Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100310-26005-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`01c64000 PsLoadedModuleList = 0xfffff800`01ea1e50
System Uptime: 1 days 13:36:16.557
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80001c9cec0}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80001c9cec0
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001cd3ca9 to fffff80001cd4740
STACK_TEXT:
fffff880`02145de8 fffff800`01cd3ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02145df0 fffff800`01cd2172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02145f30 fffff800`01c9cec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02369a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`01cd2172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100310-17472-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`01c5b000 PsLoadedModuleList = 0xfffff800`01e98e50
System Uptime: 0 days 2:18:08.329
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80001c93ec0}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80001c93ec0
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001ccaca9 to fffff80001ccb740
STACK_TEXT:
fffff880`021e7de8 fffff800`01ccaca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`021e7df0 fffff800`01cc9172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`021e7f30 fffff800`01c93ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0abb4a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`01cc9172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100310-17799-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`01c16000 PsLoadedModuleList = 0xfffff800`01e53e50
System Uptime: 0 days 2:11:36.297
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80001c4eec0}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80001c4eec0
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001c85ca9 to fffff80001c86740
STACK_TEXT:
fffff880`021b6de8 fffff800`01c85ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`021b6df0 fffff800`01c84172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`021b6f30 fffff800`01c4eec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02370a30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`01c84172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100310-18626-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`01c1b000 PsLoadedModuleList = 0xfffff800`01e58e50
System Uptime: 0 days 0:28:38.646
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80001c53ec0}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80001c53ec0
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001c8aca9 to fffff80001c8b740
STACK_TEXT:
fffff880`02145de8 fffff800`01c8aca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02145df0 fffff800`01c89172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02145f30 fffff800`01c53ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0235ba30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x58
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`01c89172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
fffff800`01a3c000 fffff800`01a46000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`01c1b000 fffff800`021f7000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`021f7000 fffff800`02240000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00c62000 fffff880`00ca6000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00ca6000 fffff880`00cba000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cba000 fffff880`00d18000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d18000 fffff880`00dd8000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00dd8000 fffff880`00df2000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`00e00000 fffff880`00e1a000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00e1a000 fffff880`00e3b000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`00e4b000 fffff880`00eef000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00eef000 fffff880`00efe000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00efe000 fffff880`00f55000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00f55000 fffff880`00f5e000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f5e000 fffff880`00f68000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00f68000 fffff880`00f9b000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00f9b000 fffff880`00fa8000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00fa8000 fffff880`00fbd000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00fbd000 fffff880`00fc6000 compbatt compbatt.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`00fc6000 fffff880`00fd2000 BATTC BATTC.SYS Tue Jul 14 02:31:01 2009 (4A5BC3B5)
fffff880`00fd2000 fffff880`00fe7000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0104c000 fffff880`01067000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`01078000 fffff880`01280000 iaStor iaStor.sys Thu Dec 17 20:41:59 2009 (4B2A7B77)
fffff880`01280000 fffff880`01289000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`01289000 fffff880`012b3000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`012b3000 fffff880`012be000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`012be000 fffff880`0130a000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`0130a000 fffff880`0131e000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`0131e000 fffff880`01329ae0 PxHlpa64 PxHlpa64.sys Tue Dec 11 01:49:01 2007 (475DD06D)
