Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\092710-20732-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03011000 PsLoadedModuleList = 0xfffff800`0324ee50
System Uptime: 0 days 0:49:01.341
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff6fc5805d8d8, 0, fffff800030930b8, 2}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6fc5805d8d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800030930b8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b90e0
fffff6fc5805d8d8
FAULTING_IP:
nt!MiLockProtoPoolPage+38
fffff800`030930b8 4a8b3c36 mov rdi,qword ptr [rsi+r14]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: lotroclient.ex
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800c066080 -- (.trap 0xfffff8800c066080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000007ffffffff8 rbx=0000000000000000 rcx=fffff8b00bb1b048
rdx=fffff8800c066318 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030930b8 rsp=fffff8800c066210 rbp=fffff8a00c519010
r8=0000000000000000 r9=fffff8a0000c9fc0 r10=fffff8000320f600
r11=fffff8a0000c9fc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiLockProtoPoolPage+0x38:
fffff800`030930b8 4a8b3c36 mov rdi,qword ptr [rsi+r14] ds:0001:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031008f2 to fffff80003081740
STACK_TEXT:
fffff880`0c065f18 fffff800`031008f2 : 00000000`00000050 fffff6fc`5805d8d8 00000000`00000000 fffff880`0c066080 : nt!KeBugCheckEx
fffff880`0c065f20 fffff800`0307f82e : 00000000`00000000 fffffa80`0d9e65a0 00000000`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`0c066080 fffff800`030930b8 : 00000000`00000001 fffff800`00000000 fffff880`0c066430 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`0c066210 fffff800`0306b777 : fffffa80`103a2af0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiLockProtoPoolPage+0x38
fffff880`0c066260 fffff800`0337260f : fffffa80`0d9e6520 fffff8a0`0c519011 fffffa80`0d9e6520 00000000`00002001 : nt!MiDeleteSegmentPages+0xad
fffff880`0c066310 fffff800`030868b4 : 00000000`00000000 fffff8a0`0c519010 fffffa80`0d3a17b0 fffffa80`0d3a17b0 : nt!MiSegmentDelete+0x7b
fffff880`0c066350 fffff880`10bbf1ab : fffff8a0`0c519010 fffff8a0`0bb977b0 00000000`00000000 fffff8a0`0c519010 : nt!ObfDereferenceObject+0xd4
fffff880`0c0663b0 fffff880`10bbe63c : fffff8a0`08c0cf00 fffff8a0`08c0cf00 fffff8a0`09091df0 fffff8a0`02f41a40 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c0663e0 fffff880`10bbe54a : fffffa80`00000000 fffffa80`0df22060 fffffa80`0f9bd210 fffff880`0c0664b8 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c066410 fffff880`10ba9b5a : fffff880`0c066438 fffff8a0`0bb99dc0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c066440 fffff880`10ba4523 : fffffa80`0ee014e0 00000000`00000000 fffff8a0`0c519010 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x112
fffff880`0c0664f0 fffff880`10b8aecc : fffff8a0`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c0665c0 fffff880`0fe37c10 : 00000000`00000000 fffff8a0`01c59000 fffff8a0`01c59000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c0665f0 fffff880`0fe4a67c : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c0666e0 fffff880`0fe2f815 : 00000000`fffffeda fffff8a0`0bb833e0 fffff8a0`01c59000 fffffa80`1051e000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c066750 fffff880`0fe6dca6 : 00000000`00000000 fffffa80`1051e000 fffff8a0`0bb833e0 fffff8a0`0bb83460 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c066780 fffff880`0fe6d63c : fffff900`c09c7270 00000000`00000000 00000000`00000001 fffff900`c09c7270 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c066830 fffff960`00124a54 : 00000000`00000c04 fffff900`c09c7270 00000000`00000000 fffff900`c09c7270 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c0668c0 fffff960`00124157 : fffffa80`10613500 fffff880`0c066c20 00000000`00000000 fffff880`0c066c20 : win32k!GdiProcessCallout+0x244
fffff880`0c066940 fffff800`03366a01 : fffffa80`10613510 00000000`00000000 00000000`00000000 fffffa80`0d576770 : win32k!W32pProcessCallout+0x6b
fffff880`0c066970 fffff800`0333f635 : 00000000`c0000005 00000000`c0000001 fffffa80`78457300 fffffa80`0dba8b60 : nt!PspExitThread+0x561
fffff880`0c066a30 fffff800`0305e1db : 00000000`00000100 fffffa80`0d576830 00000000`00000001 fffff800`03088b9d : nt!PsExitSpecialApc+0x1d
fffff880`0c066a60 fffff800`0305e620 : 00000000`00000000 fffff880`0c066ae0 fffff800`0333f74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`0c066ae0 fffff800`03080a37 : fffffa80`0d576770 00000000`000005d8 00000000`00000000 fffffa80`0d76a9b0 : nt!KiInitiateUserApc+0x70
