*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {474, 2, 1, 8348c86c}
Probably caused by : ntkrpamp.exe ( nt!KiAttachProcess+58 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000474, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8348c86c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 83583718
Unable to read MiSystemVaType memory at 83563160
00000474
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiAttachProcess+58
8348c86c f00fc102 lock xadd dword ptr [edx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: ae823b8c -- (.trap 0xffffffffae823b8c)
ErrCode = 00000002
eax=00000008 ebx=00000400 ecx=ac8796b0 edx=00000474 esi=ac879540 edi=ac879580
eip=8348c86c esp=ae823c00 ebp=ae823c0c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KiAttachProcess+0x58:
8348c86c f00fc102 lock xadd dword ptr [edx],eax ds:0023:00000474=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8348c86c to 8346181b
STACK_TEXT:
ae823b8c 8348c86c badb0d00 00000474 ae823c08 nt!KiTrap0E+0x2cf
ae823c0c 834af7de 00000400 00000000 ac8796b0 nt!KiAttachProcess+0x58
ae823c50 8345c87d badb0d00 ae823cc8 ae003c98 nt!KeStackAttachProcess+0xbe
ae823c60 834a5320 00000001 ac879540 835555bc nt!ZwOpenProcess+0x11
ae823d00 8348903b 80002a68 00000000 ac879540 nt!KiCheckForThreadDispatch+0x151
ae823d50 836299df 80000001 b3a01302 00000000 nt!ExpWorkerThread+0x10d
ae823d90 834db1d9 83488f2e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiAttachProcess+58
8348c86c f00fc102 lock xadd dword ptr [edx],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiAttachProcess+58
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
FAILURE_BUCKET_ID: 0xA_nt!KiAttachProcess+58
BUCKET_ID: 0xA_nt!KiAttachProcess+58
Followup: MachineOwner
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 00050830
Arg2: 8cd67bc0
Arg3: 8cd677a0
Arg4: 8349a97b
Debugging Details:
------------------
EXCEPTION_RECORD: 8cd67bc0 -- (.exr 0xffffffff8cd67bc0)
ExceptionAddress: 8349a97b (nt!CcWriteBehind+0x000000ed)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 0000001c
Attempt to write to address 0000001c
CONTEXT: 8cd677a0 -- (.cxr 0xffffffff8cd677a0)
eax=00000000 ebx=adc44b04 ecx=0000001c edx=00000000 esi=adc44a58 edi=00000000
eip=8349a97b esp=8cd67c88 ebp=8cd67ca8 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!CcWriteBehind+0xed:
8349a97b f00fc101 lock xadd dword ptr [ecx],eax ds:0023:0000001c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 0000001c
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8356a718
Unable to read MiSystemVaType memory at 8354a160
0000001c
FOLLOWUP_IP:
nt!CcWriteBehind+ed
8349a97b f00fc101 lock xadd dword ptr [ecx],eax
FAULTING_IP:
nt!CcWriteBehind+ed
8349a97b f00fc101 lock xadd dword ptr [ecx],eax
BUGCHECK_STR: 0x34
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 834a2fd6 to 8349a97b
STACK_TEXT:
8cd67ca8 834a2fd6 8cd67cc4 91fb02af 8596a8f8 nt!CcWriteBehind+0xed
8cd67d00 8347003b 8596a8f8 00000000 883aed48 nt!CcWorkerThread+0x164
8cd67d50 836109df 80000000 91fb023f 00000000 nt!ExpWorkerThread+0x10d
