Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 14 07:25:40.812 2010 (GMT-5)
System Uptime: 0 days 0:00:21.799
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 5ad67, 1, 0}
Probably caused by : memory_corruption ( nt!MiDecrementShareCount+3a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 0005ad67, page frame number
Arg3: 00000001, current page state
Arg4: 00000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: MsMpEng.exe
LAST_CONTROL_TRANSFER: from 80522dfc to 804f9f43
STACK_TEXT:
af324794 80522dfc 0000004e 00000099 0005ad67 nt!KeBugCheckEx+0x1b
af3247c4 8051a59d c0039338 c0039340 89605820 nt!MiDecrementShareCount+0x3a
af324860 8051aa4e af3249ac 00000067 89605820 nt!MiProcessValidPteList+0x9b
af324ca4 805b34e6 07268000 c0039338 89605820 nt!MiDecommitPages+0x3f0
af324d4c 8054164c ffffffff 00adf874 00adf878 nt!NtFreeVirtualMemory+0x588
af324d4c 7c90e514 ffffffff 00adf874 00adf878 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00adf820 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDecrementShareCount+3a
80522dfc ff4e08 dec dword ptr [esi+8]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDecrementShareCount+3a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 14 07:26:26.031 2010 (GMT-5)
System Uptime: 0 days 0:00:22.650
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
Unable to load image HTTP.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for HTTP.sys
*** ERROR: Module load completed but symbols could not be loaded for HTTP.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 2e73a392, b8513a9c, b8513798}
Probably caused by : HTTP.sys ( HTTP+2b6b2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 2e73a392, The address that the exception occurred at
Arg3: b8513a9c, Exception Record Address
Arg4: b8513798, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+16
2e73a392 ?? ???
EXCEPTION_RECORD: b8513a9c -- (.exr 0xffffffffb8513a9c)
ExceptionAddress: 2e73a392
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 2e73a392
Attempt to execute non-executable address 2e73a392
CONTEXT: b8513798 -- (.cxr 0xffffffffb8513798)
eax=ae74cd53 ebx=00000003 ecx=0000000d edx=00000031 esi=8053058a edi=00000000
eip=2e73a392 esp=b8513b64 ebp=b8513ba8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
2e73a392 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 10
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: 2e73a392
WRITE_ADDRESS: 2e73a392
FOLLOWUP_IP:
HTTP+2b6b2
ae7596b2 ?? ???
FAILED_INSTRUCTION_ADDRESS:
+2b6b2
2e73a392 ?? ???
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from ae7596b2 to 2e73a392
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
b8513b60 ae7596b2 ae74cd53 0000000d 00000000 0x2e73a392
b8513ba8 ae73a986 00000001 f6fd49b4 01cb6b57 HTTP+0x2b6b2
