ec9c
9008bc9c ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: MpFilter+ec9c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: MpFilter
IMAGE_NAME: MpFilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ba4490e
FAILURE_BUCKET_ID: 0x8E_MpFilter+ec9c
BUCKET_ID: 0x8E_MpFilter+ec9c
Followup: MachineOwner
9007d000 900a0000 MpFilter T (no symbols)
Loaded symbol image file: MpFilter.sys
Image path: \SystemRoot\system32\DRIVERS\MpFilter.sys
Image name: MpFilter.sys
Timestamp: Sat Mar 20 06:03:26 2010 (4BA4490E)
9bd0c000 9bd38000 000 000.fcl Fri Sep 26 16:11:12 2008 (48DCDF70)
833b4000 833fc000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
9013b000 90195000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
91400000 91412000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
9092c000 9093d000 amdppm amdppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
8afd6000 8afdf000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
8af07000 8af10000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8af10000 8af33000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
8ae76000 8ae81000 BATTC BATTC.SYS Tue Jul 14 02:19:15 2009 (4A5BC0F3)
900a7000 900ae000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
908fd000 9090b000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
83240000 83248000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
9273d000 92756000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
98fd0000 98fee000 cdd cdd.dll unavailable (00000000)
9005e000 9007d000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8328a000 83335000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8b200000 8b225000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
83248000 8328a000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8b22c000 8b289000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
8ae6e000 8ae76000 compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
91deb000 91df8000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
94397000 943a4000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
90881000 908e5000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
908e5000 908fd000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
90875000 90881000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8b3e7000 8b3f8000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
9435d000 94376000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
943a4000 943ae000 dump_diskdump dump_diskdump.sys Tue Jul 14 02:45:49 2009 (4A5BC72D)
943e5000 943f6000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
943ae000 943e5000 dump_nvstor32 dump_nvstor32.sys Wed Aug 05 03:27:05 2009 (4A78D1D9)
943f6000 94400000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
8fa67000 8fb1e000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
91db2000 91deb000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
9093d000 90948000 fdc fdc.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
8b052000 8b063000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
8fbf5000 8fbff000 flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
8b01e000 8b052000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
8b297000 8b2a0000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
8ae00000 8ae32000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55)
8b571000 8b5a2000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8302f000 83066000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
90800000 9081f000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
926b8000 9273d000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
8b410000 8b418000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
9096a000 90982000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
9098f000 9099c000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
80bb3000 80bbb000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
8fbb3000 8fbe7000 ks ks.sys Thu Mar 04 05:57:52 2010 (4B8F2FC0)
8b1bd000 8b1d0000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b395000 8b3ba000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6)
92695000 926a5000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
9400b000 94026000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
83224000 8322f000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
94000000 9400b000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
90982000 9098f000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8aef1000 8af07000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
9007d000 900a0000 MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
9e48c000 9e494e00 MpNWMon MpNWMon.sys Sat Mar 20 06:03:24 2010 (4BA4490C)
92756000 92768000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
92768000 9278b000 mrxsmb mrxsmb.sys Sat Feb 27 09:32:02 2010 (4B88CA72)
9278b000 927c6000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
927c6000 927e1000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
90100000 9010b000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
83209000 83211000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8b192000 8b1bd000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
9086b000 90875000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8b400000 8b410000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8b2a0000 8b357000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
8fb36000 8fb41000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
8fb41000 8fb63000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
92649000 9265a000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
901ed000 901fb000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