8cd67d90 834c21d9 8346ff2e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CcWriteBehind+ed
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
STACK_COMMAND: .cxr 0xffffffff8cd677a0 ; kb
FAILURE_BUCKET_ID: 0x34_nt!CcWriteBehind+ed
BUCKET_ID: 0x34_nt!CcWriteBehind+ed
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {474, 2, 1, 82ebb86c}
Probably caused by : ntkrpamp.exe ( nt!KiAttachProcess+58 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000474, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82ebb86c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82fb2718
Unable to read MiSystemVaType memory at 82f92160
00000474
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiAttachProcess+58
82ebb86c f00fc102 lock xadd dword ptr [edx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: 91703b8c -- (.trap 0xffffffff91703b8c)
ErrCode = 00000002
eax=00000008 ebx=00000400 ecx=87fe32a0 edx=00000474 esi=87fe3130 edi=87fe3170
eip=82ebb86c esp=91703c00 ebp=91703c0c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KiAttachProcess+0x58:
82ebb86c f00fc102 lock xadd dword ptr [edx],eax ds:0023:00000474=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82ebb86c to 82e9081b
STACK_TEXT:
91703b8c 82ebb86c badb0d00 00000474 91703c08 nt!KiTrap0E+0x2cf
91703c0c 82ede7de 00000400 00000000 87fe32a0 nt!KiAttachProcess+0x58
91703c50 82e8b87d badb0d00 91703cc8 91003c88 nt!KeStackAttachProcess+0xbe
91703d00 82eb803b 800029c4 00000000 87fe3130 nt!ZwOpenProcess+0x11
91703d50 830589df 80000001 8c650d49 00000000 nt!ExpWorkerThread+0x10d
91703d90 82f0a1d9 82eb7f2e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiAttachProcess+58
82ebb86c f00fc102 lock xadd dword ptr [edx],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiAttachProcess+58
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
FAILURE_BUCKET_ID: 0xA_nt!KiAttachProcess+58
BUCKET_ID: 0xA_nt!KiAttachProcess+58
Followup: MachineOwner
---------
start end module name
83402000 83812000 nt ntkrpamp.exe Wed Oct 27 03:30:44 2010 (4CC78ED4)
83812000 83849000 hal halmacpi.dll Tue Jul 14 00:11:03 2009 (4A5BBF07)
83a0b000 83a83000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 02:06:41 2009 (4A5BDA21)
83a83000 83a94000 PSHED PSHED.dll Tue Jul 14 02:09:36 2009 (4A5BDAD0)
83a94000 83a9c000 BOOTVID BOOTVID.dll Tue Jul 14 02:04:34 2009 (4A5BD9A2)
83a9c000 83ade000 CLFS CLFS.SYS Tue Jul 14 00:11:10 2009 (4A5BBF0E)
83ade000 83b89000 CI CI.dll Tue Jul 14 02:09:28 2009 (4A5BDAC8)
83b89000 83bfa000 Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
83c05000 83c13000 WDFLDR WDFLDR.SYS Tue Jul 14 00:11:25 2009 (4A5BBF1D)
83c13000 83c5b000 ACPI ACPI.sys Tue Jul 14 00:11:11 2009 (4A5BBF0F)
83c5b000 83c64000 WMILIB WMILIB.SYS Tue Jul 14 00:11:22 2009 (4A5BBF1A)
83c64000 83c6c000 msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
83c6c000 83c96000 pci pci.sys Tue Jul 14 00:11:16 2009 (4A5BBF14)
83c96000 83ca1000 vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
