ugCheck 1000007E, {c0000005, 82ca9eae, 8ad3fb48, 8ad3f720}
PROCESS_NAME: System
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
Probably caused by : ntkrpamp.exe ( nt!IoGetAttachedDevice+c )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021511-21340-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82a4f000 PsLoadedModuleList = 0x82b97810
Debug session time: Tue Feb 15 04:38:25.083 2011 (UTC - 5:00)
System Uptime: 0 days 0:09:15.862
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 801dc000, 0, 0}
Probably caused by : ntkrpamp.exe ( nt!KeAccumulateTicks+ba )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801dc000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WoW-4.0.0-WOW-
CURRENT_IRQL: 1c
LAST_CONTROL_TRANSFER: from 82aba462 to 82abac8b
STACK_TEXT:
a68db020 82aba462 00002710 00000000 00008b00 nt!KeAccumulateTicks+0xba
a68db060 82aba30f 82a95ab7 fe25008c 00000000 nt!KeUpdateRunTime+0x145
a68db0b8 82abf67f 00000000 00000000 000000d1 nt!KeUpdateSystemTime+0x613
a68db0b8 82a95ab7 00000000 00000000 000000d1 nt!KeUpdateSystemTimeAssist+0x13
a68db140 82a9431c badb0d00 86542d48 fdb79d42 nt!KiTrap10+0x93
a68db1b4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db228 82a9431c badb0d00 86542d48 fd0b3439 nt!KiTrap07+0xb4
a68db29c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db310 82a9431c badb0d00 86542d48 fc95feeb nt!KiTrap07+0xb4
a68db384 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db3f8 82a9431c badb0d00 86542d48 fbc5512b nt!KiTrap07+0xb4
a68db46c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db4e0 82a9431c badb0d00 86542d48 fb2c0f02 nt!KiTrap07+0xb4
a68db554 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db5c8 82a9431c badb0d00 86542d48 fb07f1dc nt!KiTrap07+0xb4
a68db63c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db6b0 82a9431c badb0d00 86542d48 fac82ed4 nt!KiTrap07+0xb4
a68db724 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db798 82a9431c badb0d00 86542d48 fa84b687 nt!KiTrap07+0xb4
a68db80c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db880 82a9431c badb0d00 86542d48 f9eb2e37 nt!KiTrap07+0xb4
a68db8f4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db968 82a9431c badb0d00 86542d48 f9c7fa5c nt!KiTrap07+0xb4
a68db9dc 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dba50 82a9431c badb0d00 86542d48 f9641753 nt!KiTrap07+0xb4
a68dbac4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbb38 82a9431c badb0d00 86542d48 f8f88bfd nt!KiTrap07+0xb4
a68dbbac 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbc20 82a9431c badb0d00 86542d48 f8af1bc2 nt!KiTrap07+0xb4
a68dbc94 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbd08 82a9431c badb0d00 86542d48 f85eb4c6 nt!KiTrap07+0xb4
a68dbd7c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbdf0 82a9431c badb0d00 86542d48 f81fa059 nt!KiTrap07+0xb4
a68dbe64 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbed8 82a9431c badb0d00 86542d48 f7d7e890 nt!KiTrap07+0xb4
a68dbf4c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbfc0 00000000 badb0d00 86542d48 f7241c10 nt!KiTrap07+0xb4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeAccumulateTicks+ba
82abac8b 6a00 push 0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeAccumulateTicks+ba
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
FAILURE_BUCKET_ID: 0x7f_8_nt!KeAccumulateTicks+ba
BUCKET_ID: 0x7f_8_nt!KeAccumulateTicks+ba
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021511-21606-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82c18000 PsLoadedModuleList = 0x82d60810
Debug session time: Tue Feb 15 17:33:30.862 2011 (UTC - 5:00)
System Uptime: 0 days 12:43:12.750
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82ca9eae, 8ad3fb48, 8ad3f720}
Probably caused by : ntkrpamp.exe ( nt!IoGetAttachedDevice+c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ca9eae, The address that the exception occurred at
Arg3: 8ad3fb48, Exception Record Address
Arg4: 8ad3f720, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IoGetAttachedDevice+c
82ca9eae 8b4810 mov ecx,dword ptr [eax+10h]
EXCEPTION_RECORD: 8ad3fb48 -- (.exr 0xffffffff8ad3fb48)
ExceptionAddress: 82ca9eae (nt!IoGetAttachedDevice+0x0000000c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 0000002c
Attempt to read from address 0000002c
CONTEXT: 8ad3f720 -- (.cxr 0xffffffff8ad3f720)
eax=0000001c ebx=85904c18 ecx=0000001c edx=746c6644 esi=00000800 edi=85d3c9e0
eip=82ca9eae esp=8ad3fc10 ebp=8ad3fc10 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!IoGetAttachedDevice+0xc:
82ca9eae 8b4810 mov ecx,dword ptr [eax+10h] ds:0023:0000002c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 0000002c
READ_ADDRESS: GetPointerFromAddress: unable to read from 82d80718
Unable to read MiSystemVaType memory at 82d60160
0000002c
FOLLOWUP_IP:
nt!IoGetAttachedDevice+c
82ca9eae 8b4810 mov ecx,dword ptr [eax+10h]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 82ccb1ca to 82ca9eae
STACK_TEXT:
8ad3fc10 82ccb1ca 85d3c9e0 00000000 00000800 nt!IoGetAttachedDevice+0xc
8ad3fc24 82e5a1bd 85904c18 84cbbc58 85904c00 nt!IoGetRelatedDeviceObject+0x70
8ad3fc6c 82e39a98 85904c18 85904c18 85904c00 nt!IopDeleteFile+0x32
8ad3fc84 82c81080 00000000 000c0000 00000000 nt!ObpRemoveObjectRoutine+0x59
8ad3fc98 82c80ff0 85904c18 82e49ec5 ad521f00 nt!ObfDereferenceObjectWithTag+0x88
8ad3fca0 82e49ec5 ad521f00 ad521f28 82d82680 nt!ObfDereferenceObject+0xd
8ad3fccc 82c43f29 ad521f00 00000000 00000000 nt!MiSegmentDelete+0x191
8ad3fd28 82c43e41 84cc3c80 00000000 82e3bb02 nt!MiProcessDereferenceList+0xdb
8ad3fd50 82e269df 00000000 a955a6d3 00000000 nt!MiDereferenceSegmentThread+0xc5
8ad3fd90 82cd81d9 82c43d7a 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IoGetAttachedDevice+c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
