Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\092910-29390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a54000 PsLoadedModuleList = 0x82b9c810
System Uptime: 0 days 0:15:43.012
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82ac1fcd, 986efc44, 986ef820}
Probably caused by : hardware ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ac1fcd, The address that the exception occurred at
Arg3: 986efc44, Exception Record Address
Arg4: 986ef820, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP: 
nt!ExpWorkerThread+1af
82ac1fcd 0081e100e000    add     byte ptr [ecx+0E000E1h],al
EXCEPTION_RECORD:  986efc44 -- (.exr 0xffffffff986efc44)
ExceptionAddress: 82ac1fcd (nt!ExpWorkerThread+0x000001af)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000001
   Parameter[1]: 00e0a0e1
Attempt to write to address 00e0a0e1
CONTEXT:  986ef820 -- (.cxr 0xffffffff986ef820)
eax=00017087 ebx=82b8e580 ecx=0000a000 edx=00000002 esi=877c9709 edi=86299498
eip=82ac1fcd esp=986efd0c ebp=986efd50 iopl=0         ov dn ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010e06
nt!ExpWorkerThread+0x1af:
82ac1fcd 0081e100e000    add     byte ptr [ecx+0E000E1h],al ds:0023:00e0a0e1=??
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME:  System
CURRENT_IRQL:  0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1:  00000001
EXCEPTION_PARAMETER2:  00e0a0e1
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bbc718
Unable to read MiSystemVaType memory at 82b9c160
 00e0a0e1 
FOLLOWUP_IP: 
nt!ExpWorkerThread+1af
82ac1fcd 0081e100e000    add     byte ptr [ecx+0E000E1h],al
BUGCHECK_STR:  0x7E
MISALIGNED_IP: 
nt!ExpWorkerThread+1af
82ac1fcd 0081e100e000    add     byte ptr [ecx+0E000E1h],al
LAST_CONTROL_TRANSFER:  from 82c6266d to 82ac1fcd
STACK_TEXT:  
986efd50 82c6266d 80000000 b5865db1 00000000 nt!ExpWorkerThread+0x1af
986efd90 82b140d9 82ac1e1e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND:  kb
SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: hardware
IMAGE_NAME:  hardware
DEBUG_FLR_IMAGE_TIMESTAMP:  0
FAILURE_BUCKET_ID:  IP_MISALIGNED
BUCKET_ID:  IP_MISALIGNED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100110-22105-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e50000 PsLoadedModuleList = 0x82f98810
System Uptime: 0 days 0:58:18.000
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 8da41bf8, Virtual address for the attempted execute.
Arg2: 52fe9963, PTE contents.
Arg3: 8da41b5c, (reserved)
Arg4: 00000002, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xFC
PROCESS_NAME:  System
CURRENT_IRQL:  0
TRAP_FRAME:  8da41b5c -- (.trap 0xffffffff8da41b5c)
ErrCode = 00000011
eax=858c8a28 ebx=8da41bf8 ecx=00000006 edx=00000000 esi=8858e338 edi=858c8940
eip=8da41bf8 esp=8da41bd0 ebp=8da41be4 iopl=0         nv up ei pl nz ac pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010216
8da41bf8 004000          add     byte ptr [eax],al          ds:0023:858c8a28=??
Resetting default scope
LAST_CONTROL_TRANSFER:  from 82e96638 to 82ed5903
STACK_TEXT:  
8da41b44 82e96638 00000008 8da41bf8 00000000 nt!MmAccessFault+0x106
8da41b44 8da41bf8 00000008 8da41bf8 00000000 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
8da41be4 8308616b 00a41bf8 00000000 858c8b1c 0x8da41bf8
8da41c40 82ec2c2b 00000000 858c8940 00000000 nt!EtwpRealtimeSendEmptyMarker+0x3b
8da41d08 83082a5a 858c8940 00000001 00000000 nt!EtwpFlushActiveBuffers+0x303
8da41d50 8305e6d3 858c8940 a07935ba 00000000 nt!EtwpLogger+0x2a1
8da41d90 82f100f9 830827b9 858c8940 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt!KiTrap0E+dc
82e96638 85c0            test    eax,eax
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt!KiTrap0E+dc
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
FAILURE_BUCKET_ID:  0xFC_nt!KiTrap0E+dc
BUCKET_ID:  0xFC_nt!KiTrap0E+dc
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100210-19578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82e0f000 PsLoadedModuleList = 0x82f57810
System Uptime: 0 days 2:07:05.000
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82e98a2c, 8d9d7c28, 8d9d7800}
Probably caused by : hardware ( nt!MmOutSwapProcess+66 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82e98a2c, The address that the exception occurred at
Arg3: 8d9d7c28, Exception Record Address
Arg4: 8d9d7800, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP: 
nt!MmOutSwapProcess+66
82e98a2c 0200            add     al,byte ptr [eax]
EXCEPTION_RECORD:  8d9d7c28 -- (.exr 0xffffffff8d9d7c28)
ExceptionAddress: 82e98a2c (nt!MmOutSwapProcess+0x00000066)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 00000000
Attempt to read from address 00000000
CONTEXT:  8d9d7800 -- (.cxr 0xffffffff8d9d7800)
eax=00000000 ebx=886715c8 ecx=8d8e103c edx=0000000c esi=88671550 edi=88671358
eip=82e98a2c esp=8d9d7cf0 ebp=8d9d7d20 iopl=0         nv up ei ng nz ac po cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010293
nt!MmOutSwapProcess+0x66:
82e98a2c 0200            add     al,byte ptr [eax]          ds:0023:00000000=??