83ca1000 83cb2000 partmgr partmgr.sys Tue Jul 14 00:11:35 2009 (4A5BBF27)
83cb2000 83cba000 compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
83cba000 83cc5000 BATTC BATTC.SYS Tue Jul 14 00:19:15 2009 (4A5BC0F3)
83cc5000 83cd5000 volmgr volmgr.sys Tue Jul 14 00:11:25 2009 (4A5BBF1D)
83cd5000 83d20000 volmgrx volmgrx.sys Tue Jul 14 00:11:41 2009 (4A5BBF2D)
83d20000 83d36000 mountmgr mountmgr.sys Tue Jul 14 00:11:27 2009 (4A5BBF1F)
83d36000 83d3d000 pciide pciide.sys Tue Jul 14 00:11:19 2009 (4A5BBF17)
83d3d000 83d4b000 PCIIDEX PCIIDEX.SYS Tue Jul 14 00:11:15 2009 (4A5BBF13)
83d4b000 83d7f000 fltmgr fltmgr.sys Tue Jul 14 00:11:13 2009 (4A5BBF11)
83d7f000 83d90000 fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
83d90000 83ded000 cng cng.sys Tue Jul 14 00:32:55 2009 (4A5BC427)
83e00000 83e09000 amdxata amdxata.sys Fri Mar 19 16:19:01 2010 (4BA3A3F5)
83e13000 83fc6000 iaStor iaStor.sys Fri Oct 02 20:38:45 2009 (4AC656C5)
83fc6000 83fcf000 atapi atapi.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
83fcf000 83ff2000 ataport ataport.SYS Tue Jul 14 00:11:18 2009 (4A5BBF16)
83ff2000 83ffc000 msahci msahci.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
88110000 88118000 kdcom kdcom.dll Tue Jul 14 02:08:58 2009 (4A5BDAAA)
89000000 89032000 fvevol fvevol.sys Sat Sep 26 03:24:21 2009 (4ABD7B55)
8903c000 8916b000 Ntfs Ntfs.sys Fri Mar 11 03:29:11 2011 (4D799707)
8916b000 89196000 msrpc msrpc.sys Tue Jul 14 00:11:59 2009 (4A5BBF3F)
89196000 891a9000 ksecdd ksecdd.sys Tue Jul 14 00:11:56 2009 (4A5BBF3C)
891a9000 891b7000 pcw pcw.sys Tue Jul 14 00:11:10 2009 (4A5BBF0E)
891b7000 891c0000 Fs_Rec Fs_Rec.sys Tue Jul 14 00:11:14 2009 (4A5BBF12)
891c0000 891cbb00 RapportKELL RapportKELL.sys Thu Apr 28 12:33:26 2011 (4DB95086)
891cc000 891dc000 mup mup.sys Tue Jul 14 00:14:14 2009 (4A5BBFC6)
891dc000 891ed000 disk disk.sys Tue Jul 14 00:11:28 2009 (4A5BBF20)
89200000 8922d000 rdyboost rdyboost.sys Tue Jul 14 00:22:02 2009 (4A5BC19A)
89232000 892e9000 ndis ndis.sys Tue Jul 14 00:12:24 2009 (4A5BBF58)
892e9000 89327000 NETIO NETIO.SYS Tue Jul 14 00:12:35 2009 (4A5BBF63)
89327000 8934c000 ksecpkg ksecpkg.sys Fri Dec 11 04:04:22 2009 (4B21C4C6)
8934c000 89354380 vmstorfl vmstorfl.sys Tue Jul 14 00:28:44 2009 (4A5BC32C)
89355000 89394000 volsnap volsnap.sys Tue Jul 14 00:11:34 2009 (4A5BBF26)
89394000 89398100 TVALZ TVALZ.SYS Tue Jul 14 03:18:30 2009 (4A5BEAF6)
89399000 893e0000 tos_sps32 tos_sps32.sys Wed Jun 24 06:36:21 2009 (4A41BB55)
893e0000 893e1900 Thpevm Thpevm.SYS Mon Jun 29 09:15:50 2009 (4A487836)
893e2000 893ed000 thpdrv thpdrv.sys Mon Jun 29 03:03:26 2009 (4A4820EE)
893ed000 893f5000 spldr spldr.sys Mon May 11 17:13:47 2009 (4A084EBB)
893f5000 893fd000 hwpolicy hwpolicy.sys Tue Jul 14 00:11:01 2009 (4A5BBF05)
89409000 8942e000 CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
8942e000 89434500 avgrkx86 avgrkx86.sys Wed Mar 16 14:05:26 2011 (4D80C3A6)
89435000 89438f80 AVGIDSEH AVGIDSEH.Sys Tue Feb 22 05:22:33 2011 (4D634819)
89439000 895ec000 dump_iaStor dump_iaStor.sys Fri Oct 02 20:38:45 2009 (4AC656C5)
