Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102510-36956-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0281f000 PsLoadedModuleList = 0xfffff800`02a5ce50
Debug session time: Mon Oct 25 17:30:14.705 2010 (UTC - 5:00)
System Uptime: 0 days 0:13:36.736
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8800824d928, 0, fffffa80047b0058, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42837 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8800824d928, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffffa80047b0058, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac70e0
fffff8800824d928
FAULTING_IP:
+3163303463316639
fffffa80`047b0058 8b4358 mov eax,dword ptr [rbx+58h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002e14880 -- (.trap 0xfffff88002e14880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8003d5bee1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa80047b0058 rsp=fffff88002e14a10 rbp=fffff88002e14b10
r8=fffffa8003ef3370 r9=0000000000000130 r10=fffff88002f640c0
r11=fffffa80054bfb60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
fffffa80`047b0058 8b4358 mov eax,dword ptr [rbx+58h] ds:d8d0:00000000`00000058=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000290ff14 to fffff8000288f740
STACK_TEXT:
fffff880`02e14718 fffff800`0290ff14 : 00000000`00000050 fffff880`0824d928 00000000`00000000 fffff880`02e14880 : nt!KeBugCheckEx
fffff880`02e14720 fffff800`0288d82e : 00000000`00000000 fffff880`0824d8d0 fffffa80`05db9800 fffff880`00eb9400 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`02e14880 fffffa80`047b0058 : fffff880`00000000 fffffa80`00000008 fffffa80`0000000a ffffffff`80003378 : nt!KiPageFault+0x16e
fffff880`02e14a10 fffff880`00000000 : fffffa80`00000008 fffffa80`0000000a ffffffff`80003378 00000000`00000000 : 0xfffffa80`047b0058
fffff880`02e14a18 fffffa80`00000008 : fffffa80`0000000a ffffffff`80003378 00000000`00000000 00000000`00000001 : 0xfffff880`00000000
fffff880`02e14a20 fffffa80`0000000a : ffffffff`80003378 00000000`00000000 00000000`00000001 00000000`00000e9c : 0xfffffa80`00000008
fffff880`02e14a28 ffffffff`80003378 : 00000000`00000000 00000000`00000001 00000000`00000e9c 00000000`00000000 : 0xfffffa80`0000000a
fffff880`02e14a30 00000000`00000000 : 00000000`00000001 00000000`00000e9c 00000000`00000000 00000000`00000030 : 0xffffffff`80003378
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+42837
fffff800`0290ff14 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42837
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+42837
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+42837
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102510-37955-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0285a000 PsLoadedModuleList = 0xfffff800`02a97e50
Debug session time: Mon Oct 25 17:14:37.269 2010 (UTC - 5:00)
System Uptime: 0 days 12:12:51.300
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800028aa7e7, 0, 7fffffa0000}
Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+3f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028aa7e7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000007fffffa0000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`028aa7e7 66390a cmp word ptr [rdx],cx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000007fffffa0000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b020e0
000007fffffa0000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88003369438 -- (.exr 0xfffff88003369438)
ExceptionAddress: fffff800028aa7e7 (nt!RtlImageNtHeaderEx+0x000000000000003f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000007fffffa0000
Attempt to read from address 000007fffffa0000
TRAP_FRAME: fffff880033694e0 -- (.trap 0xfffff880033694e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000005a4d
rdx=000007fffffa0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028aa7e7 rsp=fffff88003369678 rbp=fffff880033697b0
r8=0000000000000000 r9=fffff880033696b8 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlImageNtHeaderEx+0x3f:
fffff800`028aa7e7 66390a cmp word ptr [rdx],cx ds:0001:000007ff`fffa0000=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002904a39 to fffff800028ca740
STACK_TEXT:
fffff880`03368c68 fffff800`02904a39 : 00000000`0000001e ffffffff`c0000005 fffff800`028aa7e7 00000000`00000000 : nt!KeBugCheckEx
fffff880`03368c70 fffff800`028c9d82 : fffff880`03369438 fffff880`0879d8d0 fffff880`033694e0 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`03369300 fffff800`028c88fa : 00000000`00000000 fffff880`0879d8d0 fffffa80`05985100 fffff800`02be0d2e : nt!KiExceptionDispatch+0xc2
fffff880`033694e0 fffff800`028aa7e7 : fffff800`028aa872 00000000`00000010 00000000`00000082 fffff880`033696a8 : nt!KiPageFault+0x23a
fffff880`03369678 fffff800`028aa872 : 00000000`00000010 00000000`00000082 fffff880`033696a8 fffffa80`0371e040 : nt!RtlImageNtHeaderEx+0x3f
