BugCheck D1, {4, 2, 0, 8743fb02}
Probably caused by : athr.sys ( athr+212e1 )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032311-23743-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c4a000 PsLoadedModuleList = 0x81d89570
Debug session time: Wed Mar 23 17:11:22.988 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:36.706
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {4, 2, 0, 8743fb02}
Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+212e1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8743fb02, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 81da9700
Unable to read MiSystemVaType memory at 81d890c0
00000004
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisFreeTimerObject+18
8743fb02 8b4b04 mov ecx,dword ptr [ebx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 86a5cba8 -- (.trap 0xffffffff86a5cba8)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=8744b970 edx=85086020 esi=85046028 edi=8744b970
eip=8743fb02 esp=86a5cc1c ebp=86a5cc28 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
ndis!NdisFreeTimerObject+0x18:
8743fb02 8b4b04 mov ecx,dword ptr [ebx+4] ds:0023:00000004=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8743fb02 to 81c82b5b
STACK_TEXT:
86a5cba8 8743fb02 badb0d00 85086020 86a5cbc4 nt!KiTrap0E+0x2cf
86a5cc28 8c6642e1 00000000 86a5cc40 8c6642bf ndis!NdisFreeTimerObject+0x18
WARNING: Stack unwind information not available. Following frames may be wrong.
86a5cc34 8c6642bf 85086210 86a5cc4c 8c669f0c athr+0x212e1
86a5cc40 8c669f0c 85086020 86a5cc64 8c669ebf athr+0x212bf
86a5cc4c 8c669ebf 85086020 c000009a 85086020 athr+0x26f0c
86a5cc64 8c65b82e 85245028 86a5cc78 00000001 athr+0x26ebf
86a5cc84 8c654313 85245028 00000001 86a5cc9c athr+0x1882e
86a5ccc4 8c6541e8 85245028 86a7038c 85245028 athr+0x11313
86a5ccdc 8740a30a 85245028 85006600 86a5cd00 athr+0x111e8
86a5ccec 81e36f34 85046028 85006600 83670d48 ndis!ndisDispatchIoWorkItem+0xf
86a5cd00 81ca5043 852067e8 00000000 83670d48 nt!IopProcessWorkItem+0x23
86a5cd50 81e31d16 00000000 90b1dba4 00000000 nt!ExpWorkerThread+0x10d
86a5cd90 81cd3159 81ca4f36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
athr+212e1
8c6642e1 ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: athr+212e1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athr
IMAGE_NAME: athr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a80c5f1
FAILURE_BUCKET_ID: 0xD1_athr+212e1
BUCKET_ID: 0xD1_athr+212e1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032311-22916-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c48000 PsLoadedModuleList = 0x81d87570
Debug session time: Wed Mar 23 17:00:10.600 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:04.318
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {4, 2, 0, 86f6db02}
Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+212e1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 86f6db02, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 81da7700
Unable to read MiSystemVaType memory at 81d870c0
00000004
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisFreeTimerObject+18
86f6db02 8b4b04 mov ecx,dword ptr [ebx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 86a3bba8 -- (.trap 0xffffffff86a3bba8)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=86f79970 edx=84324020 esi=85058028 edi=86f79970
eip=86f6db02 esp=86a3bc1c ebp=86a3bc28 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
ndis!NdisFreeTimerObject+0x18:
86f6db02 8b4b04 mov ecx,dword ptr [ebx+4] ds:0023:00000004=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 86f6db02 to 81c80b5b
STACK_TEXT:
86a3bba8 86f6db02 badb0d00 84324020 86a3bbc4 nt!KiTrap0E+0x2cf
86a3bc28 8ca642e1 00000000 86a3bc40 8ca642bf ndis!NdisFreeTimerObject+0x18
WARNING: Stack unwind information not available. Following frames may be wrong.
86a3bc34 8ca642bf 84324210 86a3bc4c 8ca69f0c athr+0x212e1
86a3bc40 8ca69f0c 84324020 86a3bc64 8ca69ebf athr+0x212bf
86a3bc4c 8ca69ebf 84324020 c000009a 84324020 athr+0x26f0c
86a3bc64 8ca5b82e 84320028 86a3bc78 00000001 athr+0x26ebf
86a3bc84 8ca54313 84320028 00000001 86a3bc9c athr+0x1882e
86a3bcc4 8ca541e8 84320028 86a7438c 84320028 athr+0x11313
86a3bcdc 86f3830a 84320028 8518b108 86a3bd00 athr+0x111e8
86a3bcec 81e34f34 85058028 8518b108 83687350 ndis!ndisDispatchIoWorkItem+0xf
86a3bd00 81ca3043 850dfe08 00000000 83687350 nt!IopProcessWorkItem+0x23
86a3bd50 81e2fd16 00000000 90b4b8be 00000000 nt!ExpWorkerThread+0x10d
86a3bd90 81cd1159 81ca2f36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
athr+212e1
8ca642e1 ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: athr+212e1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athr
IMAGE_NAME: athr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a80c5f1
FAILURE_BUCKET_ID: 0xD1_athr+212e1
BUCKET_ID: 0xD1_athr+212e1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032311-22198-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d3f570
Debug session time: Wed Mar 23 17:33:59.459 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:18.037
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {4, 2, 0, 8736cb02}
Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+212e1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8736cb02, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d5f700
Unable to read MiSystemVaType memory at 81d3f0c0
00000004
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisFreeTimerObject+18
8736cb02 8b4b04 mov ecx,dword ptr [ebx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 86a58ba8 -- (.trap 0xffffffff86a58ba8)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=87378970 edx=84007020 esi=83a7b028 edi=87378970
eip=8736cb02 esp=86a58c1c ebp=86a58c28 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
ndis!NdisFreeTimerObject+0x18:
8736cb02 8b4b04 mov ecx,dword ptr [ebx+4] ds:0023:00000004=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8736cb02 to 81c38b5b
STACK_TEXT:
86a58ba8 8736cb02 badb0d00 84007020 86a58bc4 nt!KiTrap0E+0x2cf
86a58c28 a3e622e1 00000000 86a58c40 a3e622bf ndis!NdisFreeTimerObject+0x18
WARNING: Stack unwind information not available. Following frames may be wrong.
