Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\113010-31278-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82813000 PsLoadedModuleList = 0x8295b810
Debug session time: Mon Nov 29 13:44:23.784 2010 (UTC - 5:00)
System Uptime: 0 days 0:49:56.719
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 84fcf00f, 988bfb1c, 0}
Probably caused by : fltmgr.sys ( fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 84fcf00f, The address that the exception occurred at
Arg3: 988bfb1c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+12a
84fcf00f 000404 add byte ptr [esp+eax],al
TRAP_FRAME: 988bfb1c -- (.trap 0xffffffff988bfb1c)
ErrCode = 00000002
eax=85565240 ebx=861f8020 ecx=00000000 edx=fffffff4 esi=8284f4bc edi=00000000
eip=84fcf00f esp=988bfb90 ebp=84fcf008 iopl=0 ov up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010a82
84fcf00f 000404 add byte ptr [esp+eax],al ss:0010:1de24dd0=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82fb420c to 84fcf00f
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
988bfb94 82fb420c 861fced8 84fcf008 00000000 0x84fcf00f
988bfbb8 82fb43cb 988bfbd8 861fced8 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
988bfbf0 8284f4bc 861fced8 84fcf008 84cfcf80 fltmgr!FltpDispatch+0xc5
988bfc08 82a6eea2 848bcac8 84cfcf68 00000001 nt!IofCallDriver+0x63
988bfc48 82a35c0a 86e5f330 84cfcf80 00000001 nt!IopCloseFile+0x2f3
988bfc94 82a58772 86e5f330 9d69d948 85362340 nt!ObpDecrementHandleCount+0x139
988bfcdc 82a59f72 9d69d948 9d7129c8 86e5f330 nt!ObpCloseHandleTableEntry+0x203
988bfd0c 82a5a0ea 86e5f330 85362301 0182f2bc nt!ObpCloseHandle+0x7f
988bfd28 8285642a 000004e4 0182f2c0 771264f4 nt!NtClose+0x4e
988bfd28 771264f4 000004e4 0182f2c0 771264f4 nt!KiFastCallEntry+0x12a
0182f2c0 00000000 00000000 00000000 00000000 0x771264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa
82fb420c 89450c mov dword ptr [ebp+0Ch],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf11
FAILURE_BUCKET_ID: 0x8E_fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa
BUCKET_ID: 0x8E_fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120110-24289-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a11000 PsLoadedModuleList = 0x82b59810
Debug session time: Wed Dec 1 08:30:01.430 2010 (UTC - 5:00)
System Uptime: 0 days 0:16:13.240
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {380, 2, 0, 82aafeeb}
Probably caused by : ntkrpamp.exe ( nt!ExpCheckForIoPriorityBoost+46 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000380, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82aafeeb, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b79718
Unable to read MiSystemVaType memory at 82b59160
00000380
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExpCheckForIoPriorityBoost+46
82aafeeb 8b8680020000 mov eax,dword ptr [esi+280h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: 9a6bb804 -- (.trap 0xffffffff9a6bb804)
ErrCode = 00000000
eax=00000100 ebx=82e24800 ecx=84cf0800 edx=00000000 esi=00000100 edi=84cf07e8
eip=82aafeeb esp=9a6bb878 ebp=9a6bb89c iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!ExpCheckForIoPriorityBoost+0x46:
82aafeeb 8b8680020000 mov eax,dword ptr [esi+280h] ds:0023:00000380=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82aafeeb to 82a5782b
STACK_TEXT:
9a6bb804 82aafeeb badb0d00 00000000 00010022 nt!KiTrap0E+0x2cf
9a6bb89c 82ab00af 00000002 807c4120 84cf07e8 nt!ExpCheckForIoPriorityBoost+0x46
9a6bb8e4 82a7b6ce 85c29110 89987008 00000000 nt!ExpWaitForResource+0x7b
9a6bb934 88af43be 84cf07e8 00000001 12c333b9 nt!ExAcquireResourceExclusiveLite+0x1cf
9a6bb984 88ad996a 84a87860 00000000 89987008 Ntfs!TxfCheckForLockConflict+0xb8
9a6bb9d8 88ae3e7d 84a87860 851cc720 89987310 Ntfs!NtfsCheckExistingFile+0x368
9a6bba0c 88adad6e 84a87860 85100900 89987310 Ntfs!NtfsOpenExistingAttr+0x3b
9a6bbaf4 88adb677 84a87860 85100900 89987310 Ntfs!NtfsOpenAttributeInExistingFile+0x308
9a6bbba0 88adaa2d 84a87860 85100900 89987310 Ntfs!NtfsOpenExistingPrefixFcb+0x26e
9a6bbc00 88adcc5c 84a87860 85100900 89986d08 Ntfs!NtfsFindStartingNode+0xb88
9a6bbcdc 88a63210 84a87860 85100900 9a62b944 Ntfs!NtfsCommonCreate+0x65f
9a6bbd1c 82a8111e 9a62b8dc 00000000 ffffffff Ntfs!NtfsCommonCreateCallout+0x20
9a6bbd1c 82a81215 9a62b8dc 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
9a62b840 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExpCheckForIoPriorityBoost+46
82aafeeb 8b8680020000 mov eax,dword ptr [esi+280h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExpCheckForIoPriorityBoost+46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
FAILURE_BUCKET_ID: 0xA_nt!ExpCheckForIoPriorityBoost+46
BUCKET_ID: 0xA_nt!ExpCheckForIoPriorityBoost+46
Followup: MachineOwner
---------
90fcf000 90ffb000 1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8882c000 88874000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8dcb9000 8dd13000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8e000000 8e012000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
889c7000 889d0000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
91837000 918386c0 ASACPI ASACPI.sys Wed Jul 15 23:28:28 2009 (4A5E9E5C)
8899b000 889a4000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
889a4000 889c7000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
889ef000 889f6000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8e08f000 8e09d000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
88691000 88699000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
95caf000 95cc8000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
97890000 978ae000 cdd cdd.dll unavailable (00000000)
889d0000 889ef000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