b8513be0 ae73a9d0 ae768ccb 89b61348 e187319a HTTP+0xc986
b8513c84 80581377 89b61348 89007000 00000000 HTTP+0xc9d0
b8513d54 80581487 80000cf4 00000001 00000000 nt!IopLoadDriver+0x66d
b8513d7c 8053879d 80000cf4 00000000 89e3e3c8 nt!IopLoadUnloadDriver+0x45
b8513dac 805cff62 aef36cf4 00000000 00000000 nt!ExpWorkerThread+0xef
b8513ddc 8054612e 805386ae 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: HTTP+2b6b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HTTP
IMAGE_NAME: HTTP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4adde33f
STACK_COMMAND: .cxr 0xffffffffb8513798 ; kb
FAILURE_BUCKET_ID: 0x7E_BAD_IP_HTTP+2b6b2
BUCKET_ID: 0x7E_BAD_IP_HTTP+2b6b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\Mini101310-11.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Oct 14 07:27:11.671 2010 (GMT-5)
System Uptime: 0 days 0:00:23.670
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 59ad1, 1, 0}
Probably caused by : memory_corruption ( nt!MiDecrementShareCount+3a )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00059ad1, page frame number
Arg3: 00000001, current page state
Arg4: 00000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 11
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: MsMpEng.exe
LAST_CONTROL_TRANSFER: from 80522dfc to 804f9f43
STACK_TEXT:
af31f794 80522dfc 0000004e 00000099 00059ad1 nt!KeBugCheckEx+0x1b
af31f7c4 8051a59d c002a5b0 c002a5b8 89bcaa80 nt!MiDecrementShareCount+0x3a
af31f860 8051aa4e af31f8d0 00000077 89bcaa80 nt!MiProcessValidPteList+0x9b
af31fca4 805b34e6 054b7000 c002a5b0 89bcaa80 nt!MiDecommitPages+0x3f0
af31fd4c 8054164c ffffffff 00adf8bc 00adf8c0 nt!NtFreeVirtualMemory+0x588
af31fd4c 7c90e514 ffffffff 00adf8bc 00adf8c0 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00adf868 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDecrementShareCount+3a
80522dfc ff4e08 dec dword ptr [esi+8]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDecrementShareCount+3a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+3a
Followup: MachineOwner
804d7000 806e4000 nt ntkrpamp.exe Tue Apr 27 16:04:40 2010 (4BD6E0E8)
806e4000 80704d00 hal halmacpi.dll Sun Apr 13 21:31:27 2008 (4802517F)
ae72e000 ae76ee00 HTTP HTTP.sys Tue Oct 20 19:20:15 2009 (4ADDE33F)
aeb09000 aeb33180 kmixer kmixer.sys Sun Apr 13 21:45:07 2008 (480254B3)
aeb34000 aeb56d00 aec aec.sys Thu May 24 22:53:32 2007 (4655ED3C)
aeb57000 aeb6b480 wdmaud wdmaud.sys Sun Apr 13 22:17:18 2008 (48025C3E)
aeddc000 aede8e80 DMusic DMusic.sys Sun Apr 13 21:45:00 2008 (480254AC)
aee3c000 aee92800 srv srv.sys Mon Jun 21 18:27:09 2010 (4C1F84CD)
aefab000 aefd7180 mrxdav mrxdav.sys Sun Apr 13 21:32:42 2008 (480251CA)
af330000 af333900 ndisuio ndisuio.sys Sun Apr 13 21:55:57 2008 (4802573D)
af638000 af64f900 dump_atapi dump_atapi.sys Sun Apr 13 21:40:29 2008 (4802539D)