fffff880`0c066c20 00000000`75432dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`1230f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75432dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`10bbf1ab eb22 jmp dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`10bbf1cf)
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100110-17253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0300d000 PsLoadedModuleList = 0xfffff800`0324ae50
System Uptime: 0 days 1:25:48.791
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa900f11b068, 2, 1, fffff8800441522c}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa900f11b068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800441522c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b50e0
fffffa900f11b068
CURRENT_IRQL: 2
FAULTING_IP:
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908 mov qword ptr [rax],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1ba60 -- (.trap 0xfffff88002f1ba60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa900f11b068 rbx=0000000000000000 rcx=fffffa800ee097b0
rdx=0000000063706458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800441522c rsp=fffff88002f1bbf0 rbp=fffffa800f11a050
r8=0000000063706458 r9=0000000000000000 r10=fffffa800f11a1a0
r11=fffffa800f11a1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8:
fffff880`0441522c 488908 mov qword ptr [rax],rcx ds:fffffa90`0f11b068=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307cca9 to fffff8000307d740
STACK_TEXT:
fffff880`02f1b918 fffff800`0307cca9 : 00000000`0000000a fffffa90`0f11b068 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b920 fffff800`0307b920 : fffffa80`0e26fb40 fffffa80`0f11a1a0 fffffa80`0f11a1a0 fffff880`0442d0d8 : nt!KiBugCheckDispatch+0x69
fffff880`02f1ba60 fffff880`0441522c : 00000000`00000000 00000000`ffffffff fffffa80`0f11ab98 fffff880`04406f3d : nt!KiPageFault+0x260
fffff880`02f1bbf0 fffff880`044119bc : fffffa80`0f126590 fffffa80`0f11a1a0 fffffa80`0f11ab98 fffffa80`0f11a1a0 : USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8
fffff880`02f1bc40 fffff880`04402f89 : fffffa80`0f11a050 00000000`00000000 fffffa80`0f11ab02 fffffa80`0f11ab98 : USBPORT!USBPORT_Core_UsbDoneDpc_Worker+0x2bc
fffff880`02f1bca0 fffff800`03088bfc : fffff880`009ea180 fffffa80`0f11ab98 fffffa80`0f11abb0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f1bcd0 fffff800`03085eea : fffff880`009ea180 fffff880`009f50c0 00000000`00000000 fffff880`04402db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
FAILURE_BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa900f11b068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800441522c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffa900f11b068
CURRENT_IRQL: 2
FAULTING_IP:
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908 mov qword ptr [rax],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1ba60 -- (.trap 0xfffff88002f1ba60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa900f11b068 rbx=0000000000000000 rcx=fffffa800ee097b0
rdx=0000000063706458 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800441522c rsp=fffff88002f1bbf0 rbp=fffffa800f11a050
r8=0000000063706458 r9=0000000000000000 r10=fffffa800f11a1a0
r11=fffffa800f11a1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8:
fffff880`0441522c 488908 mov qword ptr [rax],rcx ds:fffffa90`0f11b068=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307cca9 to fffff8000307d740
STACK_TEXT:
fffff880`02f1b918 fffff800`0307cca9 : 00000000`0000000a fffffa90`0f11b068 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b920 fffff800`0307b920 : fffffa80`0e26fb40 fffffa80`0f11a1a0 fffffa80`0f11a1a0 fffff880`0442d0d8 : nt!KiBugCheckDispatch+0x69
fffff880`02f1ba60 fffff880`0441522c : 00000000`00000000 00000000`ffffffff fffffa80`0f11ab98 fffff880`04406f3d : nt!KiPageFault+0x260
fffff880`02f1bbf0 fffff880`044119bc : fffffa80`0f126590 fffffa80`0f11a1a0 fffffa80`0f11ab98 fffffa80`0f11a1a0 : USBPORT!USBPORT_Core_iRemovePriorityTransfer+0x1c8
fffff880`02f1bc40 fffff880`04402f89 : fffffa80`0f11a050 00000000`00000000 fffffa80`0f11ab02 fffffa80`0f11ab98 : USBPORT!USBPORT_Core_UsbDoneDpc_Worker+0x2bc
fffff880`02f1bca0 fffff800`03088bfc : fffff880`009ea180 fffffa80`0f11ab98 fffffa80`0f11abb0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f1bcd0 fffff800`03085eea : fffff880`009ea180 fffff880`009f50c0 00000000`00000000 fffff880`04402db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
fffff880`0441522c 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
FAILURE_BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iRemovePriorityTransfer+1c8
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100310-25584-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a2e50