86a58c34 a3e622bf 84007210 86a58c4c a3e67f0c athr+0x212e1
86a58c40 a3e67f0c 84007020 86a58c64 a3e67ebf athr+0x212bf
86a58c4c a3e67ebf 84007020 c000009a 84007020 athr+0x26f0c
86a58c64 a3e5982e 83a7c408 86a58c78 00000001 athr+0x26ebf
86a58c84 a3e52313 83a7c408 00000001 86a58c9c athr+0x1882e
86a58cc4 a3e521e8 83a7c408 86a6c38c 83a7c408 athr+0x11313
86a58cdc 8733730a 83a7c408 83698258 86a58d00 athr+0x111e8
86a58cec 81decf34 83a7b028 83698258 83670020 ndis!ndisDispatchIoWorkItem+0xf
86a58d00 81c5b043 83780a08 00000000 83670020 nt!IopProcessWorkItem+0x23
86a58d50 81de7d16 00000000 90dd2603 00000000 nt!ExpWorkerThread+0x10d
86a58d90 81c89159 81c5af36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
athr+212e1
a3e622e1 ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: athr+212e1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athr
IMAGE_NAME: athr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a80c5f1
FAILURE_BUCKET_ID: 0xD1_athr+212e1
BUCKET_ID: 0xD1_athr+212e1
Followup: MachineOwner
---------
start end module name
86e1f000 86e67000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8b46f000 8b4c9000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8c727000 8c739000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
87107000 87110000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
870db000 870e4000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
870e4000 87107000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
a3e41000 a3f65000 athr athr.sys Mon Aug 10 21:14:25 2009 (4A80C5F1)
86ec6000 86ed1000 BATTC BATTC.SYS Mon Jul 13 19:19:15 2009 (4A5BC0F3)
8761c000 87623000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8b5fc000 8b60a000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
86cab000 86cb3000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
8b79c000 8b7b5000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
81330000 8134e000 cdd cdd.dll unavailable (00000000)
86cf5000 86da0000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
874aa000 874cf000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
86cb3000 86cf5000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8c698000 8c69b700 CmBatt CmBatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
872c2000 8731f000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
86ebe000 86ec6000 compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
8c71a000 8c727000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
80eec000 80ef9000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8b5e4000 8b5fc000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8b5d8000 8b5e4000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
87499000 874aa000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8c6b4000 8c6be000 DKbFltr DKbFltr.sys Wed Mar 25 23:10:12 2009 (49CAF214)
80ec9000 80ee2000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
80fd3000 80fe4000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
80ef9000 80fd3000 dump_iaStor dump_iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
80ee2000 80eec000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8c524000 8c5db000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:26:15 2009 (4A5BC297)
8c5db000 8c614000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8b772000 8b79c000 fastfat fastfat.SYS Mon Jul 13 19:14:01 2009 (4A5BBFB9)
87144000 87155000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
87110000 87144000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8732d000 87336000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
87467000 87499000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8b41c000 8b44d000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82000000 82037000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8c614000 8c633000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
874cf000 87554000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
8745f000 87467000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8c69c000 8c6b4000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
87001000 870db000 iaStor iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
8c01b000 8c524000 igdkmd32 igdkmd32.sys Wed Sep 23 15:18:09 2009 (4ABA7471)
86f2c000 86f33000 intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8b62b000 8b63d000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8c6be000 8c6cb000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
81a0c000 81a14000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8c7c6000 8c7fa000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
872af000 872c2000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
86f95000 86fba000 ksecpkg ksecpkg.sys Mon Jul 13 19:34:00 2009 (4A5BC468)
a3e31000 a3e41000 L1C60x86 L1C60x86.sys Mon Jul 27 02:38:59 2009 (4A6D4B83)
80fef000 80fff000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8b6e4000 8b6ff000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
86c22000 86c9a000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
80fe4000 80fef000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8c704000 8c711000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
86f41000 86f57000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
875e6000 8760c680 MpFilter MpFilter.sys Tue Sep 14 17:23:59 2010 (4C8FE7EF)
a3da0000 a3da5900 MpKsl4ff56318 MpKsl4ff56318.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
8b5d2000 8b5d7900 MpKsl6658dfa3 MpKsl6658dfa3.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
a3d8a000 a3d93200 MpNWMon MpNWMon.sys Tue Sep 14 17:23:50 2010 (4C8FE7E6)
8b7b5000 8b7c7000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
8b7c7000 8b7ea000 mrxsmb mrxsmb.sys Mon Jul 13 19:14:24 2009 (4A5BBFD0)
87554000 8758f000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
8b400000 8b41b000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
87675000 87680000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
86e70000 86e78000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
87284000 872af000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8b5c8000 8b5d2000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8744f000 8745f000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8760d000 87615000 mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:06:37 2009 (4A24F9AD)