fffff880`03369680 fffffa80`047afbc6 : fffff880`033697b0 00000000`00000000 fffffa80`047b4260 fffffa80`047b8300 : nt!RtlImageNtHeader+0x1e
fffff880`033696b0 fffff880`033697b0 : 00000000`00000000 fffffa80`047b4260 fffffa80`047b8300 00000000`00000000 : 0xfffffa80`047afbc6
fffff880`033696b8 00000000`00000000 : fffffa80`047b4260 fffffa80`047b8300 00000000`00000000 00000000`00000000 : 0xfffff880`033697b0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`028aa7e7 66390a cmp word ptr [rdx],cx
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!RtlImageNtHeaderEx+3f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102510-27112-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02865000 PsLoadedModuleList = 0xfffff800`02aa2e50
Debug session time: Mon Oct 25 18:28:07.403 2010 (UTC - 5:00)
System Uptime: 0 days 0:55:41.434
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800028b57e7, 0, 7fffffa0000}
Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+3f )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028b57e7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000007fffffa0000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`028b57e7 66390a cmp word ptr [rdx],cx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000007fffffa0000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0d0e0
000007fffffa0000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88003362438 -- (.exr 0xfffff88003362438)
ExceptionAddress: fffff800028b57e7 (nt!RtlImageNtHeaderEx+0x000000000000003f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000007fffffa0000
Attempt to read from address 000007fffffa0000
TRAP_FRAME: fffff880033624e0 -- (.trap 0xfffff880033624e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000005a4d
rdx=000007fffffa0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028b57e7 rsp=fffff88003362678 rbp=fffff880033627b0
r8=0000000000000000 r9=fffff880033626b8 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlImageNtHeaderEx+0x3f:
fffff800`028b57e7 66390a cmp word ptr [rdx],cx ds:0001:000007ff`fffa0000=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000290fa39 to fffff800028d5740
STACK_TEXT:
fffff880`03361c68 fffff800`0290fa39 : 00000000`0000001e ffffffff`c0000005 fffff800`028b57e7 00000000`00000000 : nt!KeBugCheckEx
fffff880`03361c70 fffff800`028d4d82 : fffff880`03362438 fffff880`06a338d0 fffff880`033624e0 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`03362300 fffff800`028d38fa : 00000000`00000000 fffff880`06a338d0 fffffa80`066b1000 fffff800`02bebd2e : nt!KiExceptionDispatch+0xc2
fffff880`033624e0 fffff800`028b57e7 : fffff800`028b5872 00000000`00000010 00000000`00000082 fffff880`033626a8 : nt!KiPageFault+0x23a
fffff880`03362678 fffff800`028b5872 : 00000000`00000010 00000000`00000082 fffff880`033626a8 fffffa80`0372a680 : nt!RtlImageNtHeaderEx+0x3f
fffff880`03362680 fffffa80`047aebc6 : fffff880`033627b0 00000000`00000000 fffffa80`047b3260 fffffa80`047b7300 : nt!RtlImageNtHeader+0x1e
fffff880`033626b0 fffff880`033627b0 : 00000000`00000000 fffffa80`047b3260 fffffa80`047b7300 00000000`00000000 : 0xfffffa80`047aebc6
fffff880`033626b8 00000000`00000000 : fffffa80`047b3260 fffffa80`047b7300 00000000`00000000 00000000`00000000 : 0xfffff880`033627b0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`028b57e7 66390a cmp word ptr [rdx],cx
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!RtlImageNtHeaderEx+3f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\102310-38532-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02807000 PsLoadedModuleList = 0xfffff800`02a44e50
Debug session time: Sat Oct 23 20:37:42.333 2010 (UTC - 5:00)
System Uptime: 0 days 2:34:06.252
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800028577e7, 0, 7fffffa0000}
Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+3f )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028577e7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000007fffffa0000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`028577e7 66390a cmp word ptr [rdx],cx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000007fffffa0000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aaf0e0
000007fffffa0000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88003377438 -- (.exr 0xfffff88003377438)
ExceptionAddress: fffff800028577e7 (nt!RtlImageNtHeaderEx+0x000000000000003f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000007fffffa0000
Attempt to read from address 000007fffffa0000
TRAP_FRAME: fffff880033774e0 -- (.trap 0xfffff880033774e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000005a4d
rdx=000007fffffa0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028577e7 rsp=fffff88003377678 rbp=fffff880033777b0
r8=0000000000000000 r9=fffff880033776b8 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlImageNtHeaderEx+0x3f:
fffff800`028577e7 66390a cmp word ptr [rdx],cx ds:0001:000007ff`fffa0000=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028b1a39 to fffff80002877740
STACK_TEXT:
fffff880`03376c68 fffff800`028b1a39 : 00000000`0000001e ffffffff`c0000005 fffff800`028577e7 00000000`00000000 : nt!KeBugCheckEx
fffff880`03376c70 fffff800`02876d82 : fffff880`03377438 fffff880`0693e8d0 fffff880`033774e0 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`03377300 fffff800`028758fa : 00000000`00000000 fffff880`0693e8d0 fffffa80`07002900 fffff800`02b8dd2e : nt!KiExceptionDispatch+0xc2
fffff880`033774e0 fffff800`028577e7 : fffff800`02857872 00000000`00000010 00000000`00000082 fffff880`033776a8 : nt!KiPageFault+0x23a
fffff880`03377678 fffff800`02857872 : 00000000`00000010 00000000`00000082 fffff880`033776a8 fffffa80`0371d680 : nt!RtlImageNtHeaderEx+0x3f
fffff880`03377680 fffffa80`047aebc6 : fffff880`033777b0 00000000`00000000 fffffa80`047b3260 fffffa80`047b7300 : nt!RtlImageNtHeader+0x1e
fffff880`033776b0 fffff880`033777b0 : 00000000`00000000 fffffa80`047b3260 fffffa80`047b7300 00000000`00000000 : 0xfffffa80`047aebc6
fffff880`033776b8 00000000`00000000 : fffffa80`047b3260 fffffa80`047b7300 00000000`00000000 00000000`00000000 : 0xfffff880`033777b0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`028577e7 66390a cmp word ptr [rdx],cx
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!RtlImageNtHeaderEx+3f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
fffff880`00e0f000 fffff880`00e66000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`02c18000 fffff880`02ca2000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0422d000 fffff880`04243000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`00c54000 fffff880`00c5f000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`025d0000 fffff880`025d9000 aswFsBlk aswFsBlk.SYS Tue Sep 07 17:47:09 2010 (4C86506D)
fffff880`02596000 fffff880`025d0000 aswMonFlt aswMonFlt.sys Tue Sep 07 17:47:32 2010 (4C865084)
fffff880`02ca2000 fffff880`02cac000 aswRdr aswRdr.SYS Tue Sep 07 17:47:47 2010 (4C865093)
fffff880`04181000 fffff880`041a4000 aswSP aswSP.SYS Tue Sep 07 17:52:07 2010 (4C865197)
fffff880`01872000 fffff880`01882000 aswTdi aswTdi.SYS Tue Sep 07 17:52:27 2010 (4C8651AB)
fffff880`06400000 fffff880`0640b000 asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`00ff6000 fffff880`00fff000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00c2a000 fffff880`00c54000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`048b7000 fffff880`04dd9000 atikmdag atikmdag.sys Fri Apr 24 13:51:57 2009 (49F199CD)
fffff960`00930000 fffff960`00991000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`019b8000 fffff880`019bf000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`04170000 fffff880`04181000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`06133000 fffff880`06151000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff960`006f0000 fffff960`00717000 cdd cdd.dll unavailable (00000000)
fffff880`0640b000 fffff880`06435000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00e92000 fffff880`00f52000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`0191f000 fffff880`0194f000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00ce5000 fffff880`00d43000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`010f7000 fffff880`0116a000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`0421d000 fffff880`0422d000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0253d000 fffff880`0254b000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`040cf000 fffff880`04152000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`04152000 fffff880`04170000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`02de3000 fffff880`02df2000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`01909000 fffff880`0191f000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`04f0d000 fffff880`04f2f000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`02557000 fffff880`02560000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0254b000 fffff880`02557000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02560000 fffff880`02573000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`04f75000 fffff880`04f81000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`042a1000 fffff880`04395000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04395000 fffff880`043db000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`01085000 fffff880`01099000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01039000 fffff880`01085000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`013d0000 fffff880`013da000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`018cf000 fffff880`01909000 fvevol fvevol.sys Tue Jul 14 02:22:15 2009 (4A5BC1A7)
fffff880`0157f000 fffff880`015c9000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`06435000 fffff880`06442000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff800`02de3000 fffff800`02e2c000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`04067000 fffff880`0408b000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04e74000 fffff880`04ed0000 HdAudio HdAudio.sys Tue Jul 14 03:06:59 2009 (4A5BCC23)