90195000 901c7000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
8b357000 8b395000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
9010b000 90119000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
90861000 9086b000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
82c1f000 8302f000 nt ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
8b063000 8b192000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
900a0000 900a7000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
91db0000 91db1040 nvBridge nvBridge.kmd Fri Oct 08 09:50:24 2010 (4CAEBF30)
94376000 94397000 nvhda32v nvhda32v.sys Tue Sep 07 23:08:20 2010 (4C869BB4)
9141a000 91daf420 nvlddmkm nvlddmkm.sys Fri Oct 08 09:52:05 2010 (4CAEBF95)
8fa20000 8fa66700 nvm62x32 nvm62x32.sys Thu Nov 12 01:16:22 2009 (4AFB45C6)
8af33000 8af58000 nvstor nvstor.sys Wed May 20 09:44:09 2009 (4A13A6B9)
8af9f000 8afd6000 nvstor32 nvstor32.sys Wed Aug 05 03:27:05 2009 (4A78D1D9)
901ce000 901ed000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
90952000 9096a000 parport parport.sys Tue Jul 14 02:45:34 2009 (4A5BC71E)
8ae5d000 8ae6e000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
94026000 9402d000 parvdm parvdm.sys Tue Jul 14 02:45:29 2009 (4A5BC719)
8ae33000 8ae5d000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
8aedc000 8aee3000 pciide pciide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
8aee3000 8aef1000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b289000 8b297000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
9bc3d000 9bcd4000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
9432e000 9435d000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
8322f000 83240000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8fb1e000 8fb36000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
8fb63000 8fb7b000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
8fb7b000 8fb92000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
8fb92000 8fba9000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
90820000 90861000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8fba9000 8fbb3000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
900e8000 900f0000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
900f0000 900f8000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
900f8000 90100000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8b3ba000 8b3e7000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
926a5000 926b8000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
94032000 9432d2c0 RTKVHDA RTKVHDA.sys Tue Jul 06 13:02:40 2010 (4C32FF40)
92674000 92695000 SbieDrv SbieDrv.sys Mon Oct 18 01:40:57 2010 (4CBB7B79)
8b000000 8b00da60 SCDEmu SCDEmu.SYS Mon Apr 12 11:44:34 2010 (4BC2DD72)
9bcd4000 9bcde000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
90948000 90952000 serenum serenum.sys Tue Jul 14 02:45:27 2009 (4A5BC717)
8b1d0000 8b1ea000 serial serial.sys Tue Jul 14 02:45:33 2009 (4A5BC71D)
8b5ea000 8b5f2000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
9bd87000 9bdf1000 spsys spsys.sys Mon May 11 19:37:10 2009 (4A085436)
9e43b000 9e48c000 srv srv.sys Fri Aug 27 06:31:26 2010 (4C77318E)
9bd38000 9bd87000 srv2 srv2.sys Fri Aug 27 06:30:45 2010 (4C773165)
9bcde000 9bcff000 srvnet srvnet.sys Fri Aug 27 06:30:39 2010 (4C77315F)
8af58000 8af9f000 storport storport.sys Tue Jul 14 02:45:58 2009 (4A5BC736)
91412000 91413380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
8b428000 8b571000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB)
9bcff000 9bd0c000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
90130000 9013b000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
90119000 90130000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8b1ea000 8b1fa000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
98fa0000 98fa9000 TSDDD TSDDD.dll Tue Jul 14 03:01:40 2009 (4A5BCAE4)
9090b000 9092c000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
8fbe7000 8fbf5000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
909f1000 90a00000 usbehci usbehci.sys Sat Oct 24 06:58:55 2009 (4AE27B7F)
92605000 92649000 usbhub usbhub.sys Sat Oct 24 07:00:05 2009 (4AE27BC5)
9099c000 909a6000 usbohci usbohci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
909a6000 909f1000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
83211000 8321c000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
900ae000 900ba000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
900ba000 900db000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8b5a2000 8b5aa380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8ae81000 8ae91000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8ae91000 8aedc000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8b5ab000 8b5ea000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
90000000 90013000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
900db000 900e8000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
83335000 833a6000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
833a6000 833b4000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
901c7000 901ce000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
98d40000 98f8b000 win32k win32k.sys Wed Sep 01 05:34:29 2010 (4C7DBBB5)
83200000 83209000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
9265a000 92674000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
Unloaded modules:
8b418000 8b425000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
8b5f2000 8b5fc000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
90016000 9004d000 dump_nvstor3
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00037000
9004d000 9005e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000