8de23000 8de42000 cdrom cdrom.sys Tue Jul 14 00:11:24 2009 (4A5BBF1C)
8de42000 8deb2000 aswSnx aswSnx.SYS Tue May 10 13:03:53 2011 (4DC929A9)
8deb2000 8debe000 avgmfx86 avgmfx86.sys Tue Mar 01 12:23:55 2011 (4D6CE55B)
8debe000 8dec5000 Null Null.SYS Tue Jul 14 00:11:12 2009 (4A5BBF10)
8dec5000 8decc000 Beep Beep.SYS Tue Jul 14 00:45:00 2009 (4A5BC6FC)
8decc000 8ded8000 vga vga.sys Tue Jul 14 00:25:50 2009 (4A5BC27E)
8ded8000 8def9000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
8def9000 8df06000 watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
8df06000 8df0e000 RDPCDD RDPCDD.sys Tue Jul 14 01:01:40 2009 (4A5BCAE4)
8df0e000 8df16000 rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
8df16000 8df1e000 rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
8df1e000 8df29000 Msfs Msfs.SYS Tue Jul 14 00:11:26 2009 (4A5BBF1E)
8df29000 8df37000 Npfs Npfs.SYS Tue Jul 14 00:11:31 2009 (4A5BBF23)
8df37000 8df7de80 avgtdix avgtdix.sys Mon Apr 04 22:53:24 2011 (4D9A3DD4)
8df7e000 8dfb0000 netbt netbt.sys Tue Jul 14 00:12:18 2009 (4A5BBF52)
8e627000 8e770000 tcpip tcpip.sys Mon Jun 14 04:36:59 2010 (4C15A3DB)
8e770000 8e7a1000 fwpkclnt fwpkclnt.sys Tue Jul 14 00:12:03 2009 (4A5BBF43)
8e7a1000 8e7b2000 avgfwd6x avgfwd6x.sys Mon Jul 12 02:37:25 2010 (4C3A71D5)
8e7b2000 8e7c9000 tdx tdx.sys Tue Jul 14 00:12:10 2009 (4A5BBF4A)
8e7c9000 8e7d4000 TDI TDI.SYS Tue Jul 14 00:12:12 2009 (4A5BBF4C)
8e7d4000 8e7ddf00 aswTdi aswTdi.SYS Tue May 10 13:02:35 2011 (4DC9295B)
8ea3b000 8ea95000 afd afd.sys Tue Jul 14 00:12:34 2009 (4A5BBF62)
8ea95000 8ea99200 aswRdr aswRdr.SYS Tue May 10 12:59:54 2011 (4DC928BA)
8ea9a000 8eaa1000 wfplwf wfplwf.sys Tue Jul 14 00:53:51 2009 (4A5BC90F)
8eaa1000 8eac0000 pacer pacer.sys Tue Jul 14 00:53:58 2009 (4A5BC916)
8eac0000 8ead1000 vwififlt vwififlt.sys Tue Jul 14 00:52:03 2009 (4A5BC8A3)
8ead1000 8eadf000 netbios netbios.sys Tue Jul 14 00:53:54 2009 (4A5BC912)
8eadf000 8eaeea00 tosrfcom tosrfcom.sys Tue Jul 28 11:18:06 2009 (4A6ED05E)
8eaef000 8eb02000 wanarp wanarp.sys Tue Jul 14 00:55:02 2009 (4A5BC956)
8eb02000 8eb12000 termdd termdd.sys Tue Jul 14 01:01:35 2009 (4A5BCADF)
8eb12000 8eb53000 rdbss rdbss.sys Tue Jul 14 00:14:26 2009 (4A5BBFD2)
8eb53000 8eb78580 RapportPG RapportPG.sys Thu Apr 28 12:33:21 2011 (4DB95081)
8eb79000 8eb87c00 RapportEI RapportEI.sys Thu Apr 28 12:33:44 2011 (4DB95098)
8eb88000 8eb94800 RapportCerberus_26169 RapportCerberus_26169.sys Sun Apr 17 16:16:25 2011 (4DAB0449)
8eb95000 8eb9f000 nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
8eb9f000 8eba9000 mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
8eba9000 8ebb5000 discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
8ebb5000 8ebfb000 nwifi nwifi.sys Tue Jul 14 00:51:59 2009 (4A5BC89F)
8ee11000 8ee75000 csc csc.sys Tue Jul 14 00:15:08 2009 (4A5BBFFC)
8ee75000 8ee8d000 dfsc dfsc.sys Tue Jul 14 00:14:16 2009 (4A5BBFC8)
8ee8d000 8ee9b000 blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