8b5c0000 8b5c8000 mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:06:48 2009 (4A24F9B8)
8b5ae000 8b5c0000 mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:07:00 2009 (4A24F9C4)
87336000 873ed000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8c751000 8c75c000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
80c00000 80c10000 ndisuio ndisuio.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
8c75c000 8c77e000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
8b681000 8b692000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8b532000 8b540000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8b4c9000 8b4fb000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
86f57000 86f95000 NETIO NETIO.SYS Thu Apr 08 22:32:21 2010 (4BBE91B5)
a3d94000 a3d9fc00 NisDrvWFP NisDrvWFP.sys Tue Sep 14 17:24:12 2010 (4C8FE7FC)
87680000 8768e000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8b5a4000 8b5ae000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
81c00000 82000000 nt ntkrnlmp.exe Mon Jul 13 19:15:08 2009 (4A5BBFFC)
87155000 87284000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
87615000 8761c000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
8b719000 8b75f000 nwifi nwifi.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8b502000 8b521000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
86ead000 86ebe000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
86e78000 86ea2000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
86f33000 86f41000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8731f000 8732d000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
a3c1b000 a3cb2000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
80e9a000 80ec9000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
86c9a000 86cab000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8c739000 8c751000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
8c77e000 8c796000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8c796000 8c7ad000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8c7ad000 8c7c4000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8b563000 8b5a4000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8765d000 87665000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
87665000 8766d000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8766d000 87675000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
87422000 8744f000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8b75f000 8b772000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
80c12000 80e99140 RTKVHDA RTKVHDA.sys Mon Jul 06 05:12:43 2009 (4A51C00B)
a3cb2000 a3cbc000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
873ed000 873f5000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
a3dc7000 a3e31000 spsys spsys.sys Mon May 11 12:37:10 2009 (4A085436)
a3d39000 a3d8a000 srv srv.sys Mon Jul 13 19:15:10 2009 (4A5BBFFE)
a3cea000 a3d39000 srv2 srv2.sys Mon Jul 13 19:14:52 2009 (4A5BBFEC)
a3cbc000 a3cdd000 srvnet srvnet.sys Mon Jul 13 19:14:45 2009 (4A5BBFE5)
8c7c4000 8c7c5380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8c6cb000 8c701400 SynTP SynTP.sys Thu Sep 03 20:32:25 2009 (4AA06019)
8768e000 877d7000 tcpip tcpip.sys Thu Apr 08 22:32:59 2010 (4BBE91DB)
a3cdd000 a3cea000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8b464000 8b46f000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8b44d000 8b464000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8b553000 8b563000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
81300000 81309000 TSDDD TSDDD.dll unavailable (00000000)
8b60a000 8b62b000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
8c000000 8c00e000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
8b6a9000 8b6c0000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
8c702000 8c703700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8c689000 8c698000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8b63d000 8b681000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8c63e000 8c689000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
8b692000 8b6a9000 USBSTOR USBSTOR.SYS Mon Jul 13 19:51:19 2009 (4A5BC877)
8c633000 8c63e000 usbuhci usbuhci.sys Mon Jul 13 19:51:10 2009 (4A5BC86E)
8b6c0000 8b6e3b00 usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897)
86ea2000 86ead000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
87623000 8762f000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
8762f000 87650000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
86ed1000 86ee1000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
86ee1000 86f2c000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
86fba000 86ff9000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
a3f65000 a3f6f000 vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
8b521000 8b532000 vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
a3f6f000 a3f78000 vwifimp vwifimp.sys Mon Jul 13 19:52:09 2009 (4A5BC8A9)
8b540000 8b553000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
87650000 8765d000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
86da0000 86e11000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
86e11000 86e1f000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b4fb000 8b502000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
810a0000 812ea000 win32k win32k.sys unavailable (00000000)
8c711000 8c71a000 wmiacpi wmiacpi.sys Mon Jul 13 19:19:16 2009 (4A5BC0F4)
86e67000 86e70000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8b6ff000 8b719000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
a3da6000 a3dc6480 WUDFRd WUDFRd.sys Mon Jul 13 19:50:44 2009 (4A5BC854)
Unloaded modules:
8758f000 875a7000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
874cf000 874dc000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
874dc000 875b6000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 000DA000
875b6000 875c7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
875c7000 875e6000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001F000