050311-19827-01.dmp
BugCheck A, {28, 2, 0, fffff80002ed3628}
Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )
050311-20888-01.dmp
BugCheck 3B, {c0000005, fffff88002828608, fffff8800835b850, 0}
Probably caused by : eamonm.sys ( eamonm+4608 )
050311-22573-01.dmp
BugCheck 4A, {732f2e09, 2, 0, fffff880085efca0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
050211-20576-01.dmp
BugCheck 1A, {41287, 38, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46585 )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050211-20576-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`03047e90
Debug session time: Mon May 2 21:52:16.621 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:28.400
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41287, 38, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46585 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41287
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iTunesHelper.e
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003316900 -- (.trap 0xfffff88003316900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005e201f8 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8a000107238 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f7fdf7 rsp=fffff88003316a90 rbp=0000000000000000
r8=fffffa8006610006 r9=fffffa8003b2c048 r10=fffffa80055bbe60
r11=fffffa80055bab60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiEmptyPageAccessLog+0xe7:
fffff800`02f7fdf7 8b4138 mov eax,dword ptr [rcx+38h] ds:ca60:00000000`00000038=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e1562e to fffff80002e82640
STACK_TEXT:
fffff880`03316798 fffff800`02e1562e : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : nt!KeBugCheckEx
fffff880`033167a0 fffff800`02e8076e : 00000000`00000000 00000000`00000038 00000000`00000000 00000000`00162406 : nt! ?? ::FNODOBFM::`string'+0x46585
fffff880`03316900 fffff800`02f7fdf7 : fffffa80`066140e0 fffffa80`055bbea0 00000000`00000002 fffff880`02f637f0 : nt!KiPageFault+0x16e
fffff880`03316a90 fffff800`02efb6d3 : fffffa80`066140e0 00000003`00000000 00000000`00000000 fffffa80`05e201f8 : nt!MiEmptyPageAccessLog+0xe7
fffff880`03316b00 fffff800`02e6d206 : 00000000`00000239 00000000`00000000 fffffa80`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4d8db
fffff880`03316b80 fffff800`02e6d6c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316bd0 fffff800`0311fcce : fffffa80`033eca60 00000000`00000080 fffffa80`033c7040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d40 fffff800`02e73fe6 : fffff880`02f63180 fffffa80`033eca60 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03316d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+46585
fffff800`02e1562e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+46585
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+46585
BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+46585
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-19827-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`03051e90
Debug session time: Wed May 4 01:44:22.631 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:51.410
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {28, 2, 0, fffff80002ed3628}
Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ed3628, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bd0e8
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiFindNodeOrParent+0
fffff800`02ed3628 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: mscorsvw.exe
TRAP_FRAME: fffff88003316810 -- (.trap 0xfffff88003316810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed3628 rsp=fffff880033169a8 rbp=0000000000000000
r8=fffff880033169f0 r9=0000000000000000 r10=fffffa80053bf6d0
r11=fffffa80053bb4c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiFindNodeOrParent:
fffff800`02ed3628 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8bbe9 to fffff80002e8c640
STACK_TEXT:
fffff880`033166c8 fffff800`02e8bbe9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033166d0 fffff800`02e8a860 : 00000000`00000049 00000000`00000001 fffff880`02fd3180 fffffa80`053bf718 : nt!KiBugCheckDispatch+0x69
fffff880`03316810 fffff800`02ed3628 : fffff800`02ed5807 fffff880`00000000 00000000`00000000 fffff880`02fd3180 : nt!KiPageFault+0x260
fffff880`033169a8 fffff800`02ed5807 : fffff880`00000000 00000000`00000000 fffff880`02fd3180 00000000`00000000 : nt!MiFindNodeOrParent
fffff880`033169b0 fffff800`02ed58dd : fffffa80`03406a60 fffff880`00000000 fffff880`03316a60 00000000`00000000 : nt!MiLocateAddressInTree+0x17
fffff880`033169e0 fffff800`02ed5958 : 00000000`00000000 fffffa80`03457000 fffffa80`0452b048 fffffa80`053bf750 : nt!MiGetSharedProtosAtDpcLevel+0xbd
fffff880`03316a30 fffff800`02e2397b : fffffa80`06a91060 fffff800`00000003 fffff880`03316ba0 00000000`00000000 : nt!MiGetSharedProtos+0x18
fffff880`03316a60 fffff800`02f89e70 : 00000000`00000000 fffffa80`053bf710 00000000`00000002 fffff880`02fd37f0 : nt! ?? ::FNODOBFM::`string'+0x938b
fffff880`03316a90 fffff800`02f056d3 : fffffa80`06a91060 00000003`00000000 fffffa80`053bf6d0 fffffa80`053bf750 : nt!MiEmptyPageAccessLog+0x160
fffff880`03316b00 fffff800`02e77206 : 00000000`000000e8 00000000`00000000 fffffa80`00000000 00000000`00000003 : nt! ?? ::FNODOBFM::`string'+0x4d8db
fffff880`03316b80 fffff800`02e776c3 : 00000000`00000008 fffff880`03316c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316bd0 fffff800`03129cce : fffffa80`03406a60 00000000`00000080 fffffa80`033e1040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d40 fffff800`02e7dfe6 : fffff880`02f63180 fffffa80`03406a60 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03316d80 00000000`00000000 : fffff880`03317000 fffff880`03311000 fffff880`03316700 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiFindNodeOrParent+0
