041611-17706-01.dmp
BugCheck 24, {1904fb, fffff880059c5338, fffff880059c4ba0, fffff800028ac1d6}
Probably caused by : Ntfs.sys ( Ntfs!NtfsExtendedCompleteRequestInternal+114 )
041611-27268-01.dmp
BugCheck 1000007E, {ffffffffc0000005, fffff880015769eb, fffff88002fd1618, fffff88002fd0e80}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )
041611-17706-01.dmp
BugCheck 24, {1904fb, fffff880059c5338, fffff880059c4ba0, fffff800028ac1d6}
Probably caused by : Ntfs.sys ( Ntfs!NtfsExtendedCompleteRequestInternal+114 )
041611-27268-01.dmp
BugCheck 1000007E, {ffffffffc0000005, fffff880015769eb, fffff88002fd1618, fffff88002fd0e80}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-17706-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02866000 PsLoadedModuleList = 0xfffff800`02aa3e50
Debug session time: Sun Apr 17 02:43:00.404 2011 (UTC - 4:00)
System Uptime: 0 days 1:14:06.027
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880059c5338, fffff880059c4ba0, fffff800028ac1d6}
Probably caused by : Ntfs.sys ( Ntfs!NtfsExtendedCompleteRequestInternal+114 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880059c5338
Arg3: fffff880059c4ba0
Arg4: fffff800028ac1d6
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880059c5338 -- (.exr 0xfffff880059c5338)
ExceptionAddress: fffff800028ac1d6 (nt!ExfReleasePushLock+0x00000000000004ab)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880059c4ba0 -- (.cxr 0xfffff880059c4ba0)
rax=485b5c2cb4cfb35f rbx=fffffa8003deee50 rcx=485b5c2cb4cfb350
rdx=fffffa80061f0950 rsi=fffffa80061f0950 rdi=0000000000000000
rip=fffff800028ac1d6 rsp=fffff880059c5570 rbp=fffffa8004602010
r8=fffffa80061f09b0 r9=0000000000000000 r10=fffff80002a52c00
r11=0000000000000000 r12=fffffa8004602580 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ExfReleasePushLock+0x4ab:
fffff800`028ac1d6 488b5120 mov rdx,qword ptr [rcx+20h] ds:002b:485b5c2c`b4cfb370=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ccSvcHst.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0e0e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsExtendedCompleteRequestInternal+114
fffff880`0145ecb4 488b5c2450 mov rbx,qword ptr [rsp+50h]
FAULTING_IP:
nt!ExfReleasePushLock+4ab
fffff800`028ac1d6 488b5120 mov rdx,qword ptr [rcx+20h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff88001158a99 to fffff800028ac1d6
STACK_TEXT:
fffff880`059c5570 fffff880`01158a99 : ffffffff`ffffffff fffffa80`062ea830 00000000`00000000 00000000`00000000 : nt!ExfReleasePushLock+0x4ab
fffff880`059c55f0 fffff880`011622af : fffffa80`03deee50 fffffa80`061f0950 00000000`00000000 00000000`00000000 : fltmgr! ?? ::NNGAKEGL::`string'+0x9c3
fffff880`059c5630 fffff880`01159a30 : fffffa80`081a9890 fffffa80`04602010 00000000`00000000 fffffa80`07dc1f68 : fltmgr!FltpPurgeVolumeNameCache+0x7f
fffff880`059c5670 fffff880`01152d4b : fffffa80`04602010 00000000`00000000 fffffa80`0830b8e0 00000000`00000000 : fltmgr! ?? ::NNGAKEGL::`string'+0x1a04
fffff880`059c56b0 fffff880`0113506a : fffffa80`081e4620 fffffa80`045fbae0 fffff8a0`0828a670 fffff800`02a0b2dd : fltmgr!FltpReinstateNameCachingAllFrames+0x4b
fffff880`059c56e0 fffff800`028d8d26 : 00000000`00000000 fffff880`011340a2 fffffa80`081e46d0 00000000`00000000 : fltmgr!FltpPassThroughCompletion+0x8a
fffff880`059c5720 fffff880`0145ecb4 : fffffa80`07081ca0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`059c5800 fffff880`014e5eda : fffff8a0`0745bbc0 fffffa80`04603180 00000000`00000000 00000000`00000701 : Ntfs!NtfsExtendedCompleteRequestInternal+0x114
fffff880`059c5840 fffff880`01457ba0 : fffffa80`07081ca0 fffffa80`07dc1c10 fffff880`059c5901 fffff880`059c5900 : Ntfs!NtfsCommonSetInformation+0xef1
fffff880`059c5920 fffff880`0113223f : fffffa80`07dc1fb0 fffffa80`07dc1c10 fffffa80`07081ca0 fffff880`059c5948 : Ntfs!NtfsFsdSetInformation+0x11c
fffff880`059c59a0 fffff880`011306df : fffffa80`045fbae0 fffffa80`07dc1c10 fffffa80`045fba00 fffffa80`07dc1c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`059c5a30 fffff800`02bb962d : 00000000`000000f2 fffff880`059c5ca0 00000000`00000000 fffffa80`06f3c210 : fltmgr!FltpDispatch+0xcf
fffff880`059c5a90 fffff800`028d5993 : 00000000`00002484 fffffa80`07367860 00000000`028be6b8 fffff800`000000f2 : nt!NtSetInformationFile+0x909
fffff880`059c5bb0 00000000`7711ffca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028be698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7711ffca
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: Ntfs!NtfsExtendedCompleteRequestInternal+114
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bea1fc7