af678000 af728f00 rt2870 rt2870.sys Mon Aug 03 05:57:37 2009 (4A765221)
af751000 af7c0400 mrxsmb mrxsmb.sys Wed Feb 24 15:11:05 2010 (4B852569)
af7c1000 af7ebe80 rdbss rdbss.sys Sun Apr 13 22:28:38 2008 (48025EE6)
af7ec000 af80dd00 afd afd.sys Thu Aug 14 13:04:35 2008 (48A40333)
af80e000 af833500 ipnat ipnat.sys Sun Apr 13 21:57:10 2008 (48025786)
af834000 af85bc00 netbt netbt.sys Sun Apr 13 22:20:59 2008 (48025D1B)
af85c000 af8b4480 tcpip tcpip.sys Fri Jun 20 14:51:09 2008 (485B99AD)
af8b5000 af8c7600 ipsec ipsec.sys Sun Apr 13 22:19:42 2008 (48025CCE)
af8e8000 af90b000 MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
af92f000 af931900 Dxapi Dxapi.sys Fri Aug 17 23:53:19 2001 (3B7D843F)
af93f000 af941f80 mouhid mouhid.sys Fri Aug 17 23:47:57 2001 (3B7D82FD)
af943000 af946900 kbdhid kbdhid.sys Sun Apr 13 21:39:47 2008 (48025373)
af957000 af959880 hidusb hidusb.sys Sun Apr 13 21:45:27 2008 (480254C7)
af95b000 af97ea80 portcls portcls.sys Sun Apr 13 22:19:40 2008 (48025CCC)
af97f000 aff7e000 RtkHDAud RtkHDAud.sys Fri Apr 30 11:56:08 2010 (4BDA9B28)
aff96000 aff99580 BIOS BIOS.sys Wed Mar 16 08:23:52 2005 (4237D0F8)
b2e12000 b2e14280 rasacd rasacd.sys Fri Aug 17 23:55:39 2001 (3B7D84CB)
b2e45000 b2ea2f00 update update.sys Sun Apr 13 21:39:46 2008 (48025372)
b2ea3000 b2ed2e80 rdpdr rdpdr.sys Sun Apr 13 21:32:50 2008 (480251D2)
b2ed3000 b2ee3e00 psched psched.sys Sun Apr 13 21:56:36 2008 (48025764)
b2ee4000 b2efa580 ndiswan ndiswan.sys Sun Apr 13 22:20:41 2008 (48025D09)
b2efb000 b2f0e900 parport parport.sys Sun Apr 13 21:40:09 2008 (48025389)
b2f0f000 b2f37000 HDAudBus HDAudBus.sys Thu May 26 18:46:29 2005 (4295EF55)
b2f37000 b2f5a200 USBPORT USBPORT.SYS Sun Apr 13 21:45:34 2008 (480254CE)
b2f5b000 b2f7d700 ks ks.sys Sun Apr 13 22:16:34 2008 (48025C12)
b2f7e000 b2f91f00 VIDEOPRT VIDEOPRT.SYS Sun Apr 13 21:44:39 2008 (48025497)
b2f92000 b39aee60 nv4_mini nv4_mini.sys Sat Jul 10 00:19:49 2010 (4C379275)
b7dee000 b7e07b80 Mup Mup.sys Sun Apr 13 22:17:05 2008 (48025C31)
b7e08000 b7e34980 NDIS NDIS.sys Sun Apr 13 22:20:35 2008 (48025D03)
b7e35000 b7ec1600 Ntfs Ntfs.sys Sun Apr 13 22:15:49 2008 (48025BE5)
b7ec2000 b7ed8b00 KSecDD KSecDD.sys Wed Jun 24 14:18:40 2009 (4A420B90)
b7ed9000 b7eeaf00 sr sr.sys Sun Apr 13 21:36:50 2008 (480252C2)
b7eeb000 b7f0ab00 fltMgr fltMgr.sys Sun Apr 13 21:32:58 2008 (480251DA)
b7f0b000 b7f22900 atapi atapi.sys Sun Apr 13 21:40:29 2008 (4802539D)
b7f23000 b7f48700 dmio dmio.sys Sun Apr 13 21:44:45 2008 (4802549D)
b7f49000 b7f67880 ftdisk ftdisk.sys Fri Aug 17 23:52:41 2001 (3B7D8419)
b7f68000 b7f78a80 pci pci.sys Sun Apr 13 21:36:43 2008 (480252BB)
b7f79000 b7fa6d80 ACPI ACPI.sys Sun Apr 13 21:36:33 2008 (480252B1)
b80a8000 b80b1180 isapnp isapnp.sys Sun Apr 13 21:36:40 2008 (480252B8)