886db000 88786000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88bb7000 88bdc000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
88699000 886db000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88c01000 88c5e000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
826a7000 826c2000 COMMONFX COMMONFX.SYS Thu Mar 18 07:06:07 2010 (4BA2091F)
90e15000 90e22000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
827e5000 827f2000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8e013000 8e077000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8260b000 826a7000 ctac32k ctac32k.sys Thu Mar 18 07:08:52 2010 (4BA209C4)
90f02000 90f81600 ctaud2k ctaud2k.sys Thu Mar 18 07:04:11 2010 (4BA208AB)
826c2000 8274d000 CTAUDFX CTAUDFX.SYS Thu Mar 18 07:06:22 2010 (4BA2092E)
90f9b000 90fcf000 ctoss2k ctoss2k.sys Thu Mar 18 07:03:24 2010 (4BA2087C)
9182f000 91837000 ctprxy2k ctprxy2k.sys Thu Mar 18 07:04:14 2010 (4BA208AE)
8274d000 827db000 CTSBLFX CTSBLFX.SYS Thu Mar 18 07:06:45 2010 (4BA20945)
8255f000 82588000 ctsfm2k ctsfm2k.sys Thu Mar 18 07:03:15 2010 (4BA20873)
8e077000 8e08f000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8dc2b000 8dc37000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
88e08000 88e19000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
90f82000 90f9b000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
82600000 82609000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
827f2000 827fd000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
82588000 82599000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
827db000 827e5000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8e0d0000 8e187000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
8f7c6000 8f7ff000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
82530000 8255f000 emupia2k emupia2k.sys Thu Mar 18 07:03:13 2010 (4BA20871)
90e0a000 90e15000 fdc fdc.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
88a39000 88a4a000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
91f07000 91f11000 flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
88a05000 88a39000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
88c6c000 88c75000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
88dbc000 88dee000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
88f6c000 88f9d000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82426000 82530000 ha10kx2k ha10kx2k.sys Thu Mar 18 07:03:27 2010 (4BA2087F)
82e21000 82e58000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
91f72000 91f9d000 hap16v2k hap16v2k.sys Thu Mar 18 07:03:31 2010 (4BA20883)
8e1d2000 8e1f1000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
91f22000 91f72000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892)
8240b000 8241e000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
8241e000 82424480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
82400000 8240b000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868)
95c2a000 95caf000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
88e00000 88e08000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
88926000 8892d000 intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8e0be000 8e0d0000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8dc14000 8dc2b000 ISODrive ISODrive.sys Tue Feb 10 04:22:07 2009 (4991473F)
88942000 8895f000 jraid jraid.sys Fri Oct 29 06:12:27 2010 (4CCA9E0B)
91e99000 91ea6000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
91fc7000 91fd3000 kbdhid kbdhid.sys Mon Jul 13 19:45:09 2009 (4A5BC705)
80ba7000 80baf000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
90ece000 90f02000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
88ba4000 88bb7000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88d6a000 88d8f000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
825f6000 825fdd80 LHidFilt LHidFilt.Sys Tue Aug 24 13:20:48 2010 (4C73FF70)
91fd3000 91fe3000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
91fa8000 91faf780 LMouFilt LMouFilt.Sys Tue Aug 24 13:20:53 2010 (4C73FF75)
825bb000 825d6000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
825f0000 825f5580 LUsbFilt LUsbFilt.Sys Tue Aug 24 13:20:57 2010 (4C73FF79)
88608000 88680000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
919f1000 919fe000 modem modem.sys Mon Jul 13 19:55:24 2009 (4A5BC96C)
825b0000 825bb000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
91ea6000 91eb3000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
91f9d000 91fa8000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
88985000 8899b000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
95cc8000 95cda000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
95cda000 95cfd000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
95cfd000 95d38000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
95d38000 95d53000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8dc7e000 8dc89000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8887d000 88885000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88b79000 88ba4000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8dc0a000 8dc14000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
88fed000 88ffd000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88c75000 88d2c000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
91e1c000 91e27000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
91e27000 91e49000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
91f11000 91f22000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8dd6b000 8dd79000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8dd13000 8dd45000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