STACK_COMMAND: .cxr 0xfffff880059c4ba0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsExtendedCompleteRequestInternal+114
BUCKET_ID: X64_0x24_Ntfs!NtfsExtendedCompleteRequestInternal+114
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-27268-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aa5e50
Debug session time: Sun Apr 17 01:24:18.776 2011 (UTC - 4:00)
System Uptime: 0 days 0:28:17.493
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880015769eb, fffff88002fd1618, fffff88002fd0e80}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880015769eb, The address that the exception occurred at
Arg3: fffff88002fd1618, Exception Record Address
Arg4: fffff88002fd0e80, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
NETIO!KfdClassify+76e
fffff880`015769eb 458b422c mov r8d,dword ptr [r10+2Ch]
EXCEPTION_RECORD: fffff88002fd1618 -- (.exr 0xfffff88002fd1618)
ExceptionAddress: fffff880015769eb (NETIO!KfdClassify+0x000000000000076e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002fd0e80 -- (.cxr 0xfffff88002fd0e80)
rax=fffff88002fd1970 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800608e030 rsi=fffff88002fd1c20 rdi=0000000000000000
rip=fffff880015769eb rsp=fffff88002fd1850 rbp=fffffa800450abf0
r8=0000000000000000 r9=0000000000000000 r10=0f7b9424981a9cec
r11=fffffa800608e010 r12=fffffa800366e780 r13=0000000000000010
r14=ffffffffffffffff r15=fffff88002fd1c10
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
NETIO!KfdClassify+0x76e:
fffff880`015769eb 458b422c mov r8d,dword ptr [r10+2Ch] ds:002b:0f7b9424`981a9d18=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b100e0
ffffffffffffffff
FOLLOWUP_IP:
NETIO!KfdClassify+76e
fffff880`015769eb 458b422c mov r8d,dword ptr [r10+2Ch]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001622cc3 to fffff880015769eb
STACK_TEXT:
fffff880`02fd1850 fffff880`01622cc3 : fffffa80`0821f7c0 fffff880`02fd1c10 00000000`00000001 fffffa80`08381d30 : NETIO!KfdClassify+0x76e
fffff880`02fd1bc0 fffff880`016373f5 : fffffa80`0821f7c0 00000000`00000006 00000000`00000006 00000000`00000001 : tcpip!ProcessOutboundTransportLayerClassify+0x223
fffff880`02fd1d70 fffff880`01665ef6 : 00000000`00000000 fffff880`00000000 00000000`00006cec fffffa80`082152c4 : tcpip!WfpProcessOutTransportStackIndication+0x705
fffff880`02fd1f40 fffff880`0166b1ee : fffffa80`04551490 fffff880`01571807 fffff880`0176d9a0 fffffa80`0821f7c0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`02fd2210 fffff880`0165de2a : fffffa80`084dacf0 00000000`00000000 00000000`00000002 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`02fd2250 fffff880`01670059 : 00000000`000008fe 00000000`00000000 fffffa80`04525f02 00000000`00000000 : tcpip!TcpTcbHeaderSend+0x5ea
fffff880`02fd2400 fffff880`0167011c : fffffa80`0821f7c0 fffffa80`084dacf0 00000000`00000014 fffffa80`040c8500 : tcpip!TcpAcceptFin+0x89
fffff880`02fd2470 fffff880`01733081 : fffffa80`084dacf0 00000001`20000001 ffff0000`038b5522 fffff880`01678474 : tcpip!TcpAllowFin+0x5c
fffff880`02fd24a0 fffff880`016bcf8a : 00000000`f3401dd2 fffff880`02fd2760 00000000`f3401dd2 fffff880`01582eb9 : tcpip!TcpInspectFin+0x31
fffff880`02fd24d0 fffff880`01679334 : 00000000`00000006 fffffa80`08040002 fffffa80`082d6cec 00000000`000052c4 : tcpip! ?? ::FNODOBFM::`string'+0x3e345
fffff880`02fd2680 fffff880`0167d86a : fffffa80`04551490 00000000`00000007 fffffa80`04510158 fffffa80`0835d580 : tcpip!TcpTcbReceive+0x694
fffff880`02fd2830 fffff880`0167d4df : fffffa80`081f1fd0 fffffa80`082d3d00 fffffa80`0835d580 fffff880`01660700 : tcpip!TcpMatchReceive+0x1fa
fffff880`02fd2980 fffff880`0165f6c7 : fffffa80`082d51c4 fffffa80`04536cec fffffa80`045551c4 00000000`0000000e : tcpip!TcpPreValidatedReceive+0x29f
fffff880`02fd2a30 fffff880`0165f799 : fffff880`02fd2bb0 fffff880`0176d9a0 fffff880`02fd2bc0 fffffa80`036cc000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`02fd2af0 fffff880`0165fc90 : 00000000`00000000 fffffa80`08660080 00000000`00000000 fffff880`02fd2bb0 : tcpip!IppProcessDeliverList+0x59
fffff880`02fd2b60 fffff880`016367c2 : fffffa80`036db680 fffff880`03a1501e 00000000`00000000 fffff880`01771f90 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`02fd2c40 fffff800`02bd4c43 : fffffa80`044fec30 fffff800`02a7d5f8 fffffa80`036db680 fffffa80`0452bb80 : tcpip!IppLoopbackTransmit+0x72
fffff880`02fd2c80 fffff800`028e5961 : fffff800`02a7d500 fffff800`02bd4c20 fffffa80`036db680 fffff800`02a7d5f8 : nt!IopProcessWorkItem+0x23
fffff880`02fd2cb0 fffff800`02b7cc06 : 82220100`00053484 fffffa80`036db680 00000000`00000080 fffffa80`036c65f0 : nt!ExpWorkerThread+0x111