System Uptime: 0 days 0:14:26.571
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff960002265f9, cf00004319fe021, fffff8800e726070, b}
Probably caused by : hardware ( win32k!GrePolyPolygon+6 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff960002265f9, Virtual address for the attempted write.
Arg2: 0cf00004319fe021, PTE contents.
Arg3: fffff8800e726070, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800e726070 -- (.trap 0xfffff8800e726070)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff96000226670 rbx=0000000000000000 rcx=000000001e010247
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600022e5ae rsp=fffff8800e726200 rbp=fffff8800e7263e0
r8=fffff8800e726230 r9=0000000000000001 r10=000003990000007a
r11=fffff8800e726260 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!GrePolyPolygon+0x6:
fffff960`0022e5ae 084889 or byte ptr [rax-77h],cl ds:77d8:fffff960`002265f9=75
Resetting default scope
MISALIGNED_IP:
win32k!GrePolyPolygon+6
fffff960`0022e5ae 084889 or byte ptr [rax-77h],cl
LAST_CONTROL_TRANSFER: from fffff80003155ae2 to fffff800030d5740
STACK_TEXT:
fffff880`0e725f08 fffff800`03155ae2 : 00000000`000000be fffff960`002265f9 0cf00004`319fe021 fffff880`0e726070 : nt!KeBugCheckEx
fffff880`0e725f10 fffff800`030d382e : 00000000`00000001 00000000`00000000 00000000`74fae400 fffff960`002263d0 : nt! ?? ::FNODOBFM::`string'+0x4237e
fffff880`0e726070 fffff960`0022e5ae : fffff900`c2861890 00000000`74f82450 fffff900`c28617c0 fffff960`000f41c5 : nt!KiPageFault+0x16e
fffff880`0e726200 fffff900`c2861890 : 00000000`74f82450 fffff900`c28617c0 fffff960`000f41c5 fffff900`00000006 : win32k!GrePolyPolygon+0x6
fffff880`0e726208 00000000`74f82450 : fffff900`c28617c0 fffff960`000f41c5 fffff900`00000006 fffff960`001b669f : 0xfffff900`c2861890
fffff880`0e726210 fffff900`c28617c0 : fffff960`000f41c5 fffff900`00000006 fffff960`001b669f 00000006`00000006 : 0x74f82450
fffff880`0e726218 fffff960`000f41c5 : fffff900`00000006 fffff960`001b669f 00000006`00000006 fffff880`0e726230 : 0xfffff900`c28617c0
fffff880`0e726220 fffff960`000f41c5 : 000003ba`0000007b 000003bb`0000007a 00000399`0000007a 00000399`00000083 : win32k!HANDLELOCK::vLockHandle+0x29
fffff880`0e726260 fffff960`002515b0 : 00000000`00001110 ffffffff`f5101028 00000000`74f82450 00000000`0280d580 : win32k!HANDLELOCK::vLockHandle+0x29
fffff880`0e7262a0 00000000`02f37fb0 : ffffffff`00000001 00000000`00000001 00000000`00000001 00000000`7efa7000 : win32k!DEC_SHARE_REF_CNT+0xe4
fffff880`0e726300 ffffffff`00000001 : 00000000`00000001 00000000`00000001 00000000`7efa7000 00000000`74f82450 : 0x2f37fb0
fffff880`0e726308 00000000`00000001 : 00000000`00000001 00000000`7efa7000 00000000`74f82450 00000000`0280d580 : 0xffffffff`00000001
fffff880`0e726310 00000000`00000001 : 00000000`7efa7000 00000000`74f82450 00000000`0280d580 00000000`0280fd20 : 0x1
fffff880`0e726318 00000000`7efa7000 : 00000000`74f82450 00000000`0280d580 00000000`0280fd20 00000000`74fae410 : 0x1
fffff880`0e726320 00000000`74f82450 : 00000000`0280d580 00000000`0280fd20 00000000`74fae410 00000000`00000001 : 0x7efa7000
fffff880`0e726328 00000000`0280d580 : 00000000`0280fd20 00000000`74fae410 00000000`00000001 fffff960`002263d0 : 0x74f82450
fffff880`0e726330 00000000`0280fd20 : 00000000`74fae410 00000000`00000001 fffff960`002263d0 00000000`02f37e9c : 0x280d580
fffff880`0e726338 00000000`74fae410 : 00000000`00000001 fffff960`002263d0 00000000`02f37e9c fffff800`030d489c : 0x280fd20
fffff880`0e726340 00000000`00000001 : fffff960`002263d0 00000000`02f37e9c fffff800`030d489c 00000000`77115d48 : 0x74fae410
fffff880`0e726348 fffff960`002263cf : 00000000`02f37e9c fffff800`030d489c 00000000`77115d48 fffff880`0e7263e0 : 0x1
fffff880`0e726350 fffff900`c00bf010 : 00000000`00000000 fffff880`0e726880 00000000`00000001 fffff800`030e1772 : win32k!CaptureDriverInfo2W+0x31f
fffff880`0e7263e0 00000000`00000000 : fffff880`0e726880 00000000`00000001 fffff800`030e1772 fffff900`c00bf010 : 0xfffff900`c00bf010
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GrePolyPolygon+6
fffff960`0022e5ae 084889 or byte ptr [rax-77h],cl
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!GrePolyPolygon+6
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100210-18298-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03246e50
System Uptime: 0 days 0:01:05.198
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {c08a2, 0, 0, 0}
Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000c08a2
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x24
