Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100610-15578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c54000 PsLoadedModuleList = 0x82d93570
System Uptime: 0 days 0:00:32.204
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 94651b45, ab9dc85c, 0}
Unable to load image \SystemRoot\System32\Drivers\avgtdix.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdix.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
Probably caused by : srvnet.sys ( srvnet!SrvNetWskDisconnectConnection+48 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 94651b45, The address that the exception occurred at
Arg3: ab9dc85c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
srvnet!SrvNetWskDisconnectConnection+48
94651b45 8b08 mov ecx,dword ptr [eax]
TRAP_FRAME: ab9dc85c -- (.trap 0xffffffffab9dc85c)
ErrCode = 00000000
eax=00000000 ebx=8791b018 ecx=ab9dc8e0 edx=00000000 esi=8791a258 edi=8791b180
eip=94651b45 esp=ab9dc8d0 ebp=ab9dc8f8 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
srvnet!SrvNetWskDisconnectConnection+0x48:
94651b45 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avgnsx.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 9464fb80 to 94651b45
STACK_TEXT:
ab9dc8f8 9464fb80 8791b018 9465a000 8791b018 srvnet!SrvNetWskDisconnectConnection+0x48
ab9dc910 9464fe9a 0091b018 8791b180 8791b018 srvnet!SrvNetDisconnectConnectionInternal+0x12e
ab9dc938 94651815 0091b018 ab9dcad0 879c4ca0 srvnet!SrvNetDisconnectConnection+0x237
ab9dca80 89700ed3 8791b018 00000000 87638324 srvnet!SrvNetWskReceiveEvent+0x2e2
ab9dcab4 8973e70b 879c4ca0 009dcad0 878fc180 afd!WskProTLEVENTReceive+0xc4
ab9dcaec 89b89e56 878ed008 87c3a268 00000820 afd!WskTdiEHReceive+0x1f4
WARNING: Stack unwind information not available. Following frames may be wrong.
ab9dcb4c 89b8a1ac 008fc108 00000000 92095f94 avgtdix+0x4e56
ab9dcb64 89b8acd1 008fc108 92095f94 0000006c avgtdix+0x51ac
ab9dcba0 89b862a4 87759358 87647360 85e121c0 avgtdix+0x5cd1
ab9dcbec 89b8857f 85e121c0 87759358 ab9dcc14 avgtdix+0x12a4
ab9dcbfc 82c82f44 85e121c0 87759358 87759358 avgtdix+0x357f
ab9dcc14 82e58307 87647360 87759358 877593c8 nt!IofCallDriver+0x63
ab9dcc34 82e5a6fa 85e121c0 87647360 00000000 nt!IopSynchronousServiceTail+0x1f8
ab9dccd0 82e6173b 85e121c0 87759358 00000000 nt!IopXxxControlFile+0x6aa
ab9dcd04 82c8979a 000002f8 00000378 00000000 nt!NtDeviceIoControlFile+0x2a
ab9dcd04 770364f4 000002f8 00000378 00000000 nt!KiFastCallEntry+0x12a
0186fd2c 00000000 00000000 00000000 00000000 0x770364f4
STACK_COMMAND: kb
FOLLOWUP_IP:
srvnet!SrvNetWskDisconnectConnection+48
94651b45 8b08 mov ecx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: srvnet!SrvNetWskDisconnectConnection+48
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srvnet
IMAGE_NAME: srvnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c20242d
FAILURE_BUCKET_ID: 0x8E_srvnet!SrvNetWskDisconnectConnection+48
BUCKET_ID: 0x8E_srvnet!SrvNetWskDisconnectConnection+48
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100610-14812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c4d000 PsLoadedModuleList = 0x82d8c570
System Uptime: 0 days 0:22:52.891
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 90755b45, ac08b85c, 0}
Unable to load image \SystemRoot\System32\Drivers\avgtdix.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdix.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
Probably caused by : srvnet.sys ( srvnet!SrvNetWskDisconnectConnection+48 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 90755b45, The address that the exception occurred at
Arg3: ac08b85c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
srvnet!SrvNetWskDisconnectConnection+48
90755b45 8b08 mov ecx,dword ptr [eax]
TRAP_FRAME: ac08b85c -- (.trap 0xffffffffac08b85c)
ErrCode = 00000000
eax=00000000 ebx=879a9830 ecx=ac08b8e0 edx=00000000 esi=8780c288 edi=879a9998
eip=90755b45 esp=ac08b8d0 ebp=ac08b8f8 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
srvnet!SrvNetWskDisconnectConnection+0x48:
90755b45 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avgnsx.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 90753b80 to 90755b45
STACK_TEXT:
ac08b8f8 90753b80 879a9830 9075e000 879a9830 srvnet!SrvNetWskDisconnectConnection+0x48
ac08b910 90753e9a 009a9830 879a9998 879a9830 srvnet!SrvNetDisconnectConnectionInternal+0x12e
ac08b938 90755815 009a9830 ac08bad0 879ad3c0 srvnet!SrvNetDisconnectConnection+0x237
ac08ba80 8972ded3 879a9830 00000000 879270cc srvnet!SrvNetWskReceiveEvent+0x2e2
ac08bab4 8976b70b 879ad3c0 0008bad0 87224c80 afd!WskProTLEVENTReceive+0xc4
ac08baec 89b7be56 878f4b58 87e92ef0 00000820 afd!WskTdiEHReceive+0x1f4
WARNING: Stack unwind information not available. Following frames may be wrong.