8ee9b000 8eed6100 avgldx86 avgldx86.sys Fri Jan 07 04:35:29 2011 (4D269811)
8eed7000 8ef20180 aswSP aswSP.SYS Tue May 10 13:03:43 2011 (4DC9299F)
8ef42000 8ef63000 tunnel tunnel.sys Tue Jul 14 00:54:03 2009 (4A5BC91B)
8ef63000 8ef75000 intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
8ef75000 8efc0000 USBPORT USBPORT.SYS Tue Jul 14 00:51:13 2009 (4A5BC871)
8f600000 8f613000 rspndr rspndr.sys Tue Jul 14 00:53:20 2009 (4A5BC8F0)
8f62e000 8f680000 rixdpe86 rixdpe86.sys Sat Jul 04 10:37:06 2009 (4A4F22C2)
8f680000 8f697000 rassstp rassstp.sys Tue Jul 14 00:54:57 2009 (4A5BC951)
8f697000 8f6cb000 ks ks.sys Thu Mar 04 03:57:52 2010 (4B8F2FC0)
8f6cb000 8f6d9000 umbus umbus.sys Tue Jul 14 00:51:38 2009 (4A5BC88A)
8f6d9000 8f71d000 usbhub usbhub.sys Tue Jul 14 00:52:06 2009 (4A5BC8A6)
8f71d000 8f72e000 NDProxy NDProxy.SYS Tue Jul 14 00:54:27 2009 (4A5BC933)
8f72e000 8f76e000 udfs udfs.sys Tue Jul 14 00:14:09 2009 (4A5BBFC1)
8f76e000 8f789000 luafv luafv.sys Tue Jul 14 00:15:44 2009 (4A5BC020)
8f789000 8f7c1000 aswMonFlt aswMonFlt.sys Tue May 10 12:59:43 2011 (4DC928AF)
8f7c1000 8f7db000 WudfPf WudfPf.sys Tue Jul 14 00:50:13 2009 (4A5BC835)
8f7db000 8f7eb000 lltdio lltdio.sys Tue Jul 14 00:53:18 2009 (4A5BC8EE)
8f7eb000 8f7fb000 ndisuio ndisuio.sys Tue Jul 14 00:53:51 2009 (4A5BC90F)
90200000 9021f000 HDAudBus HDAudBus.sys Tue Jul 14 00:50:55 2009 (4A5BC85F)
9021f000 90230000 risdpe86 risdpe86.sys Tue Jul 28 10:24:19 2009 (4A6EC3C3)
90234000 908ac000 igdkmd32 igdkmd32.sys Fri Nov 06 23:44:41 2009 (4AF4B4E9)
908ac000 90963000 dxgkrnl dxgkrnl.sys Tue Nov 02 02:37:53 2010 (4CCF7981)
90963000 9099c000 dxgmms1 dxgmms1.sys Thu Feb 03 03:34:49 2011 (4D4A2259)
9099c000 909a6080 HECI HECI.sys Thu Sep 17 20:54:12 2009 (4AB293E4)
909a7000 909db000 e1k6232 e1k6232.sys Thu Sep 24 01:09:54 2009 (4ABAB8D2)
909db000 909ea000 usbehci usbehci.sys Tue Jul 14 00:51:14 2009 (4A5BC872)
909ea000 909ff000 rimspe86 rimspe86.sys Thu Jul 02 00:50:14 2009 (4A4BF636)
91000000 91017000 raspptp raspptp.sys Tue Jul 14 00:54:47 2009 (4A5BC947)
91017000 91018380 swenum swenum.sys Tue Jul 14 00:45:08 2009 (4A5BC704)
9101f000 9169b000 NETw5s32 NETw5s32.sys Wed Jan 13 16:36:36 2010 (4B4DF694)
9169b000 916a5000 vwifibus vwifibus.sys Tue Jul 14 00:52:02 2009 (4A5BC8A2)
916a5000 916b1000 tpm tpm.sys Tue Jul 14 00:12:52 2009 (4A5BBF74)
916b1000 916cb000 serial serial.sys Tue Jul 14 00:45:33 2009 (4A5BC71D)
916cb000 916d5000 serenum serenum.sys Tue Jul 14 00:45:27 2009 (4A5BC717)
916d5000 916ed000 i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
916ed000 916fa000 kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
916fa000 91735000 Apfiltr Apfiltr.sys Fri Nov 27 13:34:15 2009 (4B0FD557)
91735000 91742000 mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
91742000 9174c000 tdcmdpst tdcmdpst.sys Thu Jul 30 09:26:19 2009 (4A71592B)
9174c000 9176ab00 Impcd Impcd.sys Mon Oct 26 20:39:02 2009 (4AE608E6)
9176b000 91772000 TVALZFL TVALZFL.sys Fri Jun 19 11:27:46 2009 (4A3B6822)
91772000 91774600 tosrfec tosrfec.sys Mon Jun 01 07:58:51 2009 (4A237C2B)
