Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\092910-29390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a54000 PsLoadedModuleList = 0x82b9c810
System Uptime: 0 days 0:15:43.012
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82ac1fcd, 986efc44, 986ef820}
Probably caused by : hardware ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ac1fcd, The address that the exception occurred at
Arg3: 986efc44, Exception Record Address
Arg4: 986ef820, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExpWorkerThread+1af
82ac1fcd 0081e100e000 add byte ptr [ecx+0E000E1h],al
EXCEPTION_RECORD: 986efc44 -- (.exr 0xffffffff986efc44)
ExceptionAddress: 82ac1fcd (nt!ExpWorkerThread+0x000001af)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00e0a0e1
Attempt to write to address 00e0a0e1
CONTEXT: 986ef820 -- (.cxr 0xffffffff986ef820)
eax=00017087 ebx=82b8e580 ecx=0000a000 edx=00000002 esi=877c9709 edi=86299498
eip=82ac1fcd esp=986efd0c ebp=986efd50 iopl=0 ov dn ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010e06
nt!ExpWorkerThread+0x1af:
82ac1fcd 0081e100e000 add byte ptr [ecx+0E000E1h],al ds:0023:00e0a0e1=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 00e0a0e1
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bbc718
Unable to read MiSystemVaType memory at 82b9c160
00e0a0e1
FOLLOWUP_IP:
nt!ExpWorkerThread+1af
82ac1fcd 0081e100e000 add byte ptr [ecx+0E000E1h],al
BUGCHECK_STR: 0x7E
MISALIGNED_IP:
nt!ExpWorkerThread+1af
82ac1fcd 0081e100e000 add byte ptr [ecx+0E000E1h],al
LAST_CONTROL_TRANSFER: from 82c6266d to 82ac1fcd
STACK_TEXT:
986efd50 82c6266d 80000000 b5865db1 00000000 nt!ExpWorkerThread+0x1af
986efd90 82b140d9 82ac1e1e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100110-22105-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e50000 PsLoadedModuleList = 0x82f98810
System Uptime: 0 days 0:58:18.000
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 8da41bf8, Virtual address for the attempted execute.
Arg2: 52fe9963, PTE contents.
Arg3: 8da41b5c, (reserved)
Arg4: 00000002, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: 8da41b5c -- (.trap 0xffffffff8da41b5c)
ErrCode = 00000011
eax=858c8a28 ebx=8da41bf8 ecx=00000006 edx=00000000 esi=8858e338 edi=858c8940
eip=8da41bf8 esp=8da41bd0 ebp=8da41be4 iopl=0 nv up ei pl nz ac pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216
8da41bf8 004000 add byte ptr [eax],al ds:0023:858c8a28=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 82e96638 to 82ed5903
STACK_TEXT:
8da41b44 82e96638 00000008 8da41bf8 00000000 nt!MmAccessFault+0x106
8da41b44 8da41bf8 00000008 8da41bf8 00000000 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
8da41be4 8308616b 00a41bf8 00000000 858c8b1c 0x8da41bf8
8da41c40 82ec2c2b 00000000 858c8940 00000000 nt!EtwpRealtimeSendEmptyMarker+0x3b
8da41d08 83082a5a 858c8940 00000001 00000000 nt!EtwpFlushActiveBuffers+0x303
8da41d50 8305e6d3 858c8940 a07935ba 00000000 nt!EtwpLogger+0x2a1
8da41d90 82f100f9 830827b9 858c8940 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
82e96638 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
FAILURE_BUCKET_ID: 0xFC_nt!KiTrap0E+dc
BUCKET_ID: 0xFC_nt!KiTrap0E+dc
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100210-19578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e0f000 PsLoadedModuleList = 0x82f57810
System Uptime: 0 days 2:07:05.000
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82e98a2c, 8d9d7c28, 8d9d7800}
Probably caused by : hardware ( nt!MmOutSwapProcess+66 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e98a2c, The address that the exception occurred at
Arg3: 8d9d7c28, Exception Record Address
Arg4: 8d9d7800, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MmOutSwapProcess+66
82e98a2c 0200 add al,byte ptr [eax]
EXCEPTION_RECORD: 8d9d7c28 -- (.exr 0xffffffff8d9d7c28)
ExceptionAddress: 82e98a2c (nt!MmOutSwapProcess+0x00000066)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
CONTEXT: 8d9d7800 -- (.cxr 0xffffffff8d9d7800)
eax=00000000 ebx=886715c8 ecx=8d8e103c edx=0000000c esi=88671550 edi=88671358
eip=82e98a2c esp=8d9d7cf0 ebp=8d9d7d20 iopl=0 nv up ei ng nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010293
nt!MmOutSwapProcess+0x66:
82e98a2c 0200 add al,byte ptr [eax] ds:0023:00000000=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000000
READ_ADDRESS: GetPointerFromAddress: unable to read from 82f77718
Unable to read MiSystemVaType memory at 82f57160
00000000
FOLLOWUP_IP:
nt!MmOutSwapProcess+66
82e98a2c 0200 add al,byte ptr [eax]
BUGCHECK_STR: 0x7E
MISALIGNED_IP:
nt!MmOutSwapProcess+66
82e98a2c 0200 add al,byte ptr [eax]
LAST_CONTROL_TRANSFER: from 82ea11a2 to 82e98a2c
STACK_TEXT:
8d9d7d20 82ea11a2 00000000 858aed48 00000000 nt!MmOutSwapProcess+0x66
8d9d7d44 82e9affe 00000000 8d9d7d90 8301d6d3 nt!KiOutSwapProcesses+0xc5
8d9d7d50 8301d6d3 00000000 a042926b 00000000 nt!KeSwapProcessOrStack+0x53
8d9d7d90 82ecf0f9 82e9afab 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmOutSwapProcess+66
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xffffffff8d9d7800 ; kb
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
80ba6000 80bae000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
82e0f000 8321f000 nt ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
8321f000 83256000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
83c00000 83c21000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
83c21000 83c2e000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
83c35000 83c40000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
