Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\090310-19000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x81a4a000 PsLoadedModuleList = 0x81b92810
Debug session time: Fri Sep 3 14:02:28.975 2010 (GMT-33)
System Uptime: 1 days 3:14:06.678
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 81c6cd8a, a72f9abc, 0}
Unable to load image \SystemRoot\System32\Drivers\aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
Probably caused by : aswSP.SYS
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 81c6cd8a, The address that the exception occurred at
Arg3: a72f9abc, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ObInsertObjectEx+97
81c6cd8a f6402a08 test byte ptr [eax+2Ah],8
TRAP_FRAME: a72f9abc -- (.trap 0xffffffffa72f9abc)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=a72f9cf4 edx=00000000 esi=a72f9ca4 edi=a72f9cbc
eip=81c6cd8a esp=a72f9b30 ebp=a72f9ca0 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ObInsertObjectEx+0x97:
81c6cd8a f6402a08 test byte ptr [eax+2Ah],8 ds:0023:0000002a=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x8E
PROCESS_NAME: winamp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 81c6ccea to 81c6cd8a
STACK_TEXT:
a72f9ca0 81c6ccea 00000000 001f0003 00000000 nt!ObInsertObjectEx+0x97
a72f9cbc 81cab723 83b1c220 00000000 001f0003 nt!ObInsertObject+0x1e
a72f9d18 81a8d44a 00000000 001f0003 01d3ef90 nt!NtCreateEvent+0xba
a72f9d18 777564f4 00000000 001f0003 01d3ef90 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
01d3efb0 00000000 00000000 00000000 00000000 0x777564f4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
81c6ccf3-81c6ccf7 5 bytes - nt!ObInsertObjectEx
[ 8b ff 55 8b ec:e9 da d2 7e 09 ]
5 errors : !nt (81c6ccf3-81c6ccf7)
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4c290808
FOLLOWUP_NAME: MachineOwner
MEMORY_CORRUPTOR: PATCH_aswSP
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_PATCH_aswSP
BUCKET_ID: MEMORY_CORRUPTION_PATCH_aswSP
Followup: MachineOwner
---------
0: kd> lmvm aswSP
start end module name
8b447000 8b46dc00 aswSP T (no symbols)
Loaded symbol image file: aswSP.SYS
Image path: \SystemRoot\System32\Drivers\aswSP.SYS
Image name: aswSP.SYS
Timestamp: Mon Jun 28 23:37:28 2010 (4C290808)
CheckSum: 00038508
ImageSize: 00026C00
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\090510-37533-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x81a03000 PsLoadedModuleList = 0x81b4b810
Debug session time: Fri Sep 3 14:04:09.514 2010 (GMT-5)
System Uptime: 0 days 0:00:31.202
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {89b6b824, 0, 0, 81a8a9b5}
Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+2cf )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 89b6b824, memory referenced
Arg2: 00000000, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81a8a9b5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 81b6b718
Unable to read MiSystemVaType memory at 81b4b160
89b6b824
CURRENT_IRQL: 0
FAULTING_IP:
nt!MmAccessFault+21b6
81a8a9b5 0b0cd564b7b681 or ecx,dword ptr nt!MmProtectToPteMask+0x4 (81b6b764)[edx*8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: LogonUI.exe
TRAP_FRAME: 8fc83c3c -- (.trap 0xffffffff8fc83c3c)
ErrCode = 00000000
eax=0005970a ebx=835c8518 ecx=00000000 edx=01000018 esi=835c8518 edi=85632030
eip=81a8a9b5 esp=8fc83cb0 ebp=8fc83d1c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MmAccessFault+0x21b6:
81a8a9b5 0b0cd564b7b681 or ecx,dword ptr nt!MmProtectToPteMask+0x4 (81b6b764)[edx*8] ds:0023:89b6b824=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a8a9b5 to 81a4982b
STACK_TEXT:
8fc83c3c 81a8a9b5 badb0d00 01000018 8fc83cb8 nt!KiTrap0E+0x2cf
8fc83d1c 81a49638 00000000 71e39dc0 00000001 nt!MmAccessFault+0x21b6
8fc83d1c 71e39dc0 00000000 71e39dc0 00000001 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
02effd24 00000000 00000000 00000000 00000000 0x71e39dc0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+2cf
81a4982b 833dc46ab68100 cmp dword ptr [nt!KiFreezeFlag (81b66ac4)],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTrap0E+2cf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
FAILURE_BUCKET_ID: 0xA_nt!KiTrap0E+2cf
BUCKET_ID: 0xA_nt!KiTrap0E+2cf
Followup: MachineOwner
---------
start end module name
818d3000 818db000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
81a03000 81e13000 nt ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
81e13000 81e4a000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
87c00000 87c0e000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
87c10000 87c88000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
87c88000 87c99000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
87c99000 87ca1000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
87ca1000 87ce3000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
87ce3000 87d8e000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
87d8e000 87dff000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
87e0f000 87e57000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
87e57000 87e60000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
87e60000 87e68000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
87e68000 87e92000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
87e92000 87e9d000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
87e9d000 87eae000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
87eae000 87eb6000 compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
87eb6000 87ec1000 BATTC BATTC.SYS Tue Jul 14 02:19:15 2009 (4A5BC0F3)
87ec1000 87ed1000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
87ed1000 87f1c000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
87f1c000 87f23000 intelide intelide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
87f23000 87f31000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
87f31000 87f47000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
87f47000 87f50000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
87f50000 87f73000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
87f73000 87f7c000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
87f7c000 87fb0000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
87fb0000 87fc1000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
87fc1000 87fe2000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
87fe2000 87ff0000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
88000000 8800e000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8800e000 88017000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
88017000 8801f000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8801f000 88027000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
88027000 88032000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
88033000 88162000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
88162000 8818d000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8818d000 881a0000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
881a0000 881fd000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
88200000 8820c000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