fffff880`02fd2d40 fffff800`028b6c26 : fffff880`009e9180 fffffa80`036db680 fffff880`009f3f40 18008005`018c4189 : nt!PspSystemThreadStartup+0x5a
fffff880`02fd2d80 00000000`00000000 : fffff880`02fd3000 fffff880`02fcd000 fffff880`02fd29f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!KfdClassify+76e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
STACK_COMMAND: .cxr 0xfffff88002fd0e80 ; kb
FAILURE_BUCKET_ID: X64_0x7E_NETIO!KfdClassify+76e
BUCKET_ID: X64_0x7E_NETIO!KfdClassify+76e
Followup: MachineOwner
---------
start end module name
fffff880`00f2b000 fffff880`00f82000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a13000 fffff880`03a9d000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`041c3000 fffff880`041d9000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`013df000 fffff880`013f4000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01071000 fffff880`0107c000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`072b3000 fffff880`07345000 athrxusb athrxusb.sys Mon Jan 29 07:57:10 2007 (45BDEF26)
fffff960`00900000 fffff960`00961000 ATMFD ATMFD.DLL Thu May 27 00:11:31 2010 (4BFDF0F3)
fffff880`0191e000 fffff880`01925000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`05ae4000 fffff880`05bcf000 BHDrvx64 BHDrvx64.sys Sat Aug 07 22:20:38 2010 (4C5E1476)
fffff880`03be4000 fffff880`03bf5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03587000 fffff880`035a5000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00790000 fffff960`007b7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`05aba000 fffff880`05ad7000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`018eb000 fffff880`01915000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ca0000 fffff880`00d60000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01851000 fffff880`01881000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c42000 fffff880`00ca0000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0113a000 fffff880`011ad000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`041b3000 fffff880`041c3000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04b05000 fffff880`04b13000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03bc6000 fffff880`03be4000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03bb7000 fffff880`03bc6000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183b000 fffff880`01851000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04add000 fffff880`04aff000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04b5c000 fffff880`04b6f000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04b1d000 fffff880`04b5c000 dump_nvstor64 dump_nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`04b13000 fffff880`04b1d000 dump_storport dump_storport.sys Mon Jul 13 20:01:00 2009 (4A5BCABC)
fffff880`04b6f000 fffff880`04b7b000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04079000 fffff880`0416d000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0416d000 fffff880`041b3000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`06400000 fffff880`06420000 ENG64 ENG64.SYS Fri Mar 04 17:02:16 2011 (4D716168)
fffff880`06435000 fffff880`065f8000 EX64 EX64.SYS Fri Mar 04 17:10:51 2011 (4D71636B)
fffff880`010c8000 fffff880`010dc000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0107c000 fffff880`010c8000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d5000 fffff880`013df000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01801000 fffff880`0183b000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`0281f000 fffff800`02868000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03f57000 fffff880`03f7b000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04b97000 fffff880`04bb0000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04bb0000 fffff880`04bb8080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04b89000 fffff880`04b97000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`034bf000 fffff880`03587000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01464000 fffff880`0146d000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`05900000 fffff880`05976000 IDSVia64 IDSVia64.sys Thu May 27 04:07:18 2010 (4BFE2836)
fffff880`059c2000 fffff880`059ee000 Ironx64 Ironx64.SYS Wed Jun 23 20:28:49 2010 (4C22A6C1)