83c40000 83c51000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
83c51000 83c59000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
83c59000 83c9b000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
83c9b000 83d46000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
83d46000 83db7000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
83db7000 83dc5000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
83dc5000 83df7000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55)
83df7000 83dff000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
83e00000 83e1f000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
83e1f000 83e27000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
83e28000 83e70000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
83e70000 83e79000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
83e79000 83e81000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
83e81000 83eab000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
83eab000 83eb6000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
83eb6000 83ec7000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
83ec7000 83ed7000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
83ed7000 83f22000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
83f22000 83f29000 pciide pciide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
83f29000 83f37000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
83f37000 83f4d000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
83f4d000 83f56000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
83f56000 83f79000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
83f79000 83f82000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
83f82000 83fb6000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
83fb6000 83fc7000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
83fc7000 83ff4000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
83ff4000 83ffc000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8b800000 8b813000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b813000 8b838000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
8b83b000 8b897360 mfehidk mfehidk.sys Sat Aug 07 01:33:01 2010 (4C5C8D9D)
8b898000 8b9c7000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
8b9c7000 8b9f2000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8b9f2000 8b9fe000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
8ba11000 8ba18000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
8ba18000 8ba1f000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8ba1f000 8ba7c000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
8ba7c000 8ba8a000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8ba8a000 8ba93000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
8ba93000 8bb4a000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
8bb4a000 8bb88000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
8bb88000 8bbad000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6)
8bbad000 8bbec000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
8bbec000 8bbff000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
8bc00000 8bc11000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
8bc11000 8bc19000 AtiPcie AtiPcie.sys Tue May 05 18:00:16 2009 (4A005480)
8bc28000 8bd71000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB)
8bd71000 8bda2000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8bda2000 8bdc85a0 mfewfpk mfewfpk.sys Sat Aug 07 01:33:27 2010 (4C5C8DB7)
8bdc9000 8bdd4000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8bdd4000 8bddc380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8bddd000 8bde5000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
8bde5000 8bdf5000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8bdf5000 8bdfd000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
90400000 90410000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
9041c000 90427000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
90427000 90435000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
90435000 9044c000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
9044c000 9047e000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
9047e000 904d8000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
904d8000 904df000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
904df000 904fe000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
904fe000 9050bf60 mfenlfk mfenlfk.sys Sat Aug 07 01:33:41 2010 (4C5C8DC5)
9050c000 9051a000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
9051a000 90534000 serial serial.sys Tue Jul 14 02:45:33 2009 (4A5BC71D)
90534000 90547000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
90547000 90557000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
90557000 90598000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
90598000 905a2000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
905a2000 905ac000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
905ac000 905b8000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
905b8000 905cf000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
905cf000 905dc000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
905dc000 905f7000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
905f7000 90600000 Sftvollh Sftvollh.sys Fri Apr 23 21:18:31 2010 (4BD1E477)
90c00000 90c0a000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
90c3d000 90cc2000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
90cc2000 90cdb000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