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  NULL_DEREFERENCE
PROCESS_NAME:  System
CURRENT_IRQL:  0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1:  00000000
EXCEPTION_PARAMETER2:  00000000
READ_ADDRESS: GetPointerFromAddress: unable to read from 82f77718
Unable to read MiSystemVaType memory at 82f57160
 00000000 
FOLLOWUP_IP: 
nt!MmOutSwapProcess+66
82e98a2c 0200            add     al,byte ptr [eax]
BUGCHECK_STR:  0x7E
MISALIGNED_IP: 
nt!MmOutSwapProcess+66
82e98a2c 0200            add     al,byte ptr [eax]
LAST_CONTROL_TRANSFER:  from 82ea11a2 to 82e98a2c
STACK_TEXT:  
8d9d7d20 82ea11a2 00000000 858aed48 00000000 nt!MmOutSwapProcess+0x66
8d9d7d44 82e9affe 00000000 8d9d7d90 8301d6d3 nt!KiOutSwapProcesses+0xc5
8d9d7d50 8301d6d3 00000000 a042926b 00000000 nt!KeSwapProcessOrStack+0x53
8d9d7d90 82ecf0f9 82e9afab 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  nt!MmOutSwapProcess+66
FOLLOWUP_NAME:  MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP:  0
STACK_COMMAND:  .cxr 0xffffffff8d9d7800 ; kb
IMAGE_NAME:  hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID:  IP_MISALIGNED
BUCKET_ID:  IP_MISALIGNED
Followup: MachineOwner
---------
80ba6000 80bae000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
82e0f000 8321f000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
8321f000 83256000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
83c00000 83c21000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
83c21000 83c2e000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
83c35000 83c40000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
83c40000 83c51000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
83c51000 83c59000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
83c59000 83c9b000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
83c9b000 83d46000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
83d46000 83db7000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
83db7000 83dc5000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
83dc5000 83df7000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
83df7000 83dff000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
83e00000 83e1f000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
83e1f000 83e27000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
83e28000 83e70000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
83e70000 83e79000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
83e79000 83e81000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
83e81000 83eab000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
83eab000 83eb6000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
83eb6000 83ec7000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
83ec7000 83ed7000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
83ed7000 83f22000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
83f22000 83f29000   pciide   pciide.sys   Tue Jul 14 02:11:19 2009 (4A5BBF17)
83f29000 83f37000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
83f37000 83f4d000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
83f4d000 83f56000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
83f56000 83f79000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
83f79000 83f82000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
83f82000 83fb6000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
83fb6000 83fc7000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
83fc7000 83ff4000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
83ff4000 83ffc000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8b800000 8b813000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b813000 8b838000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
8b83b000 8b897360   mfehidk  mfehidk.sys  Sat Aug 07 01:33:01 2010 (4C5C8D9D)
8b898000 8b9c7000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
8b9c7000 8b9f2000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8b9f2000 8b9fe000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
8ba11000 8ba18000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
8ba18000 8ba1f000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8ba1f000 8ba7c000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
8ba7c000 8ba8a000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8ba8a000 8ba93000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
8ba93000 8bb4a000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
8bb4a000 8bb88000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
8bb88000 8bbad000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
8bbad000 8bbec000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
8bbec000 8bbff000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
8bc00000 8bc11000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
8bc11000 8bc19000   AtiPcie  AtiPcie.sys  Tue May 05 18:00:16 2009 (4A005480)
8bc28000 8bd71000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
8bd71000 8bda2000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8bda2000 8bdc85a0   mfewfpk  mfewfpk.sys  Sat Aug 07 01:33:27 2010 (4C5C8DB7)
8bdc9000 8bdd4000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8bdd4000 8bddc380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8bddd000 8bde5000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
8bde5000 8bdf5000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8bdf5000 8bdfd000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
90400000 90410000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
9041c000 90427000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
90427000 90435000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
90435000 9044c000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
9044c000 9047e000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
9047e000 904d8000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
904d8000 904df000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
904df000 904fe000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
904fe000 9050bf60   mfenlfk  mfenlfk.sys  Sat Aug 07 01:33:41 2010 (4C5C8DC5)
9050c000 9051a000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
9051a000 90534000   serial   serial.sys   Tue Jul 14 02:45:33 2009 (4A5BC71D)
90534000 90547000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
90547000 90557000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
90557000 90598000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