91775000 91778700 CmBatt CmBatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
91779000 91786000 CompositeBus CompositeBus.sys Tue Jul 14 00:45:26 2009 (4A5BC716)
91786000 91798000 AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
91798000 917b0000 rasl2tp rasl2tp.sys Tue Jul 14 00:54:33 2009 (4A5BC939)
917b0000 917bb000 ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
917bb000 917dd000 ndiswan ndiswan.sys Tue Jul 14 00:54:34 2009 (4A5BC93A)
917dd000 917f5000 raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
917f5000 917ff000 rdpbus rdpbus.sys Tue Jul 14 01:02:40 2009 (4A5BCB20)
92405000 926abf40 RTKVHDA RTKVHDA.sys Fri Oct 30 10:13:44 2009 (4AEABC58)
926ac000 926db000 portcls portcls.sys Tue Jul 14 00:51:00 2009 (4A5BC864)
926db000 926f4000 drmk drmk.sys Tue Jul 14 01:36:05 2009 (4A5BD2F5)
926f4000 9272e000 IntcDAud IntcDAud.sys Fri Oct 30 14:55:29 2009 (4AEAFE61)
9272e000 92738200 tosporte tosporte.sys Tue Jun 16 11:48:40 2009 (4A377888)
92739000 92750000 usbccgp usbccgp.sys Tue Jul 14 00:51:31 2009 (4A5BC883)
92750000 92751700 USBD USBD.SYS Tue Jul 14 00:51:05 2009 (4A5BC869)
92752000 92775b80 usbvideo usbvideo.sys Thu Mar 04 04:04:40 2010 (4B8F3158)
92776000 9277be00 pgeffect pgeffect.sys Mon Jun 22 10:04:57 2009 (4A3F4939)
9277c000 92786b80 tosrfusb tosrfusb.sys Fri Sep 11 10:37:04 2009 (4AAA1A40)
92787000 927af000 tosrfbd tosrfbd.sys Thu Sep 24 05:57:10 2009 (4ABAFC26)
927af000 927c1280 Tosrfhid Tosrfhid.sys Wed May 20 02:23:34 2009 (4A135B96)
927c2000 927cc000 Dxapi Dxapi.sys Tue Jul 14 00:25:25 2009 (4A5BC265)
927cc000 927d9000 crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
927d9000 927ea000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
927ea000 927f5000 monitor monitor.sys Tue Jul 14 00:25:58 2009 (4A5BC286)
927f5000 927f7b00 aswFsBlk aswFsBlk.SYS Tue May 10 12:59:33 2011 (4DC928A5)
97400000 97409000 TSDDD TSDDD.dll unavailable (00000000)
97430000 9744e000 cdd cdd.dll unavailable (00000000)
97450000 9749d000 ATMFD ATMFD.DLL unavailable (00000000)
975a0000 977eb000 win32k win32k.sys unavailable (00000000)
acc0b000 acc90000 HTTP HTTP.sys Tue Jul 14 00:12:53 2009 (4A5BBF75)
acc90000 acca9000 bowser bowser.sys Wed Feb 23 05:05:24 2011 (4D649594)
acca9000 accbb000 mpsdrv mpsdrv.sys Tue Jul 14 00:52:52 2009 (4A5BC8D4)
accbb000 accde000 mrxsmb mrxsmb.sys Wed Feb 23 05:05:29 2011 (4D649599)
accde000 acd19000 mrxsmb10 mrxsmb10.sys Wed Feb 23 05:05:39 2011 (4D6495A3)
acd19000 acd34000 mrxsmb20 mrxsmb20.sys Wed Feb 23 05:05:33 2011 (4D64959D)
acd4c000 acd4fb80 AVGIDSShim AVGIDSShim.Sys Thu Feb 10 04:59:09 2011 (4D53709D)
Unloaded modules:
acd34000 acd4c000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
89439000 89446000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
89446000 895f9000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 001B3000
891ed000 891fe000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
8ef21000 8ef42000 tunnel.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00021000