ac08bb4c 89b7c1ac 00224c08 00000000 8f945b54 avgtdix+0x4e56
ac08bb64 89b7ccd1 00224c08 8f945b54 0000006c avgtdix+0x51ac
ac08bba0 89b782a4 87c1e140 876d2c08 85e4ab10 avgtdix+0x5cd1
ac08bbec 89b7a57f 85e4ab10 87c1e140 ac08bc14 avgtdix+0x12a4
ac08bbfc 82c7bf44 85e4ab10 87c1e140 87c1e140 avgtdix+0x357f
ac08bc14 82e51307 876d2c08 87c1e140 87c1e1b0 nt!IofCallDriver+0x63
ac08bc34 82e536fa 85e4ab10 876d2c08 00000000 nt!IopSynchronousServiceTail+0x1f8
ac08bcd0 82e5a73b 85e4ab10 87c1e140 00000000 nt!IopXxxControlFile+0x6aa
ac08bd04 82c8279a 000002f8 0000033c 00000000 nt!NtDeviceIoControlFile+0x2a
ac08bd04 76ef64f4 000002f8 0000033c 00000000 nt!KiFastCallEntry+0x12a
0115fd2c 00000000 00000000 00000000 00000000 0x76ef64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
srvnet!SrvNetWskDisconnectConnection+48
90755b45 8b08 mov ecx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: srvnet!SrvNetWskDisconnectConnection+48
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srvnet
IMAGE_NAME: srvnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c20242d
FAILURE_BUCKET_ID: 0x8E_srvnet!SrvNetWskDisconnectConnection+48
BUCKET_ID: 0x8E_srvnet!SrvNetWskDisconnectConnection+48
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100610-15000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c4d000 PsLoadedModuleList = 0x82d8c570
System Uptime: 0 days 5:06:47.757
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 90e6eb45, 8e0e985c, 0}
Unable to load image \SystemRoot\System32\Drivers\avgtdix.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdix.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
Probably caused by : srvnet.sys ( srvnet!SrvNetWskDisconnectConnection+48 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 90e6eb45, The address that the exception occurred at
Arg3: 8e0e985c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
srvnet!SrvNetWskDisconnectConnection+48
90e6eb45 8b08 mov ecx,dword ptr [eax]
TRAP_FRAME: 8e0e985c -- (.trap 0xffffffff8e0e985c)
ErrCode = 00000000
eax=00000000 ebx=87d03e70 ecx=8e0e98e0 edx=00000000 esi=87679f68 edi=87d03fd8
eip=90e6eb45 esp=8e0e98d0 ebp=8e0e98f8 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
srvnet!SrvNetWskDisconnectConnection+0x48:
90e6eb45 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avgnsx.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 90e6cb80 to 90e6eb45
STACK_TEXT:
8e0e98f8 90e6cb80 87d03e70 90e77000 87d03e70 srvnet!SrvNetWskDisconnectConnection+0x48
8e0e9910 90e6ce9a 00d03e70 87d03fd8 87d03e70 srvnet!SrvNetDisconnectConnectionInternal+0x12e
8e0e9938 90e6e815 00d03e70 8e0e9ad0 85e74a98 srvnet!SrvNetDisconnectConnection+0x237
8e0e9a80 89720ed3 87d03e70 00000000 8766ff8c srvnet!SrvNetWskReceiveEvent+0x2e2
8e0e9ab4 8975e70b 85e74a98 000e9ad0 85ef9748 afd!WskProTLEVENTReceive+0xc4
8e0e9aec 89b82e56 879189d8 87a3ee38 00000820 afd!WskTdiEHReceive+0x1f4
WARNING: Stack unwind information not available. Following frames may be wrong.