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`0d8cfb58 fffff880`01230e95 : 00000000`00000024 00000000`000c08a2 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d8cfb60 fffff880`01230ae8 : 00000001`00000000 00000000`00000000 00000000`00000000 00000617`00004000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`0d8cfc60 fffff880`0116123f : fffffa80`1125c9b0 fffffa80`1125c610 fffffa80`0f1d2010 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x9e89
fffff880`0d8cfd10 fffff880`0115f6df : fffffa80`0e390de0 fffffa80`1125c610 fffffa80`0e390d00 fffffa80`1125c610 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0d8cfda0 fffff800`0306b1f2 : fffffa80`1125c630 fffffa80`0ee3fad0 00000000`00000043 fffff6fc`40022df8 : fltmgr!FltpDispatch+0xcf
fffff880`0d8cfe00 fffff800`0306b4f5 : 00000000`00000000 00000000`00000000 fffff880`0d8cfec0 fffffa80`1124bec0 : nt!IoPageRead+0x252
fffff880`0d8cfe90 fffff800`030945c4 : 00000000`00000000 00000000`00000008 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`0d8cff20 fffff800`0307782e : 00000000`00000008 00000000`00000081 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x11c4
fffff880`0d8d0080 fffff880`045bf3bc : fffff880`045b85a9 00000008`00001000 00000200`00000080 00001000`00000000 : nt!KiPageFault+0x16e
fffff880`0d8d0218 fffff880`045b85a9 : 00000008`00001000 00000200`00000080 00001000`00000000 00000001`00000000 : dxgmms1!VIDMM_GLOBAL::VerifySegmentSetAny
fffff880`0d8d0220 fffff880`045a08e3 : 00000000`00000081 fffff8a0`01fb87c0 00000000`00001000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CreateOneAllocation+0x201
fffff880`0d8d0350 fffff880`044ec2ec : 00000000`a0000000 fffff880`00000002 fffff8a0`0206d6e0 00000000`00000004 : dxgmms1!VidMmCreateAllocation+0x173
fffff880`0d8d0430 fffff880`044e5554 : fffff880`0d8d0698 00000000`00000000 fffff880`0d8d0870 fffff880`0d8d0870 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations<_DXGK_ALLOCATIONINFO>+0x1d8
fffff880`0d8d04c0 fffff880`044e81af : fffff8a0`01fd3000 fffff880`0d8d0b30 fffff880`0d8d0c01 00000000`00000000 : dxgkrnl!DXGDEVICE::CreateAllocation+0xca8
fffff880`0d8d0ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCreateAllocation+0x42b
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155
BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155
Followup: MachineOwner
---------
fffff800`00bc7000 fffff800`00bd1000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`03009000 fffff800`035e5000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`035e5000 fffff800`0362e000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c0f000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`00c32000 fffff880`00c76000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00c76000 fffff880`00c8a000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00c8a000 fffff880`00ce8000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00ce8000 fffff880`00da8000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00da8000 fffff880`00dd7000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`00dd7000 fffff880`00df8000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e40000 fffff880`00e55000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e55000 fffff880`00e6a000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00e73000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`00e73000 fffff880`00e7c000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`00e7c000 fffff880`00e87000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e87000 fffff880`00e98000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00e98000 fffff880`00eb6000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`00eb6000 fffff880`00ec3000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`00ec4000 fffff880`00f68000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f68000 fffff880`00f77000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f77000 fffff880`00fce000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00fce000 fffff880`00fd7000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fd7000 fffff880`00fe1000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fe1000 fffff880`00ffb000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`01000000 fffff880`01025000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`01025000 fffff880`01035000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01035000 fffff880`0103e000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01046000 fffff880`010a2000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`010a2000 fffff880`010a9000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`010a9000 fffff880`010b9000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`010b9000 fffff880`010d3000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`010d3000 fffff880`010dc000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`010dc000 fffff880`01106000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`01106000 fffff880`01124000 jraid jraid.sys Thu Aug 13 11:10:27 2009 (4A83CA73)