fffff880`10bce000 fffff880`10bdd000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0480d000 fffff880`0481b000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00baf000 fffff800`00bb9000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0fe00000 fffff880`0fe43000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013aa000 fffff880`013c4000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015cf000 fffff880`015fa000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04aff000 fffff880`04b04200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04bbb000 fffff880`04bd0000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03ecb000 fffff880`03eee000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c21000 fffff880`00c2e000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04828000 fffff880`04836000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`10bdd000 fffff880`10bec000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0481b000 fffff880`04828000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e5c000 fffff880`00e76000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`035a5000 fffff880`035bd000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`035bd000 fffff880`035ea000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03400000 fffff880`0344e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0344e000 fffff880`03471000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01983000 fffff880`0198e000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f8b000 fffff880`00f95000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010dc000 fffff880`0113a000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03bac000 fffff880`03bb7000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01452000 fffff880`01464000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0147d000 fffff880`0156f000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04000000 fffff880`0400c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`07398000 fffff880`073ab000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0400c000 fffff880`0403b000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe55000 fffff880`0fe6a000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03b11000 fffff880`03b20000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03a9d000 fffff880`03ae2000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0156f000 fffff880`015cf000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0198e000 fffff880`0199f000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03ba0000 fffff880`03bac000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02868000 fffff800`02e44000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01208000 fffff880`013aa000 Ntfs Ntfs.sys Tue May 11 23:25:59 2010 (4BEA1FC7)
fffff880`01915000 fffff880`0191e000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10bb2000 fffff880`10bb3180 nvBridge nvBridge.kmd Thu Apr 01 04:26:11 2010 (4BB458A3)
fffff880`0fe79000 fffff880`10bb1500 nvlddmkm nvlddmkm.sys Thu Apr 01 04:36:51 2010 (4BB45B23)
fffff880`03f7b000 fffff880`03fcea80 nvmf6264 nvmf6264.sys Thu Mar 04 20:04:39 2010 (4B9058A7)
fffff880`00d60000 fffff880`00d9f000 nvstor64 nvstor64.sys Tue Aug 04 20:31:07 2009 (4A78D2CB)
fffff880`07345000 fffff880`07398000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03aeb000 fffff880`03b11000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fd5000 fffff880`00fea000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f95000 fffff880`00fc8000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`013c4000 fffff880`013d5000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04e4d000 fffff880`04ef3000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04aa0000 fffff880`04add000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c2e000 fffff880`00c42000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`041d9000 fffff880`041fd000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0403b000 fffff880`04056000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04056000 fffff880`04077000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`10bb4000 fffff880`10bce000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03b4f000 fffff880`03ba0000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01968000 fffff880`01971000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01971000 fffff880`0197a000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0197a000 fffff880`01983000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`00d9f000 fffff880`00dd9000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01881000 fffff880`01899000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04843000 fffff880`04a9fd00 RTKVHD64 RTKVHD64.sys Tue Sep 07 07:17:23 2010 (4C861F43)