90598000 905a2000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
905a2000 905ac000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
905ac000 905b8000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
905b8000 905cf000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
905cf000 905dc000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
905dc000 905f7000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
905f7000 90600000   Sftvollh Sftvollh.sys Fri Apr 23 21:18:31 2010 (4BD1E477)
90c00000 90c0a000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
90c3d000 90cc2000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
90cc2000 90cdb000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
90cdb000 90ced000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
90ced000 90d10000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
90d10000 90d4b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
90d4b000 90d66000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
90d66000 90dfd000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
91000000 91018000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
91018000 9102f000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
9102f000 91039000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
91039000 9109d000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
9109d000 910b5000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
910b5000 910c3000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
910c3000 910e4000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
910e4000 910f5000   amdppm   amdppm.sys   Tue Jul 14 02:11:03 2009 (4A5BBF07)
910f5000 91140000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
91140000 9114d000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
9114d000 91190000   Rt86win7 Rt86win7.sys Mon May 31 06:46:23 2010 (4C03310F)
91190000 91199000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
91199000 911a6000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
911a6000 911b8000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
911b8000 911d0000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
911d0000 911db000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
911db000 911fd000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
91c00000 91c0a000   serenum  serenum.sys  Tue Jul 14 02:45:27 2009 (4A5BC717)
91c0a000 91c0b420   ASACPI   ASACPI.sys   Fri Aug 13 05:52:52 2004 (411C2D04)
91c0c000 91c24000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
91c24000 91c25380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
91c28000 926a5dc0   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:14 2010 (4C379162)
926a6000 926a7040   nvBridge nvBridge.kmd Sat Jul 10 00:10:11 2010 (4C379033)
926a8000 9275f000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
9275f000 92798000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
92798000 927b7000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
927b7000 927d9180   nusb3xhc nusb3xhc.sys Fri Jan 22 05:21:48 2010 (4B5919CC)
927da000 927db700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
927dc000 927e2000   usbfilter usbfilter.sys Wed Oct 07 10:43:57 2009 (4ACC46BD)
927e2000 927ec000   usbohci  usbohci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
927ec000 927fb000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
96600000 9660b000   hidusb   hidusb.sys   Tue Jul 14 02:51:04 2009 (4A5BC868)
9660b000 9661e000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
9661e000 96624480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
96625000 96630000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
96631000 96665000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
96665000 96673000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
96673000 96681a00   nusb3hub nusb3hub.sys Fri Jan 22 05:21:46 2010 (4B5919CA)
96682000 966c6000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
966c6000 966d7000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
966d7000 966f4000   nvhda32v nvhda32v.sys Tue Jun 22 01:07:07 2010 (4C1FE28B)
966f4000 96723000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
96723000 9673c000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
9673c000 9675f7c0   mfeavfk  mfeavfk.sys  Sat Aug 07 01:34:10 2010 (4C5C8DE2)
96760000 967aa4c0   mfefirek mfefirek.sys Sat Aug 07 01:36:56 2010 (4C5C8E88)
967ab000 967b5000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
967b5000 967c2000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
967c2000 967cd000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
967cd000 967d6000   dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
967d6000 967e7000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
967e7000 967f2000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
967f2000 967fe000   ffusbaudio ffusbaudio.sys Fri Mar 05 17:22:18 2010 (4B9121AA)
96e00000 96e8c000   Sftfslh  Sftfslh.sys  Fri Apr 23 21:18:40 2010 (4BD1E480)
96e8c000 96ec2000   Sftplaylh Sftplaylh.sys Fri Apr 23 21:19:38 2010 (4BD1E4BA)
96ec2000 96ee3000   srvnet   srvnet.sys   Tue Jun 22 05:47:09 2010 (4C20242D)
96ee3000 96ef0000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
96f14000 96f63000   srv2     srv2.sys     Tue Jun 22 05:47:19 2010 (4C202437)
96f63000 96fb4000   srv      srv.sys      Tue Jun 22 05:47:32 2010 (4C202444)
96fb4000 96fbd000   Sftredirlh Sftredirlh.sys Fri Apr 23 21:19:31 2010 (4BD1E4B3)
96fbd000 96fd28e0   mfeapfk  mfeapfk.sys  Sat Aug 07 01:33:47 2010 (4C5C8DCB)
96fd3000 96fde000   mfebopk  mfebopk.sys  Sat Aug 07 01:34:22 2010 (4C5C8DEE)
96fde000 96fe9e80   cfwids   cfwids.sys   Sat Aug 07 01:38:06 2010 (4C5C8ECE)
98c90000 98eda000   win32k   win32k.sys   unavailable (00000000)
98ef0000 98ef9000   TSDDD    TSDDD.dll    unavailable (00000000)
98f20000 98f3e000   cdd      cdd.dll      unavailable (00000000)
a5629000 a5693000   spsys    spsys.sys    Mon May 11 19:37:10 2009 (4A085436)
Unloaded modules:
96ef0000 96f14000   mfeavfk01.sy
    Timestamp: unavailable (00000000)
    Checksum:  00000000
90d66000 90d7e000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8bc19000 8bc26000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8bbec000 8bbf7000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8bbf7000 8bc00000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8ba00000 8ba11000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000