fffff880`01124000 fffff880`01153000 SCSIPORT SCSIPORT.SYS Tue Jul 14 03:01:04 2009 (4A5BCAC0)
fffff880`01153000 fffff880`0115e000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`0115e000 fffff880`011aa000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`011aa000 fffff880`011be000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`011be000 fffff880`011ee000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`011ee000 fffff880`011fc000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`01200000 fffff880`0122a000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`0122f000 fffff880`013d2000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`013f1000 fffff880`013f8000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`01400000 fffff880`014f2000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`014f4000 fffff880`01552000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01552000 fffff880`0156c000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0156c000 fffff880`015df000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`015df000 fffff880`015f0000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`015f0000 fffff880`015fa000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01600000 fffff880`0163a000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`0163a000 fffff880`01650000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01650000 fffff880`01659000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`0165a000 fffff880`016ba000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`016ba000 fffff880`016e5000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`016e5000 fffff880`0172f000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0172f000 fffff880`0173f000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0173f000 fffff880`0178b000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0178b000 fffff880`01793000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01793000 fffff880`017cd000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`017cd000 fffff880`017df000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`017df000 fffff880`017e8000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01802000 fffff880`019ff000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`04000000 fffff880`04051000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`04051000 fffff880`0405d000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`0405d000 fffff880`04068000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`04068000 fffff880`04077000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`04085000 fffff880`0410f000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0410f000 fffff880`04154000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`04154000 fffff880`0415d000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`0415d000 fffff880`04183000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`04183000 fffff880`04192000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`04192000 fffff880`041af000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`041af000 fffff880`041ca000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`041ca000 fffff880`041de000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`041de000 fffff880`041f8000 SCDEmu SCDEmu.SYS Mon Apr 12 11:52:25 2010 (4BC2DF49)
fffff880`04200000 fffff880`0421b000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`0421b000 fffff880`04226000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0422e000 fffff880`042b1000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`042b1000 fffff880`042cf000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`042cf000 fffff880`042e0000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`042e0000 fffff880`04306000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`04306000 fffff880`0431c000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`0431c000 fffff880`0435a000 Rt64win7 Rt64win7.sys Thu Jul 30 14:58:43 2009 (4A718AF3)