b80b8000 b80c2580 MountMgr MountMgr.sys Sun Apr 13 21:39:45 2008 (48025371)
b80c8000 b80d4c80 VolSnap VolSnap.sys Sun Apr 13 21:41:00 2008 (480253BC)
b80d8000 b80e0e00 disk disk.sys Sun Apr 13 21:40:46 2008 (480253AE)
b80e8000 b80f4180 CLASSPNP CLASSPNP.SYS Sun Apr 13 22:16:21 2008 (48025C05)
b8128000 b8130700 wanarp wanarp.sys Sun Apr 13 21:57:20 2008 (48025790)
b8138000 b8140780 netbios netbios.sys Sun Apr 13 21:56:01 2008 (48025741)
b8148000 b8156d80 sysaudio sysaudio.sys Sun Apr 13 22:15:55 2008 (48025BEB)
b8158000 b8162e00 Fips Fips.SYS Sun Apr 13 21:33:27 2008 (480251F7)
b8178000 b8187900 Cdfs Cdfs.SYS Sun Apr 13 22:14:21 2008 (48025B8D)
b8188000 b8191000 HIDCLASS HIDCLASS.SYS Sun Apr 13 21:45:25 2008 (480254C5)
b81a8000 b81b5d00 swmidi swmidi.sys Sun Apr 13 21:45:07 2008 (480254B3)
b8238000 b8240c00 processr processr.sys Sun Apr 13 21:31:29 2008 (48025181)
b8248000 b8252480 imapi imapi.sys Sun Apr 13 21:40:57 2008 (480253B9)
b8258000 b8267600 cdrom cdrom.sys Sun Apr 13 21:40:45 2008 (480253AD)
b8268000 b8276100 redbook redbook.sys Sun Apr 13 21:40:27 2008 (4802539B)
b8278000 b8287c00 serial serial.sys Sun Apr 13 22:15:44 2008 (48025BE0)
b8288000 b8294880 rasl2tp rasl2tp.sys Sun Apr 13 22:19:43 2008 (48025CCF)
b8298000 b82a2200 raspppoe raspppoe.sys Sun Apr 13 21:57:31 2008 (4802579B)
b82a8000 b82b3d00 raspptp raspptp.sys Sun Apr 13 22:19:47 2008 (48025CD3)
b82b8000 b82c0900 msgpc msgpc.sys Sun Apr 13 21:56:32 2008 (48025760)
b82c8000 b82d1f00 termdd termdd.sys Sun Apr 13 21:38:36 2008 (4802532C)
b82d8000 b82e6880 usbhub usbhub.sys Sun Apr 13 21:45:36 2008 (480254D0)
b82e8000 b82f1e80 NDProxy NDProxy.SYS Sun Apr 13 21:57:28 2008 (48025798)
b8308000 b8316b00 drmk drmk.sys Sun Apr 13 21:45:12 2008 (480254B8)
b8328000 b832e180 PCIIDEX PCIIDEX.SYS Sun Apr 13 21:40:29 2008 (4802539D)
b8330000 b8334d00 PartMgr PartMgr.sys Sun Apr 13 21:40:48 2008 (480253B0)
b83c8000 b83cc300 usbohci usbohci.sys Sun Apr 13 21:45:34 2008 (480254CE)
b83d0000 b83d5c80 usbfilter usbfilter.sys Tue Dec 22 10:26:07 2009 (4B30829F)
b83d8000 b83df600 usbehci usbehci.sys Sun Apr 13 21:45:34 2008 (480254CE)
b83e0000 b83e4a80 TDI TDI.SYS Sun Apr 13 22:00:04 2008 (48025834)
b83e8000 b83ec580 ptilink ptilink.sys Fri Aug 17 23:49:53 2001 (3B7D8371)
b83f0000 b83f4080 raspti raspti.sys Fri Aug 17 23:55:32 2001 (3B7D84C4)
b83f8000 b83fe000 kbdclass kbdclass.sys Sun Apr 13 21:39:46 2008 (48025372)
b8400000 b8405a00 mouclass mouclass.sys Sun Apr 13 21:39:47 2008 (48025373)
b8438000 b843e180 HIDPARSE HIDPARSE.SYS Sun Apr 13 21:45:22 2008 (480254C2)
b8440000 b8445200 vga vga.sys Sun Apr 13 21:44:40 2008 (48025498)
b8448000 b844ca80 Msfs Msfs.SYS Sun Apr 13 21:32:38 2008 (480251C6)
b8450000 b8457880 Npfs Npfs.SYS Sun Apr 13 21:32:38 2008 (480251C6)