fffff880`04ef3000 fffff880`04efe000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0144a000 fffff880`01452000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05a00000 fffff880`05aba000 SRTSP64 SRTSP64.SYS Tue Jul 27 18:18:25 2010 (4C4F5B31)
fffff880`059ac000 fffff880`059c2000 SRTSPX64 SRTSPX64.SYS Tue Jul 27 18:18:31 2010 (4C4F5B37)
fffff880`05236000 fffff880`052cc000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`04f3d000 fffff880`04fa5000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`04efe000 fffff880`04f2b000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`0100f000 fffff880`01071000 storport storport.sys Wed May 12 00:14:15 2010 (4BEA2B17)
fffff880`04077000 fffff880`04078480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`052fd000 fffff880`0536e000 SYMDS64 SYMDS64.SYS Mon May 17 21:12:48 2010 (4BF1E990)
fffff880`05832000 fffff880`05900000 SYMEFA64 SYMEFA64.SYS Thu Jul 22 22:19:55 2010 (4C48FC4B)
fffff880`05976000 fffff880`059ac000 SYMEVENT64x86 SYMEVENT64x86.SYS Fri Jul 30 19:05:59 2010 (4C535AD7)
fffff880`0536e000 fffff880`053d4000 SYMNETS SYMNETS.SYS Tue Jul 06 23:22:28 2010 (4C33F2F4)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`04f2b000 fffff880`04f3d000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019bd000 fffff880`019ca000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0199f000 fffff880`019bd000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03b3b000 fffff880`03b4f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00480000 fffff960`0048a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019ca000 fffff880`019f0000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0fe43000 fffff880`0fe55000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04bb9000 fffff880`04bbaf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03f46000 fffff880`03f57000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`03e00000 fffff880`03e5a000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`03bf5000 fffff880`03c00000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03ef0000 fffff880`03f46000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04bd6000 fffff880`04bf1000 USBSTOR USBSTOR.SYS Wed May 12 00:21:12 2010 (4BEA2CB8)
fffff880`00fc8000 fffff880`00fd5000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01925000 fffff880`01933000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01933000 fffff880`01958000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fea000 fffff880`00fff000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011ad000 fffff880`011f9000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b20000 fffff880`03b3b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01958000 fffff880`01968000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e78000 fffff880`00f1c000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f1c000 fffff880`00f2b000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03ae2000 fffff880`03aeb000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`0032f000 win32k win32k.sys Sat Jun 19 00:31:59 2010 (4C1C483F)
fffff880`00f82000 fffff880`00f8b000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03fcf000 fffff880`03ff0000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`052cc000 fffff880`052fd000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`06400000 fffff880`06420000 ENG64.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00020000
fffff880`06427000 fffff880`065e5000 EX64.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 001BE000
fffff880`07200000 fffff880`07271000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`03e5a000 fffff880`03ecb000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`065d6000 fffff880`065f6000 ENG64.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00020000
fffff880`06418000 fffff880`065d6000 EX64.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 001BE000
fffff880`04b7b000 fffff880`04b89000 monitor.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`04800000 fffff880`0480d000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04bf1000 fffff880`04bff000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`04bbb000 fffff880`04bc8000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04bc8000 fffff880`04bd6000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01881000 fffff880`0188f000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0188f000 fffff880`01899000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`01899000 fffff880`018d8000 dump_nvstor6
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0003F000
fffff880`018d8000 fffff880`018eb000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000