8e0e9b4c 89b831ac 00ef96d0 00000000 8bcd52cc avgtdix+0x4e56
8e0e9b64 89b83cd1 00ef96d0 8bcd52cc 0000006c avgtdix+0x51ac
8e0e9ba0 89b7f2a4 85d01730 87719480 85e379e0 avgtdix+0x5cd1
8e0e9bec 89b8157f 85e379e0 85d01730 8e0e9c14 avgtdix+0x12a4
8e0e9bfc 82c7bf44 85e379e0 85d01730 85d01730 avgtdix+0x357f
8e0e9c14 82e51307 87719480 85d01730 85d017a0 nt!IofCallDriver+0x63
8e0e9c34 82e536fa 85e379e0 87719480 00000000 nt!IopSynchronousServiceTail+0x1f8
8e0e9cd0 82e5a73b 85e379e0 85d01730 00000000 nt!IopXxxControlFile+0x6aa
8e0e9d04 82c8279a 000002f8 000003a0 00000000 nt!NtDeviceIoControlFile+0x2a
8e0e9d04 772264f4 000002f8 000003a0 00000000 nt!KiFastCallEntry+0x12a
0165fd2c 00000000 00000000 00000000 00000000 0x772264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
srvnet!SrvNetWskDisconnectConnection+48
90e6eb45 8b08 mov ecx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: srvnet!SrvNetWskDisconnectConnection+48
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srvnet
IMAGE_NAME: srvnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c20242d
FAILURE_BUCKET_ID: 0x8E_srvnet!SrvNetWskDisconnectConnection+48
BUCKET_ID: 0x8E_srvnet!SrvNetWskDisconnectConnection+48
Followup: MachineOwner
---------
80bce000 80bd6000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA)
82c16000 82c4d000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
82c4d000 8304d000 nt ntkrnlmp.exe Sat Jun 19 06:55:07 2010 (4C1C3F9B)
89017000 8908f000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
8908f000 890a0000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0)
890a0000 890a8000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2)
890a8000 890ea000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E)
890ea000 89195000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8)
89195000 89206000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
89206000 89214000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D)
89214000 8925c000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F)
8925c000 89265000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A)
89265000 8926d000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8926d000 89297000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
89297000 892a2000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
892a2000 892b3000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27)
892b3000 892c3000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D)
892c3000 8930e000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8930e000 89315000 intelide intelide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
89315000 89323000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13)
89323000 89339000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
89339000 89342000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
89342000 89365000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16)
89365000 8936e000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F)
8936e000 893a2000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11)
893a2000 893b3000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
893b3000 893ca000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883)
893ca000 893dd000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
893dd000 893e8000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
893e8000 893f4000 kbdhid kbdhid.sys Tue Jul 14 02:45:09 2009 (4A5BC705)
89400000 8940a000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8940a000 89414000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
89414000 89420000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
89423000 89552000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45)
89552000 8957d000 msrpc msrpc.sys unavailable (00000000)
8957d000 89590000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C)
89590000 895ed000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427)
895ed000 895fb000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E)
895fb000 89604000 Fs_Rec Fs_Rec.sys unavailable (00000000)
89604000 896bb000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58)
896bb000 896f9000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63)
896f9000 8971e000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6)
8971e000 89778000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62)
89778000 89797000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916)
89797000 897aa000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956)
897aa000 897ba000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF)
897ba000 897fb000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2)
89800000 8981a000 serial serial.sys Tue Jul 14 02:45:33 2009 (4A5BC71D)
8981b000 89964000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB)
89964000 89995000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
89995000 8999e000 vmstorfl vmstorfl.sys unavailable (00000000)
8999e000 899dd000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26)
899dd000 899e5000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB)
899e5000 89a12000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
89a12000 89a22000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6)
89a22000 89a2a000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
89a2a000 89a5c000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55)
89a5c000 89a6d000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20)
89a6d000 89a92000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
89a92000 89a9f000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
89a9f000 89ab0000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
89ab0000 89abb000 hidusb hidusb.sys Tue Jul 14 02:51:04 2009 (4A5BC868)
89abb000 89ac1480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
89ac4000 89ae3000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C)
89ae3000 89aea000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10)
89aea000 89af1000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC)
89af1000 89afd000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E)
89afd000 89b1e000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
89b1e000 89b2b000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