b8458000 b845c280 BS_I2cIo BS_I2cIo.sys Mon Jun 16 04:02:32 2008 (4855BBA8)
b8460000 b8467d80 usbccgp usbccgp.sys Sun Apr 13 21:45:38 2008 (480254D2)
b8468000 b846c500 watchdog watchdog.sys Sun Apr 13 21:44:59 2008 (480254AB)
b8478000 b847c880 pnarp pnarp.sys Tue Oct 28 07:57:27 2008 (4906A9C7)
b8480000 b8484d80 purendis purendis.sys Tue Oct 28 06:31:49 2008 (490695B5)
b84b8000 b84bb000 BOOTVID BOOTVID.dll Fri Aug 17 23:49:09 2001 (3B7D8345)
b857c000 b857fd80 serenum serenum.sys Sun Apr 13 21:40:12 2008 (4802538C)
b8580000 b8582280 wmiacpi wmiacpi.sys Sun Apr 13 21:36:37 2008 (480252B5)
b8584000 b8586780 ndistapi ndistapi.sys Sun Apr 13 21:57:27 2008 (48025797)
b85a0000 b85a3c80 mssmbios mssmbios.sys Sun Apr 13 21:36:45 2008 (480252BD)
b85a8000 b85a9b80 kdcom kdcom.dll Fri Aug 17 23:49:10 2001 (3B7D8346)
b85aa000 b85ab100 WMILIB WMILIB.SYS Sat Aug 18 00:07:23 2001 (3B7D878B)
b85ac000 b85ad700 dmload dmload.sys Fri Aug 17 23:58:15 2001 (3B7D8567)
b85c6000 b85c7100 swenum swenum.sys Sun Apr 13 21:39:52 2008 (48025378)
b85ca000 b85cb280 USBD USBD.SYS Sat Aug 18 00:02:58 2001 (3B7D8682)
b85de000 b85dff00 Fs_Rec Fs_Rec.SYS Fri Aug 17 23:49:37 2001 (3B7D8361)
b85e0000 b85e1080 Beep Beep.SYS Fri Aug 17 23:47:33 2001 (3B7D82E5)
b85e2000 b85e3080 mnmdd mnmdd.SYS Fri Aug 17 23:57:28 2001 (3B7D8538)
b85e4000 b85e5080 RDPCDD RDPCDD.sys Fri Aug 17 23:46:56 2001 (3B7D82C0)
b85e6000 b85e7100 dump_WMILIB dump_WMILIB.SYS Sat Aug 18 00:07:23 2001 (3B7D878B)
b860e000 b860fa80 ParVdm ParVdm.SYS Fri Aug 17 23:49:49 2001 (3B7D836D)
b865e000 b865f880 splitter splitter.sys Sun Apr 13 21:45:07 2008 (480254B3)
b8670000 b8670d00 pciide pciide.sys Fri Aug 17 23:51:49 2001 (3B7D83E5)
b8697000 b8697b80 Null Null.SYS Fri Aug 17 23:47:39 2001 (3B7D82EB)
b8719000 b8719b80 drmkaud drmkaud.sys Sun Apr 13 21:45:13 2008 (480254B9)
b873e000 b873ed00 dxgthk dxgthk.sys Fri Aug 17 23:53:12 2001 (3B7D8438)
b87d1000 b87d1c00 audstub audstub.sys Fri Aug 17 23:59:40 2001 (3B7D85BC)
bd000000 bd011600 dxg dxg.sys Sun Apr 13 21:38:27 2008 (48025323)
bd012000 bd61e980 nv4_disp nv4_disp.dll Sat Jul 10 00:18:40 2010 (4C379230)
bf800000 bf9c4200 win32k win32k.sys Wed Jun 23 16:43:54 2010 (4C220F9A)
bffa0000 bffe5c00 ATMFD ATMFD.DLL Tue Apr 20 08:30:07 2010 (4BCD3BDF)
Unloaded modules:
b8148000 b8154000 SysTool.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b2e16000 b2e1a000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
b8318000 b8325000 i8042prt.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8430000 b8435000 Cdaudio.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b2e26000 b2e29000 Sfloppy.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8418000 b841d000 Flpydisk.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
b8410000 b8417000 Fdc.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000