fffff880`04f43000 fffff880`04f5c000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`04f5c000 fffff880`04f64080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04f35000 fffff880`04f43000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`0606b000 fffff880`06133000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`015f3000 fffff880`015fc000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`041ca000 fffff880`041e0000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`043e7000 fffff880`043f6000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04f67000 fffff880`04f75000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff800`00bc0000 fffff800`00bc3000 kdcom kdcom.dll Fri Oct 08 14:17:09 2010 (4CAEFDB5)
fffff880`01882000 fffff880`018c5000 ks ks.sys Tue Jul 14 03:00:31 2009 (4A5BCA9F)
fffff880`013a5000 fffff880`013bf000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`01554000 fffff880`0157f000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`04f2f000 fffff880`04f34200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`02400000 fffff880`02415000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`02573000 fffff880`02596000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`00c8d000 fffff880`00cd1000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`04fa9000 fffff880`04fb7000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`0486a000 fffff880`04879000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04f9c000 fffff880`04fa9000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`00c10000 fffff880`00c2a000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`06151000 fffff880`06169000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`06169000 fffff880`06196000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`06196000 fffff880`061e4000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`06000000 fffff880`06023000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`0182b000 fffff880`01836000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e6f000 fffff880`00e79000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`01099000 fffff880`010f7000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`02dd8000 fffff880`02de3000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`015e1000 fffff880`015f3000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01402000 fffff880`014f4000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`04267000 fffff880`04273000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04800000 fffff880`0482f000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04e5f000 fffff880`04e74000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`02d20000 fffff880`02d2f000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02cac000 fffff880`02cf1000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`014f4000 fffff880`01554000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`01836000 fffff880`01847000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02dcc000 fffff880`02dd8000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff800`02807000 fffff800`02de3000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`01202000 fffff880`013a5000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`019af000 fffff880`019b8000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02cfa000 fffff880`02d20000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`04200000 fffff880`0421d000 parport parport.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`00d76000 fffff880`00d8b000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00d43000 fffff880`00d76000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00e86000 fffff880`00e8d000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00c00000 fffff880`00c10000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`013bf000 fffff880`013d0000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0242d000 fffff880`024d3000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`04ed0000 fffff880`04f0d000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`00cd1000 fffff880`00ce5000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`04243000 fffff880`04267000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04273000 fffff880`0428e000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`0482f000 fffff880`04850000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04850000 fffff880`0486a000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`02d7b000 fffff880`02dcc000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`0428e000 fffff880`04299000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`01810000 fffff880`01819000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01819000 fffff880`01822000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01822000 fffff880`0182b000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`011b6000 fffff880`011f0000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`02415000 fffff880`0242d000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0408b000 fffff880`040bd000 Rt64win7 Rt64win7.sys Thu Feb 26 11:04:13 2009 (49A65B0D)