fffff880`0132a000 fffff880`01388000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01388000 fffff880`013fb000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01400000 fffff880`01414000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`01419000 fffff880`015bc000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`015bc000 fffff880`015d6000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`015d6000 fffff880`015e7000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`015e7000 fffff880`015f1000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01600000 fffff880`0164a000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0164a000 fffff880`01652000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01652000 fffff880`01659000 speedfan speedfan.sys Sun Sep 24 16:26:48 2006 (45168798)
fffff880`01659000 fffff880`01674000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`01677000 fffff880`01769000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`01769000 fffff880`017c9000 NETIO NETIO.SYS Fri Apr 09 05:43:59 2010 (4BBE946F)
fffff880`017c9000 fffff880`017f4000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`01803000 fffff880`01a00000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01a00000 fffff880`01a16000 vwififlt vwififlt.sys Tue Jul 14 03:07:22 2009 (4A5BCC3A)
fffff880`01a16000 fffff880`01a52000 SAFsFilter SAFsFilter.sys Fri Sep 10 04:30:37 2010 (4C898A3D)
fffff880`01a61000 fffff880`01a9b000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01a9b000 fffff880`01aad000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01aad000 fffff880`01ab6000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01ab6000 fffff880`01af0000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01af0000 fffff880`01b06000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01b06000 fffff880`01b36000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01b44000 fffff880`01bd9000 vsdatant vsdatant.sys Sun May 09 19:28:58 2010 (4BE6E2CA)
fffff880`01bd9000 fffff880`01bff000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02e00000 fffff880`03008000 dump_iaStor dump_iaStor.sys Thu Dec 17 20:41:59 2009 (4B2A7B77)
fffff880`0301f000 fffff880`03049000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`03049000 fffff880`03052000 mwlPSDFilter mwlPSDFilter.sys Tue Jun 02 13:07:30 2009 (4A24F9E2)
fffff880`03052000 fffff880`0305b000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`0305b000 fffff880`03062000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`03062000 fffff880`03070000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`03070000 fffff880`03095000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`03095000 fffff880`030a5000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`030a5000 fffff880`030ae000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`030ae000 fffff880`030b7000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`030b7000 fffff880`030c0000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`030c0000 fffff880`030cb000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`030cb000 fffff880`030dc000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`030dc000 fffff880`030fa000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`030fa000 fffff880`03107000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`03107000 fffff880`0314c000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`0314c000 fffff880`0315c000 IpmSecurityAgent1 IpmSecurityAgent1.sys Fri Sep 10 04:30:22 2010 (4C898A2E)
fffff880`0315c000 fffff880`031e6000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`031e6000 fffff880`031ef000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`031ef000 fffff880`031fe000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03200000 fffff880`03224000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03224000 fffff880`03253000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`03263000 fffff880`032b4000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`032b4000 fffff880`032c0000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`032c0000 fffff880`032d3000 mwlPSDVDisk mwlPSDVDisk.sys Tue Jun 02 13:15:29 2009 (4A24FBC1)
fffff880`032d3000 fffff880`032db000 mwlPSDNServ mwlPSDNServ.sys Tue Jun 02 13:07:39 2009 (4A24F9EB)
fffff880`032db000 fffff880`032e6000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`032e6000 fffff880`032f5000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`032f5000 fffff880`03313000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03313000 fffff880`03324000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03324000 fffff880`0334a000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`0334a000 fffff880`0334e500 CmBatt CmBatt.sys Tue Jul 14 02:31:03 2009 (4A5BC3B7)
fffff880`0334f000 fffff880`03358000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`03358000 fffff880`0338c000 atikmpag atikmpag.sys Wed Mar 03 05:07:33 2010 (4B8DD275)
fffff880`0338c000 fffff880`033e2000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`033e2000 fffff880`033f7000 L1C62x64 L1C62x64.sys Mon Jan 18 08:59:15 2010 (4B5406C3)
fffff880`03600000 fffff880`03624000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`03624000 fffff880`03635000 HECIx64 HECIx64.sys Thu Sep 17 22:54:16 2009 (4AB293E8)