fffff800`02ed3628 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiFindNodeOrParent+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiFindNodeOrParent+0
BUCKET_ID: X64_0xA_nt!MiFindNodeOrParent+0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-20888-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03049e90
Debug session time: Wed May 4 00:54:43.283 2011 (UTC - 4:00)
System Uptime: 0 days 0:12:19.062
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88002828608, fffff8800835b850, 0}
Probably caused by : eamonm.sys ( eamonm+4608 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88002828608, Address of the instruction which caused the bugcheck
Arg3: fffff8800835b850, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
eamonm+4608
fffff880`02828608 418d5010 lea edx,[r8+10h]
CONTEXT: fffff8800835b850 -- (.cxr 0xfffff8800835b850)
rax=0001000000027d68 rbx=0000000000010000 rcx=fffff8800835c2a0
rdx=fffff8800835cc01 rsi=0000000000000000 rdi=0000000000027d68
rip=fffff88002828608 rsp=fffff8800835c230 rbp=fffffa8006620d10
r8=0000000000000000 r9=fffff880009e8180 r10=fffffa8003400e00
r11=fffffa80033ed800 r12=0000000000000100 r13=fffff8800835c500
r14=0000000000000160 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
eamonm+0x4608:
fffff880`02828608 418d5010 lea edx,[r8+10h]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88002828608
STACK_TEXT:
fffff880`0835c230 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : eamonm+0x4608
FOLLOWUP_IP:
eamonm+4608
fffff880`02828608 418d5010 lea edx,[r8+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: eamonm+4608
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: eamonm
IMAGE_NAME: eamonm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d006930
STACK_COMMAND: .cxr 0xfffff8800835b850 ; kb
FAILURE_BUCKET_ID: X64_0x3B_eamonm+4608
BUCKET_ID: X64_0x3B_eamonm+4608
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-22573-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
Debug session time: Wed May 4 01:46:47.828 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:32.607
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4A, {732f2e09, 2, 0, fffff880085efca0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a)
Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL.
Arguments:
Arg1: 00000000732f2e09, Address of system function (system call routine)
Arg2: 0000000000000002, Current IRQL
Arg3: 0000000000000000, 0
Arg4: fffff880085efca0, 0
Debugging Details:
------------------
PROCESS_NAME: firefox.exe
BUGCHECK_STR: RAISED_IRQL_FAULT
FAULTING_IP:
+3465333639643035
00000000`732f2e09 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002ee7be9 to fffff80002ee8640
STACK_TEXT:
fffff880`085efad8 fffff800`02ee7be9 : 00000000`0000004a 00000000`732f2e09 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`085efae0 fffff800`02ee7b20 : fffffa80`0699ba10 00000000`00000000 00000000`00000000 00000000`04500101 : nt!KiBugCheckDispatch+0x69
fffff880`085efc20 00000000`732f2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`000ce948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x732f2e09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+245
fffff800`02ee7b20 4883ec50 sub rsp,50h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceExit+245
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_RAISED_IRQL_FAULT_firefox.exe_nt!KiSystemServiceExit+245
BUCKET_ID: X64_RAISED_IRQL_FAULT_firefox.exe_nt!KiSystemServiceExit+245
Followup: MachineOwner
---------
start end module name
fffff880`00ee0000 fffff880`00f37000 ACPI ACPI.sys Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`02c9e000 fffff880`02d27000 afd afd.sys Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`045c8000 fffff880`045de000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`011d0000 fffff880`011e5000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e14000 fffff880`00e1f000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00e00000 fffff880`00e09000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000 ataport ataport.SYS Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`0424e000 fffff880`04474000 athrx athrx.sys Thu May 06 20:00:58 2010 (4BE3583A)
fffff880`041b4000 fffff880`041d4000 AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`04818000 fffff880`04fec000 atikmdag atikmdag.sys Thu Oct 28 11:34:12 2010 (4CC997F4)
fffff880`03e66000 fffff880`03eb1000 atikmpag atikmpag.sys Thu Oct 28 11:03:39 2010 (4CC990CB)
fffff880`019a4000 fffff880`019ac000 AtiPcie64 AtiPcie64.sys Wed Mar 10 09:33:45 2010 (4B97ADC9)
fffff880`00fa8000 fffff880`00fb4000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`019f6000 fffff880`019fd000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c5f000 fffff880`02c70000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0283a000 fffff880`02858000 bowser bowser.sys Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`00660000 fffff960`00687000 cdd cdd.dll Sat Nov 20 07:55:34 2010 (4CE7C546)