STACK_COMMAND: .cxr 0xffffffff8ad3f720 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!IoGetAttachedDevice+c
BUCKET_ID: 0x7E_nt!IoGetAttachedDevice+c
Followup: MachineOwner
---------
start end module name
8e7cd000 8e7f9000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
88a22000 88a6a000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8d137000 8d191000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
90577000 90589000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8dce2000 8dcf4000 amdk8 amdk8.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
88bdf000 88be8000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
88b47000 88b50000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
88b50000 88b73000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
82540000 8258d000 ATMFD ATMFD.DLL unavailable (00000000)
8d084000 8d08b000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8dcb3000 8dcc1000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8325a000 83262000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
8c763000 8c77c000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
82520000 8253e000 cdd cdd.dll unavailable (00000000)
8d05e000 8d07d000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
832a4000 8334f000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88dc4000 88de9000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
83262000 832a4000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88e39000 88e96000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
9056a000 90577000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
930eb000 930f8000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
93154000 93156680 danew danew.sys Sun Feb 07 22:54:37 2010 (4B6F8AFD)
8dc9b000 8dcb3000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8dc8f000 8dc9b000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
89000000 89011000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8e7b4000 8e7cd000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
930f8000 93102000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:24:27 2010 (4C3BDC6B)
93139000 9314a000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
93102000 93139000 dump_nvstor32 dump_nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
9314a000 93154000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
9045b000 90512000 dxgkrnl dxgkrnl.sys Mon Nov 01 22:37:53 2010 (4CCF7981)
90512000 9054b000 dxgmms1 dxgmms1.sys Wed Feb 02 22:34:49 2011 (4D4A2259)
8c615000 8c6bb000 eamonm eamonm.sys Thu Dec 09 00:29:13 2010 (4D006929)
8d08b000 8d0aa000 ehdrv ehdrv.sys Thu Dec 09 00:29:52 2010 (4D006950)
931db000 931f4000 epfwwfpr epfwwfpr.sys Thu Dec 09 00:25:16 2010 (4D00683C)
8dc00000 8dc2a000 fastfat fastfat.SYS Mon Jul 13 19:14:01 2009 (4A5BBFB9)
8dcfe000 8dd09000 fdc fdc.sys unavailable (00000000)
88c46000 88c57000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8e61e000 8e628000 flpydisk flpydisk.sys unavailable (00000000)
88c12000 88c46000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
88ea4000 88ead000 Fs_Rec Fs_Rec.sys unavailable (00000000)
88e00000 88e32000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55)
89165000 89196000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
83028000 8305f000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
9054b000 9056a000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
90400000 90413000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
8e617000 8e61d480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
93157000 93162000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
8c6de000 8c763000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
891ed000 891f5000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8dd21000 8dd2e000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
9307e000 9308a000 kbdhid kbdhid.sys Mon Jul 13 19:45:09 2009 (4A5BC705)
80b9a000 80ba2000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8dd9f000 8ddd3000 ks ks.sys Wed Mar 03 22:57:52 2010 (4B8F2FC0)
88db1000 88dc4000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88fa2000 88fc7000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
8c6bb000 8c6cb000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
9318d000 931a8000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
8323e000 83249000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
93182000 9318d000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8dd2e000 8dd3b000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
93073000 9307e000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
88b31000 88b47000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
8c77c000 8c78e000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
8c78e000 8c7b1000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
8c7b1000 8c7ec000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
931a8000 931c3000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8d0fc000 8d107000 Msfs Msfs.SYS unavailable (00000000)
88a73000 88a7b000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88d86000 88db1000 msrpc msrpc.sys unavailable (00000000)
8dc85000 8dc8f000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
891dd000 891ed000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88ead000 88f64000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
905a1000 905ac000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
905ac000 905ce000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
93062000 93073000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8d1e9000 8d1f7000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8d191000 8d1c3000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
88f64000 88fa2000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