90cdb000 90ced000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
90ced000 90d10000 mrxsmb mrxsmb.sys Sat Feb 27 09:32:02 2010 (4B88CA72)
90d10000 90d4b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
90d4b000 90d66000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
90d66000 90dfd000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
91000000 91018000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
91018000 9102f000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
9102f000 91039000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
91039000 9109d000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
9109d000 910b5000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
910b5000 910c3000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
910c3000 910e4000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
910e4000 910f5000 amdppm amdppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
910f5000 91140000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
91140000 9114d000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
9114d000 91190000 Rt86win7 Rt86win7.sys Mon May 31 06:46:23 2010 (4C03310F)
91190000 91199000 wmiacpi wmiacpi.sys Tue Jul 14 02:19:16 2009 (4A5BC0F4)
91199000 911a6000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
911a6000 911b8000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
911b8000 911d0000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
911d0000 911db000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
911db000 911fd000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
91c00000 91c0a000 serenum serenum.sys Tue Jul 14 02:45:27 2009 (4A5BC717)
91c0a000 91c0b420 ASACPI ASACPI.sys Fri Aug 13 05:52:52 2004 (411C2D04)
91c0c000 91c24000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
91c24000 91c25380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
91c28000 926a5dc0 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:14 2010 (4C379162)
926a6000 926a7040 nvBridge nvBridge.kmd Sat Jul 10 00:10:11 2010 (4C379033)
926a8000 9275f000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
9275f000 92798000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
92798000 927b7000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
927b7000 927d9180 nusb3xhc nusb3xhc.sys Fri Jan 22 05:21:48 2010 (4B5919CC)
927da000 927db700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
927dc000 927e2000 usbfilter usbfilter.sys Wed Oct 07 10:43:57 2009 (4ACC46BD)
927e2000 927ec000 usbohci usbohci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
927ec000 927fb000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
96600000 9660b000 hidusb hidusb.sys Tue Jul 14 02:51:04 2009 (4A5BC868)
9660b000 9661e000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
9661e000 96624480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
96625000 96630000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
96631000 96665000 ks ks.sys Thu Mar 04 05:57:52 2010 (4B8F2FC0)
96665000 96673000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
96673000 96681a00 nusb3hub nusb3hub.sys Fri Jan 22 05:21:46 2010 (4B5919CA)
96682000 966c6000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
966c6000 966d7000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
966d7000 966f4000 nvhda32v nvhda32v.sys Tue Jun 22 01:07:07 2010 (4C1FE28B)
966f4000 96723000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
96723000 9673c000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
9673c000 9675f7c0 mfeavfk mfeavfk.sys Sat Aug 07 01:34:10 2010 (4C5C8DE2)
96760000 967aa4c0 mfefirek mfefirek.sys Sat Aug 07 01:36:56 2010 (4C5C8E88)
967ab000 967b5000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
967b5000 967c2000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
967c2000 967cd000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
967cd000 967d6000 dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
967d6000 967e7000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
967e7000 967f2000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
967f2000 967fe000 ffusbaudio ffusbaudio.sys Fri Mar 05 17:22:18 2010 (4B9121AA)
96e00000 96e8c000 Sftfslh Sftfslh.sys Fri Apr 23 21:18:40 2010 (4BD1E480)
96e8c000 96ec2000 Sftplaylh Sftplaylh.sys Fri Apr 23 21:19:38 2010 (4BD1E4BA)
96ec2000 96ee3000 srvnet srvnet.sys Tue Jun 22 05:47:09 2010 (4C20242D)
96ee3000 96ef0000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
96f14000 96f63000 srv2 srv2.sys Tue Jun 22 05:47:19 2010 (4C202437)
96f63000 96fb4000 srv srv.sys Tue Jun 22 05:47:32 2010 (4C202444)
96fb4000 96fbd000 Sftredirlh Sftredirlh.sys Fri Apr 23 21:19:31 2010 (4BD1E4B3)
96fbd000 96fd28e0 mfeapfk mfeapfk.sys Sat Aug 07 01:33:47 2010 (4C5C8DCB)
96fd3000 96fde000 mfebopk mfebopk.sys Sat Aug 07 01:34:22 2010 (4C5C8DEE)
96fde000 96fe9e80 cfwids cfwids.sys Sat Aug 07 01:38:06 2010 (4C5C8ECE)
98c90000 98eda000 win32k win32k.sys unavailable (00000000)
98ef0000 98ef9000 TSDDD TSDDD.dll unavailable (00000000)
98f20000 98f3e000 cdd cdd.dll unavailable (00000000)
a5629000 a5693000 spsys spsys.sys Mon May 11 19:37:10 2009 (4A085436)
Unloaded modules:
96ef0000 96f14000 mfeavfk01.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
90d66000 90d7e000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8bc19000 8bc26000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8bbec000 8bbf7000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8bbf7000 8bc00000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8ba00000 8ba11000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000