fffff880`03635000 fffff880`03646000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`0364f000 fffff880`03cbe000 atipmdag atipmdag.sys Wed Mar 03 05:47:08 2010 (4B8DDBBC)
fffff880`03cbe000 fffff880`03db2000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`03db2000 fffff880`03df8000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`0424c000 fffff880`0428f000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`0428f000 fffff880`042a1000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`042a1000 fffff880`042fb000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`042fb000 fffff880`04310000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`04310000 fffff880`04332000 AtiHdmi AtiHdmi.sys Fri Jan 29 03:03:36 2010 (4B6233E8)
fffff880`04332000 fffff880`0436f000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`0436f000 fffff880`04391000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`04391000 fffff880`04396200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`04400000 fffff880`0444d000 SynTP SynTP.sys Fri Sep 18 05:30:41 2009 (4AB2F0D1)
fffff880`0444d000 fffff880`0444ef00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`0444f000 fffff880`0445e000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0445e000 fffff880`0446d000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0446d000 fffff880`04475000 UBHelper UBHelper.sys Mon Apr 27 11:48:19 2009 (49F57153)
fffff880`04475000 fffff880`0447d000 NTIDrvr NTIDrvr.sys Wed Mar 25 05:09:39 2009 (49C9A073)
fffff880`0447d000 fffff880`0448a000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`0448a000 fffff880`044a0000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`044a0000 fffff880`044b0000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`044b4000 fffff880`047a3000 bcmwl664 bcmwl664.sys Tue Mar 23 05:08:39 2010 (4BA830B7)
fffff880`047a3000 fffff880`047b0000 vwifibus vwifibus.sys Tue Jul 14 03:07:21 2009 (4A5BCC39)
fffff880`047b0000 fffff880`047ce000 i8042prt i8042prt.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`047ce000 fffff880`047e4000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`047e4000 fffff880`047f0000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`047f0000 fffff880`047f1480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04a00000 fffff880`04a53000 nwifi nwifi.sys Tue Jul 14 03:07:23 2009 (4A5BCC3B)
fffff880`04a53000 fffff880`04a66000 ndisuio ndisuio.sys Tue Jul 14 03:09:25 2009 (4A5BCCB5)
fffff880`04a66000 fffff880`04a7e000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`04a7e000 fffff880`04a85000 TurboB TurboB.sys Mon Nov 02 22:47:34 2009 (4AEF4566)
fffff880`04a85000 fffff880`04a91000 ISWKL ISWKL.sys Thu Sep 02 13:48:35 2010 (4C7F8103)
fffff880`04a9e000 fffff880`04cc6f80 RTKVHD64 RTKVHD64.sys Mon Feb 22 11:26:08 2010 (4B824DB0)
fffff880`04cc7000 fffff880`04ce4000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`04ce4000 fffff880`04d11200 usbvideo usbvideo.sys Thu Mar 04 06:40:57 2010 (4B8F39D9)
fffff880`04d12000 fffff880`04d2f000 cdfs cdfs.sys Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`04d2f000 fffff880`04d3d000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`04d3d000 fffff880`04d50000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`04d50000 fffff880`04d5c000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`04d5c000 fffff880`04d6a000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`04d6a000 fffff880`04d8d000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`04d8d000 fffff880`04dae000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`04dae000 fffff880`04dc3000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`06c00000 fffff880`06c4e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`06c4e000 fffff880`06c71000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`06c71000 fffff880`06c89000 adfs adfs.SYS Thu Jun 26 23:52:37 2008 (48640195)
fffff880`06c97000 fffff880`06d5f000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`06d5f000 fffff880`06d7d000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`06d7d000 fffff880`06d95000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`06d95000 fffff880`06dc2000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`07217000 fffff880`072bd000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`072bd000 fffff880`072c8000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`072c8000 fffff880`072f5000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`072f5000 fffff880`07307000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`07307000 fffff880`07332000 000 000.fcl Fri Sep 26 16:11:22 2008 (48DCDF7A)
fffff880`07332000 fffff880`0739a000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`0764a000 fffff880`076e0000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff960`00010000 fffff960`0031f000 win32k win32k.sys unavailable (00000000)
fffff960`00430000 fffff960`0043a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`007c0000 fffff960`007e7000 cdd cdd.dll unavailable (00000000)
fffff960`00870000 fffff960`008d1000 ATMFD ATMFD.DLL unavailable (00000000)
Unloaded modules:
fffff880`076e0000 fffff880`07751000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01b36000 fffff880`01b44000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`02e04000 fffff880`0300c000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0300c000 fffff880`0301f000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000