8d107000 8d115000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8dc7b000 8dc85000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82c18000 83028000 nt ntkrpamp.exe Tue Oct 26 22:30:44 2010 (4CC78ED4)
88c57000 88d86000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
9317b000 93182000 NuidFltr NuidFltr.sys Fri May 08 04:35:42 2009 (4A03EEDE)
8d07d000 8d084000 Null Null.SYS unavailable (00000000)
94dfa000 94dfb040 nvBridge nvBridge.kmd Fri Jan 07 20:57:19 2011 (4D27C47F)
9308a000 930ab000 nvhda32v nvhda32v.sys Thu Nov 11 18:10:19 2010 (4CDC77DB)
94400000 94df9ee0 nvlddmkm nvlddmkm.sys Fri Jan 07 21:03:58 2011 (4D27C60E)
90414000 9045a700 nvmf6232 nvmf6232.sys Wed Nov 11 18:16:22 2009 (4AFB45C6)
88b73000 88b98000 nvstor nvstor.sys Wed May 20 02:44:09 2009 (4A13A6B9)
83200000 83237000 nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
8e628000 8e785000 P17 P17.sys Thu Oct 15 22:11:53 2009 (4AD7D669)
8d1ca000 8d1e9000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
88ab0000 88ac1000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
88a7b000 88aa5000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
88b1c000 88b23000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
88b23000 88b31000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
88e96000 88ea4000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
97c09000 97ca0000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
8e785000 8e7b4000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
83249000 8325a000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
90589000 905a1000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
905ce000 905e6000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
905e6000 905fd000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8e600000 8e617000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8dc3a000 8dc7b000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8d0e4000 8d0ec000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8d0ec000 8d0f4000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8d0f4000 8d0fc000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88fc7000 88ff4000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8c6cb000 8c6de000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
97ca0000 97caa000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
8dcf4000 8dcfe000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
88a00000 88a1a000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
891d5000 891dd000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
97d78000 97de2000 spsys spsys.sys Mon May 11 12:37:10 2009 (4A085436)
97d27000 97d78000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
97cd8000 97d27000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
97caa000 97ccb000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
88b98000 88bdf000 storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
94dfe000 94dff380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8901c000 89165000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
97ccb000 97cd8000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8d12c000 8d137000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8d115000 8d12c000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
88c00000 88c10000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
824f0000 824f9000 TSDDD TSDDD.dll unavailable (00000000)
8dcc1000 8dce2000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
930ab000 930eb000 udfs udfs.sys Mon Jul 13 19:14:09 2009 (4A5BBFC1)
8ddd3000 8dde1000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
93164000 9317b000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
93162000 93163700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8dd90000 8dd9f000 usbehci usbehci.sys Fri Oct 23 23:58:55 2009 (4AE27B7F)
9301e000 93062000 usbhub usbhub.sys Sat Oct 24 00:00:05 2009 (4AE27BC5)
8dd3b000 8dd45000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8dd45000 8dd90000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
88aa5000 88ab0000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8d0aa000 8d0b6000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
94dfc000 94dfd680 vHidDev vHidDev.sys Mon Dec 21 08:50:15 2009 (4B2F7D17)
8d0b6000 8d0d7000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88ac1000 88ad1000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88ad1000 88b1c000 volmgrx volmgrx.sys unavailable (00000000)
89196000 891d5000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8d000000 8d013000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
8d0d7000 8d0e4000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8334f000 833c0000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
833c0000 833ce000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8d1c3000 8d1ca000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
82290000 824db000 win32k win32k.sys unavailable (00000000)
88a6a000 88a73000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
93000000 9301a000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
Unloaded modules:
97df9000 97dfb000 MSTEE.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
97dfb000 97dfe000 MSKSSRV.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00003000
8d013000 8d034000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00021000
97de2000 97df9000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00017000
931c3000 931db000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
88de9000 88df6000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
89011000 8901b000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
8d016000 8d04d000 dump_nvstor3
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00037000
8d04d000 8d05e000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
8dd09000 8dd21000 i8042prt.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000