89b2b000 89b33000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4)
89b33000 89b3b000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
89b3b000 89b43000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
89b43000 89b4e000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E)
89b4e000 89b5c000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23)
89b5c000 89b73000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A)
89b73000 89b7e000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C)
89b7e000 89bb7b00 avgtdix avgtdix.sys Fri Jun 04 00:08:25 2010 (4C0819C9)
89bb8000 89bea000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52)
89bea000 89bf1000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F)
89bf1000 89bff000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912)
90800000 9080a000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
9080a000 90815000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286)
90815000 9082b000 cdfs cdfs.sys Tue Jul 14 02:11:14 2009 (4A5BBF12)
9082b000 90836000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
90837000 9089b000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC)
9089b000 908b3000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8)
908b3000 908c1000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
908c1000 908c6940 avgmfx86 avgmfx86.sys Mon Apr 26 00:05:02 2010 (4BD4AE7E)
908c7000 908fa300 avgldx86 avgldx86.sys Fri Jun 04 00:05:19 2010 (4C08190F)
908fb000 9091c000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B)
9091c000 9092e000 intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
9092e000 90962000 ks ks.sys Tue Jul 14 02:45:13 2009 (4A5BC709)
90962000 909a6000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6)
909a6000 90bcc440 RTKVHDA RTKVHDA.sys Fri Dec 26 11:26:09 2008 (4954A331)
90bcd000 90bfc000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864)
90c2a000 90c45000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020)
90c45000 90c5f000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835)
90c5f000 90c6f000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE)
90c6f000 90c82000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0)
90c82000 90d07000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75)
90d07000 90d20000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD)
90d20000 90d32000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4)
90d32000 90d55000 mrxsmb mrxsmb.sys Sat Feb 27 09:32:02 2010 (4B88CA72)
90d55000 90d90000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
90d90000 90dab000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
90dc3000 90e5a000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0)
90e5a000 90e64000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528)
90e64000 90e85000 srvnet srvnet.sys Tue Jun 22 05:47:09 2010 (4C20242D)
90e85000 90e92000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
90e92000 90ee1000 srv2 srv2.sys Tue Jun 22 05:47:19 2010 (4C202437)
90ee1000 90f32000 srv srv.sys Tue Jun 22 05:47:32 2010 (4C202444)
90f32000 90f57000 rdpdr rdpdr.sys Tue Jul 14 03:02:56 2009 (4A5BCB30)
90f57000 90f61000 tdtcp tdtcp.sys Tue Jul 14 03:01:37 2009 (4A5BCAE1)
90f61000 90f6e000 tssecsrv tssecsrv.sys Tue Jul 14 03:01:50 2009 (4A5BCAEE)
90f6e000 90f9f000 RDPWD RDPWD.SYS Tue Jul 14 03:01:50 2009 (4A5BCAEE)
91400000 91411000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933)
91411000 9142a000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5)
9142a000 91433000 dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91433000 91930000 igdkmd32 igdkmd32.sys Tue Jun 16 21:28:17 2009 (4A37E441)
91930000 919e7000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1)
919e7000 91a20000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265)
91a20000 91a3f000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
91a3f000 91a85000 Rt86win7 Rt86win7.sys Fri Sep 03 08:58:33 2010 (4C808E89)
91a85000 91a90000 usbuhci usbuhci.sys Tue Jul 14 02:51:10 2009 (4A5BC86E)
91a90000 91adb000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871)
91adb000 91aea000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872)
91aea000 91af4000 serenum serenum.sys Tue Jul 14 02:45:27 2009 (4A5BC717)
91af4000 91b0c000 i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
91b0c000 91b19000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91b19000 91b26000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
91b26000 91b38000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
91b38000 91b50000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939)
91b50000 91b5b000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
91b5b000 91b7d000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A)
91b7d000 91b95000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
91b95000 91bac000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947)
91bac000 91bc3000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951)
91bc3000 91bc7c00 hamachi hamachi.sys Thu Feb 19 12:36:27 2009 (499D362B)
91bc8000 91bd3900 pcouffin pcouffin.sys Tue Dec 05 16:39:53 2006 (457584B9)
91bd4000 91bde000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20)
91bde000 91beb000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91beb000 91bec380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
91bed000 91bfb000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A)
91bfb000 91bfc700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869)
93920000 93b6a000 win32k win32k.sys Sat Jun 19 07:06:50 2010 (4C1C425A)
93b80000 93b89000 TSDDD TSDDD.dll Tue Jul 14 03:01:40 2009 (4A5BCAE4)
93bb0000 93bce000 cdd cdd.dll unavailable (00000000)
d6c83000 d6c8c000 asyncmac asyncmac.sys Tue Jul 14 02:54:46 2009 (4A5BC946)
Unloaded modules:
d6c19000 d6c83000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
90dab000 90dc3000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
89a92000 89a9f000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
89a9f000 89aaa000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
89aaa000 89ab3000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
89ab3000 89ac4000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000