8820c000 88219000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
88219000 88221000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
88223000 882da000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
882da000 88318000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
88318000 8833d000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6)
8833d000 8834d000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8834d000 88355000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
88355000 88387000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55)
88387000 88398000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
88398000 883bd000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
883ef000 883f6000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
883f6000 883fd000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
88402000 8854b000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB)
8854b000 8857c000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8857c000 88584380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
88585000 885c4000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
885c4000 885cc000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
885cc000 885cd480 speedfan speedfan.sys Sun Sep 24 16:28:47 2006 (4516880F)
885ce000 885fb000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
885fb000 885fb680 giveio giveio.sys Thu Apr 04 05:33:25 1996 (316334F5)
8b812000 8b876000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
8b876000 8b88e000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
8b88e000 8b89c000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
8b89c000 8b8c2c00 aswSP aswSP.SYS Mon Jun 28 23:37:28 2010 (4C290808)
8b8c3000 8b8e4000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
8b8e4000 8b91d000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
8b91d000 8b95c000 Rt86win7 Rt86win7.sys Sat Dec 19 11:11:16 2009 (4B2C98B4)
8b95c000 8b9bf000 RTL8187Se RTL8187Se.sys Thu Oct 29 05:24:06 2009 (4AE90AD6)
8ba02000 8ba4d000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
8ba4d000 8ba5c000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
8ba5c000 8ba74000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
8ba74000 8ba81000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8ba81000 8ba8e000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8ba8e000 8ba91700 CmBatt CmBatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
8ba92000 8ba9b000 wmiacpi wmiacpi.sys Tue Jul 14 02:19:16 2009 (4A5BC0F4)
8ba9b000 8baad000 intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
8baad000 8baba000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
8baba000 8bacc000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
8bacc000 8bae4000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
8bae4000 8baef000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
8baef000 8bb11000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
8bb11000 8bb29000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
8bb29000 8bb40000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
8bb40000 8bb57000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
8bb57000 8bb61000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
8bb61000 8bb62380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
8bb63000 8bb97000 ks ks.sys Tue Jul 14 02:45:13 2009 (4A5BC709)
8bb97000 8bba5000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
8bba5000 8bbe9000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
8bbe9000 8bbfa000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
8c033000 8c04a000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8c04a000 8c055000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8c055000 8c05ec00 aswTdi aswTdi.SYS Mon Jun 28 23:37:50 2010 (4C29081E)
8c05f000 8c0b9000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
8c0b9000 8c0bd100 aswRdr aswRdr.SYS Mon Jun 28 23:33:12 2010 (4C290708)
8c0be000 8c0f0000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
8c0f0000 8c0f7000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
8c0f7000 8c116000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
8c116000 8c127000 vwififlt vwififlt.sys Tue Jul 14 02:52:03 2009 (4A5BC8A3)
8c127000 8c135000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
8c135000 8c148000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
8c148000 8c158000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
8c158000 8c199000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8c199000 8c1a3000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8c1a3000 8c1ad000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8c1ad000 8c1b9000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8c600000 8c61f000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
8c61f000 8c629000 vwifibus vwifibus.sys Tue Jul 14 02:52:02 2009 (4A5BC8A2)
8c629000 8c634000 usbuhci usbuhci.sys Tue Jul 14 02:51:10 2009 (4A5BC86E)
8c636000 8cb3f000 igdkmd32 igdkmd32.sys Wed Sep 23 22:18:09 2009 (4ABA7471)
8cb3f000 8cbf6000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
8ed40000 8ef8a000 win32k win32k.sys Sat Jun 19 07:06:50 2010 (4C1C425A)
8efa0000 8efa9000 TSDDD TSDDD.dll unavailable (00000000)
8efd0000 8efee000 cdd cdd.dll Tue Jul 14 04:04:18 2009 (4A5BD992)
91819000 91869000 HdAudio HdAudio.sys Tue Jul 14 02:51:46 2009 (4A5BC892)
91869000 91898000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
91898000 918b1000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
918b1000 918be000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
918be000 918c8000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
918c8000 918d3000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
918d3000 918ea000 USBSTOR USBSTOR.SYS Tue Jul 14 02:51:19 2009 (4A5BC877)
918ea000 918eb700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
918ec000 918f5000 dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
918f5000 91906000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
91906000 91911000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
91911000 9192c000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
9192c000 91943000 aswMonFlt aswMonFlt.sys Mon Jun 28 23:32:55 2010 (4C2906F7)
91943000 91945b00 aswFsBlk aswFsBlk.SYS Mon Jun 28 23:32:32 2010 (4C2906E0)
91946000 91960000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
91960000 91970000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
91970000 919b6000 nwifi nwifi.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
919b6000 919c6000 ndisuio ndisuio.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
919c6000 919d9000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
Unloaded modules:
883bd000 883ca000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
883ca000 883d5000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
883d5000 883de000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
883de000 883ef000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
88200000 8821f000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000