fffff880`01600000 fffff880`0162a000 cdrom cdrom.sys Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00cd7000 fffff880`00d97000 CI CI.dll Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01974000 fffff880`019a4000 CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c79000 fffff880`00cd7000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045b3000 fffff880`045b7500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`010ea000 fffff880`0115c000 cng cng.sys Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`00f9f000 fffff880`00fa8000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`045b8000 fffff880`045c8000 CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`05ed8000 fffff880`05ee6000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c41000 fffff880`02c5f000 dfsc dfsc.sys Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`02c32000 fffff880`02c41000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0195e000 fffff880`01974000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`041d4000 fffff880`041f6000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05ee6000 fffff880`05ef2000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05efd000 fffff880`05f10000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05ef2000 fffff880`05efd000 dump_msahci dump_msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`05e73000 fffff880`05e7f000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eb1000 fffff880`03fa5000 dxgkrnl dxgkrnl.sys Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`03fa5000 fffff880`03feb000 dxgmms1 dxgmms1.sys Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`02880000 fffff880`02959000 eamonm eamonm.sys Thu Dec 09 00:29:20 2010 (4D006930)
fffff880`01581000 fffff880`015a6000 ehdrv ehdrv.sys Thu Dec 09 00:29:58 2010 (4D006956)
fffff880`0467e000 fffff880`0469f000 epfwwfpr epfwwfpr.sys Thu Dec 09 00:26:09 2010 (4D006871)
fffff880`01078000 fffff880`0108c000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0102c000 fffff880`01078000 fltmgr fltmgr.sys Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01924000 fffff880`0195e000 fvevol fvevol.sys Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01831000 fffff880`0187b000 fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`04491000 fffff880`0449e000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02e1f000 fffff800`02e68000 hal hal.dll Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03e00000 fffff880`03e24000 HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`05f33000 fffff880`05ffc000 HTTP HTTP.sys Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`0191b000 fffff880`01924000 hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`0451d000 fffff880`0453b000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04046000 fffff880`040a7000 k57nd60a k57nd60a.sys Sat May 15 08:51:06 2010 (4BEE98BA)
fffff880`0453b000 fffff880`0454a000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bbd000 fffff800`00bc7000 kdcom kdcom.dll Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`040f0000 fffff880`04133000 ks ks.sys Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013e4000 fffff880`013ff000 ksecdd ksecdd.sys Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01556000 fffff880`01581000 ksecpkg ksecpkg.sys Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`041f6000 fffff880`041fb200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0297a000 fffff880`0298f000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05f10000 fffff880`05f33000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c58000 fffff880`00c65000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05eca000 fffff880`05ed8000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0459b000 fffff880`045aa000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00fe0000 fffff880`00ffa000 mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`02858000 fffff880`02870000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03e24000 fffff880`03e51000 mrxsmb mrxsmb.sys Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`0460d000 fffff880`0465a000 mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`0465a000 fffff880`0467e000 mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`00e09000 fffff880`00e14000 msahci msahci.sys Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`01224000 fffff880`0122f000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f40000 fffff880`00f4a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0108c000 fffff880`010ea000 msrpc msrpc.sys Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`02c27000 fffff880`02c32000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01909000 fffff880`0191b000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`019e4000 fffff880`019ed000 mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 06:07:30 2009 (4A24F9E2)
fffff880`02c1f000 fffff880`02c27000 mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 06:07:39 2009 (4A24F9EB)
fffff880`02c0c000 fffff880`02c1f000 mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 06:15:29 2009 (4A24FBC1)
fffff880`01403000 fffff880`014f6000 ndis ndis.sys Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`04224000 fffff880`04230000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`029e2000 fffff880`029f5000 ndisuio ndisuio.sys Sat Nov 20 05:50:08 2010 (4CE7A7E0)
fffff880`040a7000 fffff880`040d6000 ndiswan ndiswan.sys Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0419f000 fffff880`041b4000 NDProxy NDProxy.SYS Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02d6c000 fffff880`02d7b000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0118b000 fffff880`011d0000 netbt netbt.sys Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`014f6000 fffff880`01556000 NETIO NETIO.SYS Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`0122f000 fffff880`01240000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c00000 fffff880`02c0c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e68000 fffff800`03452000 nt ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01241000 fffff880`013e4000 Ntfs Ntfs.sys Thu Mar 10 22:39:39 2011 (4D79997B)
fffff880`04489000 fffff880`04491000 NTIDrvr NTIDrvr.sys Mon Apr 19 21:37:59 2010 (4BCD0577)