88d2c000 88d6a000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
8dc89000 8dc97000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8dc00000 8dc0a000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a11000 82e21000 nt ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
88a4a000 88b79000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
88bf8000 88bff000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
8f7c4000 8f7c5040 nvBridge nvBridge.kmd Sat Oct 16 13:04:23 2010 (4CB9DB17)
8ee27000 8f7c35a0 nvlddmkm nvlddmkm.sys Sat Oct 16 13:07:56 2010 (4CB9DBEC)
8dd4c000 8dd6b000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
888ba000 888cb000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
88885000 888af000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8893b000 88942000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8892d000 8893b000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
88c5e000 88c6c000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
95d53000 95dea000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
91800000 9182f000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
88680000 88691000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
91e04000 91e1c000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
91e49000 91e61000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
91e61000 91e78000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
91e78000 91e8f000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8ddb6000 8ddf7000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
91e8f000 91e99000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20)
8dc66000 8dc6e000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8dc6e000 8dc76000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8dc76000 8dc7e000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88d8f000 88dbc000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
91fe3000 91ff6000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8895f000 88985000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
95dea000 95df4000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
90e00000 90e0a000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717)
8dd79000 8dd93000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D)
88fe5000 88fed000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
9ac60000 9acb1000 srv srv.sys Thu Aug 26 23:31:26 2010 (4C77318E)
9ac11000 9ac60000 srv2 srv2.sys Thu Aug 26 23:30:45 2010 (4C773165)
95c00000 95c21000 srvnet srvnet.sys Thu Aug 26 23:30:39 2010 (4C77315F)
91eb3000 91eb4380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
88e23000 88f6c000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB)
90e22000 90e2f000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8dcae000 8dcb9000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8dc97000 8dcae000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8dda6000 8ddb6000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
97860000 97869000 TSDDD TSDDD.dll Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8e09d000 8e0be000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
91eb5000 91ec3000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
91fb0000 91fc7000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
82609000 8260a700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8ee0b000 8ee1a000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
91ec3000 91f07000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8e187000 8e1d2000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
82599000 825b0000 USBSTOR USBSTOR.SYS Mon Jul 13 19:51:19 2009 (4A5BC877)
8ee00000 8ee0b000 usbuhci usbuhci.sys Mon Jul 13 19:51:10 2009 (4A5BC86E)
888af000 888ba000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
88800000 8880c000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
8dc38000 8dc59000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88f9d000 88fa5380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
888cb000 888db000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
888db000 88926000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
88fa6000 88fe5000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
90e82000 90ece000 VSTBS23 VSTBS23.SYS Wed Oct 15 20:30:15 2008 (48F68B17)
9193c000 919f1000 VSTCNXT3 VSTCNXT3.SYS Wed Oct 15 20:29:13 2008 (48F68AD9)
9183a000 9193c000 VSTDPV3 VSTDPV3.SYS Wed Oct 15 20:32:04 2008 (48F68B84)
8dd93000 8dda6000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
8dc59000 8dc66000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
88786000 887f7000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8881e000 8882c000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8dd45000 8dd4c000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
97600000 9784b000 win32k win32k.sys Tue Aug 31 22:34:29 2010 (4C7DBBB5)
88874000 8887d000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
825d6000 825f0000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
9acb1000 9acd1480 WUDFRd WUDFRd.sys Mon Jul 13 19:50:44 2009 (4A5BC854)
90e33000 90e82000 yk62x86 yk62x86.sys Wed Sep 15 10:07:11 2010 (4C90D30F)
Unloaded modules:
9acd2000 9ad3c000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0006A000
95d53000 95d6b000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
88dee000 88dfb000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
88bdc000 88be7000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
88e19000 88e22000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
88be7000 88bf8000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000