fffff880`0435a000 fffff880`04398000 1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`04398000 fffff880`043b6000 i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`043b6000 fffff880`043cc000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`043cc000 fffff880`043f0000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`043f0000 fffff880`043fc000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04400000 fffff880`04424000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04424000 fffff880`04431000 usbuhci usbuhci.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`04431000 fffff880`04487000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`04487000 fffff880`04498000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04498000 fffff880`044a4000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044ab000 fffff880`0459f000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`0459f000 fffff880`045e5000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`045e5000 fffff880`045f4000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`045f4000 fffff880`045fd000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`045fd000 fffff880`045fe480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04803000 fffff880`053ed500 nvlddmkm nvlddmkm.sys Thu Sep 02 07:31:44 2010 (4C7F28B0)
fffff880`053ee000 fffff880`053ef180 nvBridge nvBridge.kmd Thu Sep 02 07:27:39 2010 (4C7F27BB)
fffff880`053f0000 fffff880`05400000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`05856000 fffff880`05899000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`05899000 fffff880`058ab000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`058ab000 fffff880`05905000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`05905000 fffff880`0591a000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0591a000 fffff880`05933000 nvhda64v nvhda64v.sys Wed Mar 10 03:48:17 2010 (4B96FA61)
fffff880`05933000 fffff880`05970000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05970000 fffff880`05992000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05992000 fffff880`05997200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`0765b000 fffff880`0787ce80 RTKVHD64 RTKVHD64.sys Tue Jan 19 12:42:09 2010 (4B558C81)
fffff880`0787d000 fffff880`07889000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`07889000 fffff880`07897000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`07897000 fffff880`078a3000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`078a3000 fffff880`078ac000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`078ac000 fffff880`078bf000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`078bf000 fffff880`078da000 USBSTOR USBSTOR.SYS Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`078da000 fffff880`078dbf00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`078dc000 fffff880`078ea000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`078ea000 fffff880`078f8000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`078f8000 fffff880`07911000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`07911000 fffff880`07919080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`0791a000 fffff880`07927000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`07927000 fffff880`0794a000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`0794a000 fffff880`0796b000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`0796b000 fffff880`07980000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`07980000 fffff880`07998000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`07998000 fffff880`079ce000 fastfat fastfat.SYS Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`0b400000 fffff880`0b423000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`0b478000 fffff880`0b540000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`0b540000 fffff880`0b55e000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0b55e000 fffff880`0b576000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`0b576000 fffff880`0b5a3000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`0b5a3000 fffff880`0b5f1000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`0ba00000 fffff880`0ba68000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`0bafd000 fffff880`0bba3000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`0bba3000 fffff880`0bbae000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`0bbae000 fffff880`0bbdb000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`0bbdb000 fffff880`0bbed000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`0bc1f000 fffff880`0bcb5000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`0bcb5000 fffff880`0bce6000 WUDFRd WUDFRd.sys Tue Jul 14 03:06:06 2009 (4A5BCBEE)
fffff960`000f0000 fffff960`003ff000 win32k win32k.sys Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`00570000 fffff960`0057a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`006b0000 fffff960`006d7000 cdd cdd.dll Wed May 19 22:48:26 2010 (4BF4408A)
fffff960`00940000 fffff960`009a1000 ATMFD ATMFD.DLL Thu May 27 07:11:31 2010 (4BFDF0F3)