fffff880`06023000 fffff880`0602e000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`043db000 fffff880`043e7000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`02d2f000 fffff880`02d4c000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`015d9000 fffff880`015e1000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`064f9000 fffff880`0658f000 srv srv.sys Fri Aug 27 06:38:00 2010 (4C773318)
fffff880`06492000 fffff880`064f9000 srv2 srv2.sys Fri Aug 27 06:37:46 2010 (4C77330A)
fffff880`0602e000 fffff880`0605b000 srvnet srvnet.sys Fri Aug 27 06:37:24 2010 (4C7732F4)
fffff880`043f6000 fffff880`043f7480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`061e4000 fffff880`061f6000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`01865000 fffff880`01872000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`01847000 fffff880`01865000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02d67000 fffff880`02d7b000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff960`00590000 fffff960`0059a000 TSDDD TSDDD.dll Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`041a4000 fffff880`041ca000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`024e9000 fffff880`0253d000 udfs udfs.sys Tue Jul 14 02:23:37 2009 (4A5BC1F9)
fffff880`04879000 fffff880`0488b000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04f65000 fffff880`04f66f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04056000 fffff880`04067000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04e05000 fffff880`04e5f000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`04000000 fffff880`04056000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`06442000 fffff880`0645d000 USBSTOR USBSTOR.SYS Tue Jul 14 03:06:34 2009 (4A5BCC0A)
fffff880`041e0000 fffff880`041ed000 usbuhci usbuhci.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`00e79000 fffff880`00e86000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`019bf000 fffff880`019cd000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`019cd000 fffff880`019f2000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`015c9000 fffff880`015d9000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`00d8b000 fffff880`00da0000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00da0000 fffff880`00dfc000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`0116a000 fffff880`011b6000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`02d4c000 fffff880`02d67000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`01800000 fffff880`01810000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`00f52000 fffff880`00ff6000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00e00000 fffff880`00e0f000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02cf1000 fffff880`02cfa000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff960`000d0000 fffff960`003df000 win32k win32k.sys Wed Sep 01 05:58:04 2010 (4C7DC13C)
fffff880`00e66000 fffff880`00e6f000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`025d9000 fffff880`025fa000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`0645d000 fffff880`0646e000 usbaapl64.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`04fb7000 fffff880`04fe8000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`0646e000 fffff880`0647f000 WinUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`0658f000 fffff880`06600000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0658f000 fffff880`065a0000 usbaapl64.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`065b1000 fffff880`065e2000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`065a0000 fffff880`065b1000 WinUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`065c0000 fffff880`065d1000 usbaapl64.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`0645d000 fffff880`0648e000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`065d1000 fffff880`065e2000 WinUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`0645d000 fffff880`0646e000 usbaapl64.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`0658f000 fffff880`065c0000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`0646e000 fffff880`0647f000 WinUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
fffff880`04f81000 fffff880`04f9c000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
fffff880`0658f000 fffff880`06600000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01985000 fffff880`019af000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002A000
fffff880`0194f000 fffff880`0195d000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0195d000 fffff880`01969000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01969000 fffff880`01972000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01972000 fffff880`01985000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000