fffff880`019ed000 fffff880`019f6000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0298f000 fffff880`029e2000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d30000 fffff880`02d56000 pacer pacer.sys Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00f8a000 fffff880`00f9f000 partmgr partmgr.sys Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f4a000 fffff880`00f7d000 pci pci.sys Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fc9000 fffff880`00fd0000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fd0000 fffff880`00fe0000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0469f000 fffff880`04745000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`02800000 fffff880`0280c000 pnarp pnarp.sys Tue Apr 01 04:44:59 2008 (47F1F60B)
fffff880`04000000 fffff880`0403d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c65000 fffff880`00c79000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0280c000 fffff880`02818000 purendis purendis.sys Wed Jan 02 19:39:32 2008 (477C2EC4)
fffff880`04200000 fffff880`04224000 rasl2tp rasl2tp.sys Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`04230000 fffff880`0424b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`045de000 fffff880`045ff000 raspptp raspptp.sys Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`040d6000 fffff880`040f0000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02daa000 fffff880`02dfb000 rdbss rdbss.sys Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`015e9000 fffff880`015f2000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015f2000 fffff880`015fb000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0121b000 fffff880`01224000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018cf000 fffff880`01909000 rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`02818000 fffff880`02830000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c13000 fffff880`05e72400 RTKVHD64 RTKVHD64.sys Tue Sep 21 04:09:43 2010 (4C986847)
fffff880`04745000 fffff880`04750000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`018c7000 fffff880`018cf000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06239000 fffff880`062d1000 srv srv.sys Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`04793000 fffff880`047fd000 srv2 srv2.sys Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`04750000 fffff880`04781000 srvnet srvnet.sys Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`0424b000 fffff880`0424c480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0454a000 fffff880`04599000 SynTP SynTP.sys Thu Dec 10 21:30:38 2009 (4B21AECE)
fffff880`0162d000 fffff880`01831000 tcpip tcpip.sys Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`04781000 fffff880`04793000 tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`0117e000 fffff880`0118b000 TDI TDI.SYS Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0115c000 fffff880`0117e000 tdx tdx.sys Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`02d96000 fffff880`02daa000 termdd termdd.sys Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00450000 fffff960`0045a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`02c70000 fffff880`02c96000 tunnel tunnel.sys Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`04481000 fffff880`04489000 UBHelper UBHelper.sys Tue Jul 06 00:19:26 2010 (4C32AECE)
fffff880`04133000 fffff880`04145000 umbus umbus.sys Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`05e7f000 fffff880`05e9c000 usbccgp usbccgp.sys Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`04599000 fffff880`0459af00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0450c000 fffff880`0451d000 usbehci usbehci.sys Fri Dec 04 02:26:02 2009 (4B18B98A)
fffff880`044ff000 fffff880`0450c000 usbfilter usbfilter.sys Thu Apr 29 06:43:06 2010 (4BD962BA)
fffff880`04145000 fffff880`0419f000 usbhub usbhub.sys Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`0449e000 fffff880`044a9000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044a9000 fffff880`044ff000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05e9c000 fffff880`05ec9280 usbvideo usbvideo.sys Sat Nov 20 05:44:34 2010 (4CE7A692)
fffff880`00f7d000 fffff880`00f8a000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`015a6000 fffff880`015b4000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`015b4000 fffff880`015d9000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fb4000 fffff880`00fc9000 volmgr volmgr.sys Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00d97000 fffff880`00df3000 volmgrx volmgrx.sys Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`0187b000 fffff880`018c7000 volsnap volsnap.sys Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`04474000 fffff880`04481000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d56000 fffff880`02d6c000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02830000 fffff880`0283a000 vwifimp vwifimp.sys Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`02d7b000 fffff880`02d96000 wanarp wanarp.sys Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`015d9000 fffff880`015e9000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e2d000 fffff880`00ed1000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed1000 fffff880`00ee0000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d27000 fffff880`02d30000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00372000 win32k win32k.sys Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`045aa000 fffff880`045b3000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f37000 fffff880`00f40000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02959000 fffff880`0297a000 WudfPf WudfPf.sys Sat Nov 20 05:42:44 2010 (4CE7A624)
Unloaded modules:
fffff880`019ac000 fffff880`019ba000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`019ba000 fffff880`019c6000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`019c6000 fffff880`019d1000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
fffff880`019d1000 fffff880`019e4000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000